{"vulnerability": "CVE-2024-5261", "sightings": [{"uuid": "23897e75-c7df-49ef-9a7e-79c3cdf0c3f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52613", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113483800448351365", "content": "", "creation_timestamp": "2024-11-14T23:02:53.676878Z"}, {"uuid": "4951ba0a-7e09-4b3f-b82a-eca8023ad29c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52616", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113522903838141203", "content": "", "creation_timestamp": "2024-11-21T20:47:23.905018Z"}, {"uuid": "7217a55b-9ba2-4259-ae3f-55796d9026c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52615", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113522877614306544", "content": "", "creation_timestamp": "2024-11-21T20:40:43.703603Z"}, {"uuid": "1115748d-78cf-4906-9f5f-df4feaf96aa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52616", "type": "seen", "source": "https://bsky.app/profile/nixpkgssecuritychanges.gerbet.me/post/3ldzuuk6cwf25", "content": "", "creation_timestamp": "2024-12-24T07:03:16.859811Z"}, {"uuid": "e82f77fc-bafe-477a-9c9b-7d1ca9e53fb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52616", "type": "seen", "source": "https://bsky.app/profile/nixpkgssecuritychanges.gerbet.me/post/3lembbxfm6p2v", "content": "", "creation_timestamp": "2024-12-31T14:33:27.268841Z"}, {"uuid": "77031526-cb82-49ec-9382-0d62c309e304", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52611", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113984069900283060", "content": "", "creation_timestamp": "2025-02-11T07:27:59.681350Z"}, {"uuid": "cb0e678d-71aa-4216-95e9-1f25359b3f27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52612", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113984069914875660", "content": "", "creation_timestamp": "2025-02-11T07:27:59.955245Z"}, {"uuid": "40e63af8-308e-45c1-83a2-dbc643266c14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52611", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhv7rqoj3u2o", "content": "", "creation_timestamp": "2025-02-11T08:16:01.382428Z"}, {"uuid": "240d07d8-b31e-4fb2-803f-0a1e37aa363c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52612", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhv7rt6hlm22", "content": "", "creation_timestamp": "2025-02-11T08:16:03.982824Z"}, {"uuid": "eec2c8fd-f664-4e73-b3f5-651db5fa4f3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-5261", "type": "seen", "source": "https://mastodon.social/users/bagder/statuses/113984646246260950", "content": "", "creation_timestamp": "2025-02-11T09:54:37.066650Z"}, {"uuid": "6de72384-c623-4e70-bd38-1040c4e29bab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-5261", "type": "seen", "source": "https://bsky.app/profile/bagder.mastodon.social.ap.brid.gy/post/3lhvfc2enwhl2", "content": "", "creation_timestamp": "2025-02-11T10:04:50.326511Z"}, {"uuid": "e5af128e-e793-48e7-9639-effe6bbe07c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52611", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhvnfvrtyz23", "content": "", "creation_timestamp": "2025-02-11T12:19:57.989080Z"}, {"uuid": "c1d6b095-abe1-4093-99eb-9dffc0caa166", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52612", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhvnfvv3kw2b", "content": "", "creation_timestamp": "2025-02-11T12:19:58.545528Z"}, {"uuid": "7a8139c4-b076-4f74-980c-258b6a339889", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52611", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113985737180283491", "content": "", "creation_timestamp": "2025-02-11T14:32:01.431174Z"}, {"uuid": "511f158d-4756-4bdd-9149-4c6a987a50f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52615", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lz7rkofj6k2q", "content": "", "creation_timestamp": "2025-09-19T21:09:08.810361Z"}, {"uuid": "61f4c902-4258-423a-929a-4b473e3d16a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5261", "type": "seen", "source": "https://daniel.haxx.se/blog/2025/02/11/disabling-cert-checks-we-have-not