{"vulnerability": "cve-2024-5644", "sightings": [{"uuid": "e18cf1bf-98f7-4716-9c19-102edb9dad44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56441", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/602", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56441\n\ud83d\udd39 Description: Race condition vulnerability in the Bastet module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality.\n\ud83d\udccf Published: 2025-01-08T02:12:46.961Z\n\ud83d\udccf Modified: 2025-01-08T02:12:46.961Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2025/1/", "creation_timestamp": "2025-01-08T02:37:43.000000Z"}, {"uuid": "90ac4ae8-6ddb-4139-990b-236e1e2c3586", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56449", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/628", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56449\n\ud83d\udd39 Description: Privilege escalation vulnerability in the Account module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality.\n\ud83d\udccf Published: 2025-01-08T03:13:25.971Z\n\ud83d\udccf Modified: 2025-01-08T03:13:25.971Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2025/1/", "creation_timestamp": "2025-01-08T03:39:57.000000Z"}, {"uuid": "daa66290-cb12-4b75-af95-42d84437d560", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56440", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/603", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56440\n\ud83d\udd39 Description: Permission control vulnerability in the Connectivity module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally.\n\ud83d\udccf Published: 2025-01-08T02:08:46.885Z\n\ud83d\udccf Modified: 2025-01-08T02:08:46.885Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2025/1/", "creation_timestamp": "2025-01-08T02:37:49.000000Z"}, {"uuid": "d2c39859-1635-4962-bd71-6a50f1591749", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56445", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/632", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56445\n\ud83d\udd39 Description: Instruction authentication bypass vulnerability in the Findnetwork module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally.\n\ud83d\udccf Published: 2025-01-08T03:00:46.813Z\n\ud83d\udccf Modified: 2025-01-08T03:00:46.813Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2025/1/", "creation_timestamp": "2025-01-08T03:40:20.000000Z"}, {"uuid": "1e111898-7ea4-4a82-9893-bbc1bc1405b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56447", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/630", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56447\n\ud83d\udd39 Description: Vulnerability of improper permission control in the window management module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality.\n\ud83d\udccf Published: 2025-01-08T03:03:11.490Z\n\ud83d\udccf Modified: 2025-01-08T03:03:11.490Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2025/1/", "creation_timestamp": "2025-01-08T03:40:08.000000Z"}, {"uuid": "dd6260b9-f9a9-40f9-af67-5ec7a9e67c56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56448", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/629", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56448\n\ud83d\udd39 Description: Vulnerability of improper access control in the home screen widget module\nImpact: Successful exploitation of this vulnerability may affect availability.\n\ud83d\udccf Published: 2025-01-08T03:11:56.159Z\n\ud83d\udccf Modified: 2025-01-08T03:11:56.159Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2025/1/", "creation_timestamp": "2025-01-08T03:40:02.000000Z"}, {"uuid": "60b9687a-0ac6-4c8a-8fb3-22799af2ba42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56443", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/635", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56443\n\ud83d\udd39 Description: Cross-process screen stack vulnerability in the UIExtension module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality.\n\ud83d\udccf Published: 2025-01-08T02:37:31.730Z\n\ud83d\udccf Modified: 2025-01-08T02:37:31.730Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2025/1/", "creation_timestamp": "2025-01-08T03:40:53.000000Z"}, {"uuid": "86d5bdc2-4195-4537-b6ad-8248d10d89dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56444", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/634", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56444\n\ud83d\udd39 Description: Cross-process screen stack vulnerability in the UIExtension module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality.\n\ud83d\udccf Published: 2025-01-08T02:44:26.370Z\n\ud83d\udccf Modified: 2025-01-08T02:44:26.370Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2025/1/", "creation_timestamp": "2025-01-08T03:40:41.000000Z"}, {"uuid": "87d9767d-306b-475e-9931-25a582623d01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56446", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/631", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56446\n\ud83d\udd39 Description: Vulnerability of variables not being initialized in the notification module\nImpact: Successful exploitation of this vulnerability may affect availability.\n\ud83d\udccf Published: 2025-01-08T03:01:49.820Z\n\ud83d\udccf Modified: 2025-01-08T03:01:49.820Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2025/1/", "creation_timestamp": "2025-01-08T03:40:14.000000Z"}, {"uuid": "0d97a73d-798b-4b86-bf64-391e5e8496d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56442", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/637", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56442\n\ud83d\udd39 Description: Vulnerability of native APIs not being implemented in the NFC service module\nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally.\n\ud83d\udccf Published: 2025-01-08T02:20:03.579Z\n\ud83d\udccf Modified: 2025-01-08T02:20:03.579Z\n\ud83d\udd17 References:\n1. https://consumer.huawei.com/en/support/bulletin/2025/1/", "creation_timestamp": "2025-01-08T03:41:18.000000Z"}, {"uuid": "3216dd84-ab1e-445c-aac1-8d8400d5231c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56448", "type": "seen", "source": "https://t.me/cvedetector/14642", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56448 - Netflix Home Screen Widget Module Access Control Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56448 \nPublished : Jan. 8, 2025, 4:15 a.m. | 29\u00a0minutes ago \nDescription : Vulnerability of improper access control in the home screen widget module  \nImpact: Successful exploitation of this vulnerability may affect availability. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T05:46:49.000000Z"}, {"uuid": "001d479f-1736-4a79-a15b-95be02304e80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56444", "type": "seen", "source": "https://t.me/cvedetector/14627", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56444 - Adobe Creative Cloud Cross-Process Screen Stack UIExtension Confidentiality Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56444 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Cross-process screen stack vulnerability in the UIExtension module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:27.000000Z"}, {"uuid": "717cf36d-d56f-44ea-af40-46eaa300c639", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56443", "type": "seen", "source": "https://t.me/cvedetector/14626", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56443 - Adobe Acrobat UIExtension Cross-Process Screen Stack Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-56443 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Cross-process screen stack vulnerability in the UIExtension module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:27.000000Z"}, {"uuid": "5f2cba7c-f89c-4a6a-93ac-6c87051bb5fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56442", "type": "seen", "source": "https://t.me/cvedetector/14625", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56442 - NFC Service Unauthorized API Use Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56442 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Vulnerability of native APIs not being implemented in the NFC service module  \nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:26.000000Z"}, {"uuid": "c0e81cd8-26a7-4f14-b5e4-c94cadb657f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56441", "type": "seen", "source": "https://t.me/cvedetector/14624", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56441 - Bastet Race Condition Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-56441 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Race condition vulnerability in the Bastet module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 4.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:22.000000Z"}, {"uuid": "75dbe78f-dd14-4ccd-97fa-f212165987b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56440", "type": "seen", "source": "https://t.me/cvedetector/14623", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56440 - FortiGate Network Access Permission Control Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56440 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Permission control vulnerability in the Connectivity module  \nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:22.000000Z"}, {"uuid": "bf7d547e-a175-41c3-9236-b5d1baad2c20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56447", "type": "seen", "source": "https://t.me/cvedetector/14620", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56447 - \"Dell Window Manager Local Privilege Escalation\"\", \n  \"Content\": \"CVE ID : CVE-2024-56447 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Vulnerability of improper permission control in the window management module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:19.000000Z"}, {"uuid": "a46d797e-393d-4e3e-8dfc-80f4110a6aa9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56446", "type": "seen", "source": "https://t.me/cvedetector/14621", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56446 - Citrix Notification Service Uninitialized Variable Remote Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-56446 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Vulnerability of variables not being initialized in the notification module  \nImpact: Successful exploitation of this vulnerability may affect availability. \nSeverity: 4.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:20.000000Z"}, {"uuid": "ec6e1e7e-37e7-4711-9c89-94d0bc5d6193", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5644", "type": "seen", "source": "https://t.me/cvedetector/794", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5644 - The Tournamatch WordPress plugin before 4.6.1 does\", \n  \"Content\": \"CVE ID : CVE-2024-5644 \nPublished : July 13, 2024, 6:15 a.m. | 32\u00a0minutes ago \nDescription : The Tournamatch WordPress plugin before 4.6.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-13T08:49:28.000000Z"}, {"uuid": "7c72976a-d8d7-481d-8954-bcd34ad67523", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56449", "type": "seen", "source": "https://t.me/cvedetector/14643", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56449 - Acquia Drupal Account Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-56449 \nPublished : Jan. 8, 2025, 4:15 a.m. | 29\u00a0minutes ago \nDescription : Privilege escalation vulnerability in the Account module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 6.