{"vulnerability": "CVE-2024-2615", "sightings": [{"uuid": "b6d104e3-ab3c-4cc0-b5f7-44264a1d7dd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26154", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113844607873828913", "content": "", "creation_timestamp": "2025-01-17T16:20:57.953029Z"}, {"uuid": "7097d2c4-147e-4a44-94bb-33d363d38024", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26155", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113844607889168893", "content": "", "creation_timestamp": "2025-01-17T16:20:58.046899Z"}, {"uuid": "2cc9390a-01fb-4cfa-9a6f-50e44ce35c1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26156", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113844607903869018", "content": "", "creation_timestamp": "2025-01-17T16:20:58.461490Z"}, {"uuid": "14e933bd-10a2-4671-a4fd-fa8ee11cc2ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26157", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113844607918836790", "content": "", "creation_timestamp": "2025-01-17T16:20:58.630455Z"}, {"uuid": "1f77cd7b-2611-4084-ba6c-86e698b8c83f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26153", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfxcbp3fk72r", "content": "", "creation_timestamp": "2025-01-17T17:15:40.376845Z"}, {"uuid": "1d3270c2-5664-4e70-9c08-3eb07272dff1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26154", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfxcbrona22t", "content": "", "creation_timestamp": "2025-01-17T17:15:43.055459Z"}, {"uuid": "608ee187-66b7-4037-92d4-9d38c1d2d430", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26155", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfxcbuobtm2t", "content": "", "creation_timestamp": "2025-01-17T17:15:46.143975Z"}, {"uuid": "ef032981-6ca7-4526-9961-65ffff051f29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26156", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfxcbx5ioq2f", "content": "", "creation_timestamp": "2025-01-17T17:15:48.940781Z"}, {"uuid": "1cc663ec-5832-4486-9ed7-24885dceaf6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26157", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfxcc2gt2j2n", "content": "", "creation_timestamp": "2025-01-17T17:15:52.115768Z"}, {"uuid": "f46d7a29-6aeb-44ca-902f-c311e28fa043", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26154", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfxgxnrn462k", "content": "", "creation_timestamp": "2025-01-17T18:39:32.188916Z"}, {"uuid": "a0cb9e4d-1675-484f-bf45-a7cfed7b95da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26155", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfxgxo3x6o2k", "content": "", "creation_timestamp": "2025-01-17T18:39:32.907476Z"}, {"uuid": "1c5a9771-264e-4b4b-a7ff-013d72809659", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26157", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfxgxoabew2h", "content": "", "creation_timestamp": "2025-01-17T18:39:33.520500Z"}, {"uuid": "9d86b51e-4a9d-4daa-a3a9-e0a06158bc7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26156", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfxgxp3gf425", "content": "", "creation_timestamp": "2025-01-17T18:39:37.690480Z"}, {"uuid": "2f94812b-ad1d-4e06-80ac-d359b7b5f361", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26153", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfxgxpgbdq2u", "content": "", "creation_timestamp": "2025-01-17T18:39:39.453987Z"}, {"uuid": "bed5b837-4f35-4aaf-8169-eba2aa2e0945", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26155", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2159", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-26155\n\ud83d\udd39 Description: All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 \nexpose clear text credentials in the web portal. An attacker can access \nthe ETIC RAS web portal and view the HTML code, which is configured to \nbe hidden, thus allowing a connection to the ETIC RAS ssh server, which \ncould enable an attacker to perform actions on the device.\n\ud83d\udccf Published: 2025-01-17T16:19:37.430Z\n\ud83d\udccf Modified: 2025-01-17T16:19:37.430Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01", "creation_timestamp": "2025-01-17T16:57:00.000000Z"}, {"uuid": "00d042c4-fe5c-4909-8b16-d0bc8ea7fc25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26153", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2158", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-26153\n\ud83d\udd39 Description: All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.9.19 \nare vulnerable to cross-site request forgery (CSRF). An external \nattacker with no access to the device can force the end user into \nsubmitting a \"setconf\" method request, not requiring any CSRF token, \nwhich can lead into denial of service on the device.