{"vulnerability": "cve-2024-5565", "sightings": [{"uuid": "8af397d4-3eb5-4652-b3a2-b7ef32f6485b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55656", "type": "seen", "source": "https://t.me/cvedetector/14693", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55656 - Redis RedisBloom Probabilistic Data Structures Integer Overflow Information Leak Out-of-Bounds Write\", \n  \"Content\": \"CVE ID : CVE-2024-55656 \nPublished : Jan. 8, 2025, 4:15 p.m. | 43\u00a0minutes ago \nDescription : RedisBloom adds a set of probabilistic data structures to Redis. There is an integer overflow vulnerability in RedisBloom, which is a module used in Redis. The integer overflow vulnerability allows an attacker (a redis client which knows the password) to allocate memory in the heap lesser than the required memory due to wraparound. Then read and write can be performed beyond this allocated memory, leading to info leak and OOB write. The integer overflow is in CMS.INITBYDIM command, which initialize a Count-Min Sketch to dimensions specified by user. It accepts two values (width and depth) and uses them to allocate memory in NewCMSketch(). This vulnerability is fixed in 2.2.19, 2.4.12, 2.6.14, and 2.8.2. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T18:19:13.000000Z"}, {"uuid": "2e0e3635-e318-43d1-bdf0-361e99298b75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55655", "type": "seen", "source": "https://t.me/cvedetector/12613", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55655 - Sigstore-python Integration Time Validation Inadequacy Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55655 \nPublished : Dec. 10, 2024, 11:15 p.m. | 39\u00a0minutes ago \nDescription : sigstore-python is a Python tool for generating and verifying Sigstore signatures. Versions of sigstore-python newer than 2.0.0 but prior to 3.6.0 perform insufficient validation of the \"integration time\" present in \"v2\" and \"v3\" bundles during the verification flow: the \"integration time\" is verified *if* a source of signed time (such as an inclusion promise) is present, but is otherwise trusted if no source of signed time is present. This does not affect \"v1\" bundles, as the \"v1\" bundle format always requires an inclusion promise.  \n  \nSigstore uses signed time to support verification of signatures made against short-lived signing keys. The impact and severity of this weakness is *low*, as Sigstore contains multiple other enforcing components that prevent an attacker who modifies the integration timestamp within a bundle from impersonating a valid signature. In particular, an attacker who modifies the integration timestamp can induce a Denial of Service, but in no different manner than already possible with bundle access (e.g. modifying the signature itself such that it fails to verify). Separately, an attacker could upload a *new* entry to the transparency service, and substitute their new entry's time. However, this would still be rejected at validation time, as the new entry's (valid) signed time would be outside the validity window of the original signing certificate and would nonetheless render the attacker auditable. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-11T01:01:35.000000Z"}, {"uuid": "b0b188ac-cfb2-4e32-930f-ed4be681270c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55658", "type": "seen", "source": "https://t.me/cvedetector/12674", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55658 - SiYuan File Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55658 \nPublished : Dec. 12, 2024, 2:15 a.m. | 27\u00a0minutes ago \nDescription : SiYuan is a personal knowledge management system. Prior to version 3.1.16, SiYuan's /api/export/exportResources endpoint is vulnerable to arbitary file read via path traversal. It is possible to manipulate the paths parameter to access and download arbitrary files from the host system by traversing the workspace directory structure. Version 3.1.16 contains a patch for the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T03:46:58.000000Z"}, {"uuid": "4e54fb55-5939-49b8-9211-d2e1b22cdddf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55657", "type": "seen", "source": "https://t.me/cvedetector/12673", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55657 - SiYuan File Read Vulnerability (Arbitrary File Access)\", \n  \"Content\": \"CVE ID : CVE-2024-55657 \nPublished : Dec. 12, 2024, 2:15 a.m. | 27\u00a0minutes ago \nDescription : SiYuan is a personal knowledge management system. Prior to version 3.1.16, an arbitrary file read vulnerability exists in Siyuan's `/api/template/render` endpoint. The absence of proper validation on the path parameter allows attackers to access sensitive files on the host