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T05:46:49.000000Z"}, {"uuid": "52396431-26f7-4e9d-b168-531ec4fa8b04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56445", "type": "seen", "source": "https://t.me/cvedetector/14628", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56445 - Fortinet FortiOS authentication bypass\", \n  \"Content\": \"CVE ID : CVE-2024-56445 \nPublished : Jan. 8, 2025, 3:15 a.m. | 36\u00a0minutes ago \nDescription : Instruction authentication bypass vulnerability in the Findnetwork module  \nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T04:56:28.000000Z"}, {"uuid": "cc7a2cb4-8927-4ee9-99c6-b331a56cbc7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56440", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113790387226346942", "content": "", "creation_timestamp": "2025-01-08T02:31:56.824201Z"}, {"uuid": "cbd27ec7-6761-4ae0-b991-e92dbc9dbde7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56441", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113790446229143005", "content": "", "creation_timestamp": "2025-01-08T02:46:56.811240Z"}, {"uuid": "932290c4-2fca-44bc-bff7-fe434efc41a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56444", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113790493829149479", "content": "", "creation_timestamp": "2025-01-08T02:59:03.095780Z"}, {"uuid": "a972353a-6593-4270-91c3-5135687b2323", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56445", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113790537399868190", "content": "", "creation_timestamp": "2025-01-08T03:10:08.057123Z"}, {"uuid": "bae04417-1a36-4610-9bb8-546c680e1461", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56446", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113790537415632341", "content": "", "creation_timestamp": "2025-01-08T03:10:09.211024Z"}, {"uuid": "64e47aae-f221-458b-89a5-2daff39e78cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56447", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113790537431113615", "content": "", "creation_timestamp": "2025-01-08T03:10:09.686516Z"}, {"uuid": "0ab5cfa5-5e78-4fb4-8920-fd199347ed14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56440", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf775ij5if2i", "content": "", "creation_timestamp": "2025-01-08T03:15:44.184948Z"}, {"uuid": "8be7ae32-0eca-4d0a-9bb4-7f1485621a5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56441", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf775ks32w2x", "content": "", "creation_timestamp": "2025-01-08T03:15:46.484945Z"}, {"uuid": "001347e4-9ec6-4eef-a5a1-1883f125cc23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56442", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf775mxkhx25", "content": "", "creation_timestamp": "2025-01-08T03:15:48.869029Z"}, {"uuid": "75085e9c-1018-47ed-bbd8-e7dfcde73021", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56443", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf775pah552i", "content": "", "creation_timestamp": "2025-01-08T03:15:51.242381Z"}, {"uuid": "1cff7862-4cc1-4660-8760-f42156a232df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56444", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf775rpqnh25", "content": "", "creation_timestamp": "2025-01-08T03:15:53.860872Z"}, {"uuid": "62dae0ed-f997-48c3-b090-0370725b0759", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56445", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf775vkawa2f", "content": "", "creation_timestamp": "2025-01-08T03:15:57.823996Z"}, {"uuid": "b5e24e4f-7cc2-43cc-878f-52bbd5ad7606", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56446", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf775y6nqh25", "content": "", "creation_timestamp": "2025-01-08T03:16:00.542302Z"}, {"uuid": "854e629b-acae-4c48-ae96-650497acd2b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56447", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf7762xt2h22", "content": "", "creation_timestamp": "2025-01-08T03:16:03.628447Z"}, {"uuid": "43e89cc5-b8ec-4336-9275-4662e1811e65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56440", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf7bapleiv2g", "content": "", "creation_timestamp": "2025-01-08T03:53:20.183972Z"}, {"uuid": "a98cd0ee-6a7a-4d79-8954-433b2843da79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56441", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf7bapyvup2q", "content": "", "creation_timestamp": "2025-01-08T03:53:22.312184Z"}, {"uuid": "a691937c-8d8e-4bac-8fb0-98a0200be06f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56447", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf7baq7qgp2k", "content": "", "creation_timestamp": "2025-01-08T03:53:23.380896Z"}, {"uuid": "6eafe7a7-c0dd-4742-be1b-31d09d966229", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56443", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf7baqqksc2q", "content": "", "creation_timestamp": "2025-01-08T03:53:25.878542Z"}, {"uuid": "afee2eed-5b36-4ae6-ae10-df1ee7ca5584", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56445", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf7baqu2z72q", "content": "", "creation_timestamp": "2025-01-08T03:53:26.377479Z"}, {"uuid": "042133d4-7312-43a4-8366-f9af84b86306", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56444", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf7baqxfhh2q", "content": "", "creation_timestamp": "2025-01-08T03:53:26.856322Z"}, {"uuid": "6933f45e-0d9c-4fb4-b72a-ef9acae2edf6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56442", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf7bar3rjs2h", "content": "", "creation_timestamp": "2025-01-08T03:53:27.407912Z"}, {"uuid": "22d66b13-0e26-4fff-9196-e1138c226fdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56448", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf7cj7avrt25", "content": "", "creation_timestamp": "2025-01-08T04:15:58.444943Z"}, {"uuid": "2e2cc097-354c-4ebe-80ff-53264608b9e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56449", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf7cjbtneh2e", "content": "", "creation_timestamp": "2025-01-08T04:16:01.229731Z"}, {"uuid": "08577259-778c-4481-96a0-f50153b8e562", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56449", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf7h4nkdzg2w", "content": "", "creation_timestamp": "2025-01-08T05:38:26.872487Z"}, {"uuid": "a42f61c0-0e3a-47a0-b9af-17c502e9307f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56448", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf7h4o6sh42e", "content": "", "creation_timestamp": "2025-01-08T05:38:29.394151Z"}]}