\n\ud83d\udccf Published: 2025-01-17T16:23:10.357Z\n\ud83d\udccf Modified: 2025-01-17T16:23:10.357Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01", "creation_timestamp": "2025-01-17T16:56:59.000000Z"}, {"uuid": "5af42887-8886-4d3c-8a5c-125a6664bd31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26156", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2163", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-26156\n\ud83d\udd39 Description: All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 \nare vulnerable to reflected cross site scripting (XSS) attacks in the \nmethod parameter. The ETIC RAS web server uses dynamic pages that gets \ntheir input from the client side and reflects the input in its response \nto the client.\n\ud83d\udccf Published: 2025-01-17T16:12:26.288Z\n\ud83d\udccf Modified: 2025-01-17T16:12:26.288Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01", "creation_timestamp": "2025-01-17T16:57:03.000000Z"}, {"uuid": "b97c2a94-2ca5-48f5-a6d9-5d447949b8ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26157", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2162", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-26157\n\ud83d\udd39 Description: All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 \nare vulnerable to reflected cross site scripting (XSS) attacks in get \nview method under view parameter. The ETIC RAS web server uses dynamic \npages that get their input from the client side and reflect the input in\n their response to the client.\n\ud83d\udccf Published: 2025-01-17T16:14:43.418Z\n\ud83d\udccf Modified: 2025-01-17T16:14:43.418Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01", "creation_timestamp": "2025-01-17T16:57:02.000000Z"}, {"uuid": "837c3410-ab21-4594-9d25-2e115411b6bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26154", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2161", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-26154\n\ud83d\udd39 Description: All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 \nare vulnerable to reflected cross site scripting in the appliance site \nname. The ETIC RAS web server saves the site name and then presents it \nto the administrators in a few different pages.\n\ud83d\udccf Published: 2025-01-17T16:17:10.899Z\n\ud83d\udccf Modified: 2025-01-17T16:17:10.899Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01", "creation_timestamp": "2025-01-17T16:57:02.000000Z"}, {"uuid": "aa77c66b-2ba9-4324-ad87-1ee41e584fee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26153", "type": "seen", "source": "https://t.me/cvedetector/15718", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-26153 - ETIC Telecom Remote Access Server CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-26153 \nPublished : Jan. 17, 2025, 5:15 p.m. | 44\u00a0minutes ago \nDescription : All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.9.19   \nare vulnerable to cross-site request forgery (CSRF). An external   \nattacker with no access to the device can force the end user into   \nsubmitting a \"setconf\" method request, not requiring any CSRF token,   \nwhich can lead into denial of service on the device. \nSeverity: 7.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T19:18:12.000000Z"}, {"uuid": "f5614df0-34d1-42d8-9266-d07f1d52dbd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26157", "type": "seen", "source": "https://t.me/cvedetector/15716", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-26157 - ETIC Telecom RAS Reflected Cross Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-26157 \nPublished : Jan. 17, 2025, 5:15 p.m. | 44\u00a0minutes ago \nDescription : All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0   \nare vulnerable to reflected cross site scripting (XSS) attacks in get   \nview method under view parameter. The ETIC RAS web server uses dynamic   \npages that get their input from the client side and reflect the input in  \n their response to the client. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T19:18:10.000000Z"}, {"uuid": "3e0a6711-2f76-4cf7-8721-d09795d8b19f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26156", "type": "seen", "source": "https://t.me/cvedetector/15715", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-26156 - \"ETIC Telecom RAS Reflected Cross-Site Scripting Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-26156 \nPublished : Jan. 17, 2025, 5:15 p.m. | 44\u00a0minutes ago \nDescription : All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0   \nare vulnerable to reflected cross site scripting (XSS) attacks in the   \nmethod parameter. The ETIC RAS web server uses dynamic pages that gets   \ntheir input from the client side and reflects the input in its response   \nto the client. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T19:18:06.000000Z"}, {"uuid": "7ca9901c-138d-4c3e-97c1-875f54526514", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26155", "type": "seen", "source": "https://t.me/cvedetector/15714", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-26155 - ETIC Telecom RAS Clear Text Credentials Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-26155 \nPublished : Jan. 17, 2025, 5:15 p.m. | 44\u00a0minutes ago \nDescription : All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0   \nexpose clear text credentials in the web portal. An attacker can access   \nthe ETIC RAS web portal and view the HTML code, which is configured to   \nbe hidden, thus allowing a connection to the ETIC RAS ssh server, which   \ncould enable an attacker to perform actions on the device. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T19:18:06.000000Z"}, {"uuid": "70277553-d737-4f6c-8e6e-5f797fda87c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26154", "type": "seen", "source": "https://t.me/cvedetector/15713", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-26154 - ETIC Telecom RAS Cross Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-26154 \nPublished : Jan. 17, 2025, 5:15 p.m. | 44\u00a0minutes ago \nDescription : All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0   \nare vulnerable to reflected cross site scripting in the appliance site   \nname. The ETIC RAS web server saves the site name and then presents it   \nto the administrators in a few different pages. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T19:18:05.000000Z"}, {"uuid": "2c65a40e-f090-4bfc-bbc6-4a6309e74210", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26151", "type": "seen", "source": "https://t.me/ctinow/206767", "content": "https://ift.tt/68qn37m\nCVE-2024-26151 | FelixSchwarz mjml-python 0.10.0 input validation", "creation_timestamp": "2024-03-13T15:17:11.000000Z"}, {"uuid": "a3d2e1a0-1464-451d-a76c-d40bbf14a4bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2615", "type": "seen", "source": "https://t.me/ctinow/211476", "content": "https://ift.tt/wPac4gX\nCVE-2024-2615", "creation_timestamp": "2024-03-19T13:31:36.000000Z"}, {"uuid": "fd5ec696-c6e6-4827-95c4-8f3c289acfa7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26159", "type": "seen", "source": "https://t.me/ctinow/206062", "content": "https://ift.tt/iat1yAV\nCVE-2024-26159 | Microsoft Windows up to Server 2022 23H2 ODBC Driver Remote Code Execution", "creation_timestamp": "2024-03-12T19:52:23.000000Z"}, {"uuid": "cb810396-5071-4fcb-a07b-85043201e9bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2615", "type": "seen", "source": "https://t.me/ctinow/211457", "content": "https://ift.tt/wPac4gX\nCVE-2024-2615", "creation_timestamp": "2024-03-19T13:27:00.000000Z"}, {"uuid": "b7cbc28a-2379-41aa-9e39-8ed51f83e930", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26151", "type": "seen", "source": "https://t.me/ctinow/191122", "content": "https://ift.tt/xzsckVp\nCVE-2024-26151", "creation_timestamp": "2024-02-22T20:26:34.000000Z"}, {"uuid": "4f41a4e8-6a13-4a84-b8ca-eb1c59ff5c7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26152", "type": "seen", "source": "https://t.me/ctinow/191277", "content": "https://ift.tt/gkh6ObT\nCVE-2024-26152", "creation_timestamp": "2024-02-22T23:26:40.000000Z"}, {"uuid": "acc3058a-fad0-41e1-b704-bb5a30797d4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26152", "type": "seen", "source": "https://t.me/ctinow/191274", "content": "https://ift.tt/gkh6ObT\nCVE-2024-26152", "creation_timestamp": "2024-02-22T23:26:35.000000Z"}, {"uuid": "da570560-dad4-4d93-b756-c0f49f4005c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26151", "type": "seen", "source": "https://t.me/ctinow/191128", "content": "https://ift.tt/xzsckVp\nCVE-2024-26151", "creation_timestamp": "2024-02-22T20:26:43.000000Z"}, {"uuid": "827f856a-e1a5-4799-b3ae-acaa4f59cf2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26150", "type": "seen", "source": "https://t.me/ctinow/191956", "content": "https://ift.tt/KaW0Nvj\nCVE-2024-26150", "creation_timestamp": "2024-02-23T17:26:50.000000Z"}, {"uuid": "e2583dd4-f439-4ead-9de4-1cb38ba3ba6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26150", "type": "seen", "source": "https://t.me/ctinow/191947", "content": "https://ift.tt/KaW0Nvj\nCVE-2024-26150", "creation_timestamp": "2024-02-23T17:26:41.000000Z"}]}