system. Version 3.1.16 contains a patch for the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T03:46:58.000000Z"}, {"uuid": "3586f5b8-2d7f-4523-a65c-a8da9daebd86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55652", "type": "seen", "source": "https://t.me/cvedetector/12672", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55652 - PenDoc JavaScript Sandbox Escape\", \n  \"Content\": \"CVE ID : CVE-2024-55652 \nPublished : Dec. 12, 2024, 2:15 a.m. | 27\u00a0minutes ago \nDescription : PenDoc is a penetration testing reporting application. Prior to commit 1d4219c596f4f518798492e48386a20c6e9a2fe6, an attacker can write a malicious docx template containing expressions that escape the JavaScript sandbox to execute arbitrary code on the system. An attacker who can control the contents of the template document is able to execute arbitrary code on the system. By default, only users with the `admin` role are able to create or update templates. Commit 1d4219c596f4f518798492e48386a20c6e9a2fe6 patches the issue. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T03:46:57.000000Z"}, {"uuid": "1f6d3dfc-85ae-4fbb-8466-e6f877ef20fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55659", "type": "seen", "source": "https://t.me/cvedetector/12668", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55659 - SiYuan File Upload Remote Code Execution &amp; Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-55659 \nPublished : Dec. 12, 2024, 2:15 a.m. | 27\u00a0minutes ago \nDescription : SiYuan is a personal knowledge management system. Prior to version 3.1.16, the `/api/asset/upload` endpoint in Siyuan is vulnerable to both arbitrary file write to the host and stored cross-site scripting (via the file write). Version 3.1.16 contains a patch for the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T03:46:51.000000Z"}, {"uuid": "545786fc-2ce5-425a-9354-ab2328364018", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55653", "type": "seen", "source": "https://t.me/cvedetector/12612", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55653 - PwnDoc Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-55653 \nPublished : Dec. 10, 2024, 11:15 p.m. | 39\u00a0minutes ago \nDescription : PwnDoc is a penetration test report generator. In versions up to and including 0.5.3, an authenticated user is able to crash the backend by raising a `UnhandledPromiseRejection` on audits which exits the backend. The user doesn't need to know the audit id, since a bad audit id will also raise the rejection. With the backend being unresponsive, the whole application becomes unusable for all users of the application. As of time of publication, no known patches are available. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-11T01:01:35.000000Z"}, {"uuid": "136297ab-4b83-411b-ab0f-fc0e4143dc41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5565", "type": "seen", "source": "Telegram/4Rb0e-or1IXd3fOyZM-EAv7oNuoqvkI0SXXU8l8QT8eHyw", "content": "", "creation_timestamp": "2024-06-27T12:12:54.000000Z"}, {"uuid": "c9832fe6-3b87-41a8-a3fd-32c3a823a65b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5565", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/13417", "content": "The Hacker News\nPrompt Injection Flaw in Vanna AI Exposes Databases to RCE Attacks\n\nCybersecurity researchers have disclosed a high-severity security flaw in the Vanna.AI library that could be exploited to achieve remote code execution vulnerability via prompt injection techniques.\nThe vulnerability, tracked as CVE-2024-5565 (CVSS score: 8.1), relates to a case of prompt injection in the \"ask\" function that could be exploited to trick the library into executing arbitrary", "creation_timestamp": "2024-06-27T12:12:53.000000Z"}, {"uuid": "814db707-8e33-4c88-8e95-e872b355a260", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5565", "type": "published-proof-of-concept", "source": "Telegram/tSPxmshbzX4UpTVdKE7p8A34J0-QmbyMZS3Wx59xPpPEjg", "content": "", "creation_timestamp": "2024-06-27T12:07:46.000000Z"}, {"uuid": "66c264be-029c-4fd3-b3cf-afb22ad89506", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5565", "type": "seen", "source": "https://t.me/thehackernews/5179", "content": "\u26a0\ufe0f Attention developers \u2014 A new high-severity prompt injection flaw (CVE-2024-5565) in Vanna AI library exposes databases to remote code execution. \n \nFind out how this flaw could impact your projects: https://thehackernews.com/2024/06/prompt-injection-flaw-in-vanna-ai.html", "creation_timestamp": "2024-06-27T11:58:09.000000Z"}, {"uuid": "162dbfea-1f39-4607-80ac-97ee96190fe5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55651", "type": "seen", "source": "https://t.me/cvedetector/24782", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55651 - i-Educar Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55651 \nPublished : May 8, 2025, 12:15 a.m. | 40\u00a0minutes ago \nDescription : i-Educar is free, fully online school management software. Version 2.9 of the application fails to properly validate and sanitize user supplied input, leading to a stored cross-site scripting vulnerability that resides within the user type (Tipo de Usu\u00e1rio) input field. Through this attacker vector a malicious user might be able to retrieve information belonging to another user, which may lead to sensitive information leakage or other malicious actions. As of time of publication, no patched versions are known to exist. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-08T03:23:23.000000Z"}, {"uuid": "f5752170-4247-46ec-bd4d-e2dde0e96a9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55656", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113793488636536286", "content": "", "creation_timestamp": "2025-01-08T15:40:40.822208Z"}, {"uuid": "c9c63316-8b3e-49da-a3b4-d4a09e310ec4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55656", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfakqtfnza27", "content": "", "creation_timestamp": "2025-01-08T16:16:04.037786Z"}, {"uuid": "9b937143-4874-4a02-b014-733ab6d51da2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55651", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lompe4jfghk2", "content": "", "creation_timestamp": "2025-05-08T00:57:16.131121Z"}, {"uuid": "3347279b-d558-4c5f-a915-a5ddaf8e8708", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55651", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lon3dasgqu2n", "content": "", "creation_timestamp": "2025-05-08T04:31:23.431622Z"}, {"uuid": "682f7ab1-ff55-40f2-84cf-967d2385f169", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55651", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15463", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55651\n\ud83d\udd25 CVSS Score: 2 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:P)\n\ud83d\udd39 Description: i-Educar is free, fully online school management software. Version 2.9 of the application fails to properly validate and sanitize user supplied input, leading to a stored cross-site scripting vulnerability that resides within the user type (Tipo de Usu\u00e1rio) input field. Through this attacker vector a malicious user might be able to retrieve information belonging to another user, which may lead to sensitive information leakage or other malicious actions. As of time of publication, no patched versions are known to exist.\n\ud83d\udccf Published: 2025-05-07T23:49:46.016Z\n\ud83d\udccf Modified: 2025-05-07T23:50:09.438Z\n\ud83d\udd17 References:\n1. https://github.com/portabilis/i-educar/security/advisories/GHSA-8fjj-9937-g84w", "creation_timestamp": "2025-05-08T00:23:30.000000Z"}, {"uuid": "18bf7c78-ac9d-4287-ad62-d40fffc21530", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5565", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/2658", "content": "The Hacker News\nPrompt Injection Flaw in Vanna AI Exposes Databases to RCE Attacks\n\nCybersecurity researchers have disclosed a high-severity security flaw in the Vanna.AI library that could be exploited to achieve remote code execution vulnerability via prompt injection techniques.\nThe vulnerability, tracked as CVE-2024-5565 (CVSS score: 8.1), relates to a case of prompt injection in the \"ask\" function that could be exploited to trick the library into executing arbitrary", "creation_timestamp": "2024-06-27T12:12:53.000000Z"}, {"uuid": "2c7808d5-56bf-4dca-9d50-f7ee7fb1b115", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5565", "type": "seen", "source": "https://t.me/KomunitiSiber/2171", "content": "Prompt Injection Flaw in Vanna AI Exposes Databases to RCE Attacks\nhttps://thehackernews.com/2024/06/prompt-injection-flaw-in-vanna-ai.html\n\nCybersecurity researchers have disclosed a high-severity security flaw in the Vanna.AI library that could be exploited to achieve remote code execution vulnerability via prompt injection techniques.