{"uuid": "e0c32cf7-c7c0-4e71-847d-a1e15ab9551c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1708", "type": "seen", "source": "https://bsky.app/profile/solomonneas.dev/post/3mks3jnjh7x2p", "content": "Cyber watch:\n\ud83d\udd34 Gemini CLI host RCE in agent workflows: patch CLI/action, audit tokens.\n\ud83d\udd34 ScreenConnect CVE-2024-1708 in KEV: patch exposed remote-access servers, hunt for compromise.\n\ud83d\udfe1 Mini Shai-Hulud hits npm/PyPI/PHP: rotate dev secrets.\nsolomonneas.dev/intel", "creation_timestamp": "2026-05-01T12:03:43.238586Z"}