\nThe vulnerability, tracked as CVE-2024-5565 (CVSS score: 8.1), relates to a case of prompt injection in the \"ask\" function that could be exploited to trick the library into executing arbitrary", "creation_timestamp": "2024-06-27T12:00:06.000000Z"}, {"uuid": "63f6b263-09b3-4b12-b56f-bcdc48c556b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5565", "type": "seen", "source": "Telegram/ZsbHSuDV48H-a1ELq9wdg6d2vdMfx_qBSJBQ7Z887p2osX8", "content": "", "creation_timestamp": "2024-06-27T11:34:54.000000Z"}, {"uuid": "bf27f110-c0db-4bf7-b5e5-1e9342e4dc76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55656", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/720", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55656\n\ud83d\udd39 Description: RedisBloom adds a set of probabilistic data structures to Redis. There is an integer overflow vulnerability in RedisBloom, which is a module used in Redis. The integer overflow vulnerability allows an attacker (a redis client which knows the password) to allocate memory in the heap lesser than the required memory due to wraparound. Then read and write can be performed beyond this allocated memory, leading to info leak and OOB write. The integer overflow is in CMS.INITBYDIM command, which initialize a Count-Min Sketch to dimensions specified by user. It accepts two values (width and depth) and uses them to allocate memory in NewCMSketch(). This vulnerability is fixed in 2.2.19, 2.4.12, 2.6.14, and 2.8.2.\n\ud83d\udccf Published: 2025-01-08T15:38:54.859Z\n\ud83d\udccf Modified: 2025-01-08T15:52:23.554Z\n\ud83d\udd17 References:\n1. https://github.com/RedisBloom/RedisBloom/security/advisories/GHSA-x5rx-rmq3-ff3h", "creation_timestamp": "2025-01-08T16:18:22.000000Z"}, {"uuid": "1c088b6c-ac6c-44c5-a231-17683485aad9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5565", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10752", "content": "#MLSecOps\nWhen Prompts Go Rogue: Analyzing a Prompt Injection Code Execution in VannaAI\nhttps://jfrog.com/blog/prompt-injection-attack-code-execution-in-vanna-ai-cve-2024-5565", "creation_timestamp": "2024-06-28T12:04:20.000000Z"}, {"uuid": "db7deeb6-e131-4fb1-b3f2-feb28ac30c6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55653", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113630998146893259", "content": "", "creation_timestamp": "2024-12-10T22:57:12.243378Z"}, {"uuid": "7a3bf9f4-da40-4820-a77f-3ed0068e8dc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55655", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113631058808905104", "content": "", "creation_timestamp": "2024-12-10T23:12:37.923161Z"}, {"uuid": "2c6df3a0-c09e-4e76-ace6-a52e6fe2997d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55652", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113636619774435599", "content": "", "creation_timestamp": "2024-12-11T22:46:51.469779Z"}, {"uuid": "ccdb8a79-6d1c-4993-a44a-081736a8e1b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55657", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113636619788953280", "content": "", "creation_timestamp": "2024-12-11T22:46:51.735871Z"}, {"uuid": "b474bb51-276f-4055-95c1-d1ff43c7ff95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55658", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113636645888375126", "content": "", "creation_timestamp": "2024-12-11T22:53:29.909253Z"}, {"uuid": "382ae0a6-90b0-4f04-8b08-7f9f16241967", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55659", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113637199306185680", "content": "", "creation_timestamp": "2024-12-12T01:14:14.890917Z"}, {"uuid": "c8d05b08-5132-4dbe-8205-1e4307783e79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55656", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfamb5442v2h", "content": "", "creation_timestamp": "2025-01-08T16:43:07.167704Z"}, {"uuid": "80154ef4-aa47-48cc-a5b4-1ab05d5b6975", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55656", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-009/", "content": "", "creation_timestamp": "2025-01-09T05:00:00.000000Z"}, {"uuid": "fa6d3a22-b12b-4658-a83b-47e4380e8e6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55656", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfamb5wv7x2g", "content": "", "creation_timestamp": "2025-01-08T16:43:10.560098Z"}, {"uuid": "c5f01ca6-7b61-4b2d-a202-64863e66ac57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55656", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113793757709166629", "content": "", "creation_timestamp": "2025-01-08T16:49:06.586042Z"}, {"uuid": "67fd9066-a402-4cb5-ab72-c262e4368b03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55653", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-16T23:16:38.000000Z"}, {"uuid": "7a46509e-fa1d-447d-a6a8-e18e437d0a32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55655", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-16T23:16:38.000000Z"}, {"uuid": "c0c4bc02-ef10-4a6d-abaf-5896947254ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55653", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-18T16:44:34.000000Z"}, {"uuid": "e411ba09-a31a-4932-8e35-787a27d133cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55655", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-18T16:44:34.000000Z"}]}