-learned-much/", "content": "", "creation_timestamp": "2025-02-11T14:00:07.000000Z"}, {"uuid": "0bcb780d-db8a-48e9-be0e-fc2104bb5085", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-5261", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/26561a4f-d892-4f81-a2d1-231d4980d359", "content": "", "creation_timestamp": "2025-02-12T06:35:44.808978Z"}, {"uuid": "8e82e30a-165c-4220-a110-de976491241f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52615", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3mchisoor4c2g", "content": "", "creation_timestamp": "2026-01-15T11:40:41.446554Z"}, {"uuid": "fa9b63b3-3660-4ad5-bc63-7d11aae864c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52612", "type": "seen", "source": "https://t.me/cvedetector/17679", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52612 - SolarWinds Platform Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-52612 \nPublished : Feb. 11, 2025, 8:15 a.m. | 1\u00a0hour, 51\u00a0minutes ago \nDescription : SolarWinds Platform is vulnerable to a reflected cross-site scripting vulnerability. This was caused by an insufficient sanitation of input parameters. This vulnerability requires authentication by a high- privileged account to be exploitable. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T11:29:54.000000Z"}, {"uuid": "e390269d-88f4-46f3-9c2f-29479c31444c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5261", "type": "seen", "source": "https://t.me/itsec_news/4521", "content": "\u200b\u26a1\ufe0f\u0424\u0451\u0434\u043e\u0440 \u0418\u043d\u0434\u0443\u0442\u043d\u044b\u0439: \u043b\u043e\u0436\u043d\u044b\u0435 CVE \u0440\u0430\u0437\u0440\u0443\u0448\u0430\u044e\u0442 open-source \u043f\u0440\u043e\u0435\u043a\u0442\u044b\n\n\ud83d\udcac\u0424\u0451\u0434\u043e\u0440 \u0418\u043d\u0434\u0443\u0442\u043d\u044b\u0439, \u0430\u0432\u0442\u043e\u0440 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b Io.js (\u0444\u043e\u0440\u043a Node.js) \u0438 \u0447\u043b\u0435\u043d \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u043a\u043e\u043c\u0438\u0442\u0435\u0442\u0430 \u043f\u043e \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0435 Node.js, \u043f\u043e\u0434\u043d\u044f\u043b \u0432\u043e\u043f\u0440\u043e\u0441 \u043e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0435 \u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u0438\u044f CVE-\u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u043e\u0432 \u0434\u043b\u044f \u043b\u043e\u0436\u043d\u044b\u0445 \u043e\u0442\u0447\u0435\u0442\u043e\u0432 \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043d\u0435 \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0442 \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u0439 \u0443\u0433\u0440\u043e\u0437\u0435 \u0438\u043b\u0438 \u0443\u0440\u043e\u0432\u043d\u044e \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\n\u0418\u043d\u0434\u0443\u0442\u043d\u044b\u0439 \u043e\u0431\u0440\u0430\u0442\u0438\u043b \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435 \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e CVE-\u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u043f\u0440\u0438\u0441\u0432\u0430\u0438\u0432\u0430\u044e\u0442\u0441\u044f \u0431\u0435\u0437 \u0434\u043e\u043b\u0436\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0438 \u0431\u0435\u0437 \u043a\u043e\u043d\u0441\u0443\u043b\u044c\u0442\u0430\u0446\u0438\u0438 \u0441 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0430\u043c\u0438, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u044b\u0434\u0430\u0432\u0430\u0442\u044c \u043d\u0435\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 \u0437\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n\n\u041b\u043e\u0436\u043d\u044b\u0435 CVE-\u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u043d\u0430\u043d\u043e\u0441\u044f\u0442 \u0443\u0449\u0435\u0440\u0431 \u0440\u0435\u043f\u0443\u0442\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0435\u043a\u0442\u043e\u0432 \u0438 \u0441\u043e\u0437\u0434\u0430\u044e\u0442 \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u0443\u044e \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0443 \u043d\u0430 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0432\u044b\u043d\u0443\u0436\u0434\u0435\u043d\u044b \u0440\u0430\u0437\u0431\u0438\u0440\u0430\u0442\u044c\u0441\u044f \u0441 \u043c\u043d\u043e\u0433\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u043c\u0438 \u0437\u0430\u043f\u0440\u043e\u0441\u0430\u043c\u0438 \u0438 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f\u043c\u0438, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u043c\u0438 \u0441 \u0442\u0430\u043a\u0438\u043c\u0438 CVE. \u041e\u0441\u043e\u0431\u0435\u043d\u043d\u043e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u0442\u0438\u0447\u043d\u043e \u0442\u043e, \u0447\u0442\u043e \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u043d\u0435 \u043c\u043e\u0433\u0443\u0442 \u043e\u0441\u043f\u043e\u0440\u0438\u0442\u044c \u043f\u0440\u0438\u0441\u0432\u043e\u0435\u043d\u043d\u044b\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438\u043b\u0438 \u0434\u043e\u0431\u0438\u0442\u044c\u0441\u044f \u043e\u0442\u043c\u0435\u043d\u044b CVE.\n\n\u041a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u044b\u0439 \u0441\u043b\u0443\u0447\u0430\u0439, \u043e\u043f\u0438\u0441\u0430\u043d\u043d\u044b\u0439 \u0418\u043d\u0434\u0443\u0442\u043d\u044b\u043c, \u043a\u0430\u0441\u0430\u0435\u0442\u0441\u044f \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 node-ip \u0434\u043b\u044f Node.js, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0434\u043e \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438 \u043e\u0442\u0447\u0435\u0442\u0430 \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u043b\u0430\u0441\u044c \u043f\u0440\u0438\u043c\u0435\u0440\u043d\u043e 30 \u043c\u0438\u043b\u043b\u0438\u043e\u043d\u043e\u0432 \u0440\u0430\u0437 \u0432 \u043d\u0435\u0434\u0435\u043b\u044e, \u043d\u043e \u043f\u043e\u0441\u043b\u0435 \u044d\u0442\u043e\u0433\u043e \u0437\u0430 5 \u043c\u0435\u0441\u044f\u0446\u0435\u0432 \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u043e \u0437\u0430\u0433\u0440\u0443\u0437\u043e\u043a \u0441\u043e\u043a\u0440\u0430\u0442\u0438\u043b\u043e\u0441\u044c \u0434\u043e 17 \u043c\u0438\u043b\u043b\u0438\u043e\u043d\u043e\u0432 \u0432 \u043d\u0435\u0434\u0435\u043b\u044e. \u041f\u0440\u0435\u0434\u043f\u043e\u043b\u0430\u0433\u0430\u0435\u0442\u0441\u044f, \u0447\u0442\u043e \u043e\u0442\u0447\u0435\u0442 \u043e \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0432\u043b\u0438\u044f\u043b \u043d\u0430 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u0441\u0442\u044c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438.\n\nNode-ip \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0432 \u0431\u043e\u043b\u0435\u0435 \u0447\u0435\u043c 3500 \u043f\u0440\u043e\u0435\u043a\u0442\u0430\u0445, \u0438 \u0438\u0437-\u0437\u0430 \u043b\u043e\u0436\u043d\u043e\u0433\u043e CVE \u043f\u0440\u0438 \u0441\u0431\u043e\u0440\u043a\u0435 \u043f\u0440\u043e\u0435\u043a\u0442\u043e\u0432 \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u0435\u0442 \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u0435 \u043f\u0440\u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0438 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u00abnpm audit\u00bb. \u041f\u043e\u0442\u043e\u043a \u0436\u0430\u043b\u043e\u0431 \u0438 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439 \u043f\u0440\u0438\u0432\u0435\u043b \u043a \u0442\u043e\u043c\u0443, \u0447\u0442\u043e \u043f\u043e\u0441\u043b\u0435 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u043c\u0435\u0441\u044f\u0446\u0435\u0432 \u043f\u043e\u043f\u044b\u0442\u043e\u043a \u0441\u043d\u0438\u0437\u0438\u0442\u044c \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432 CVE, \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a node-ip \u043f\u0435\u0440\u0435\u0432\u0435\u043b \u043f\u0440\u043e\u0435\u043a\u0442 \u0432 \u0430\u0440\u0445\u0438\u0432\u043d\u044b\u0439 \u0440\u0435\u0436\u0438\u043c. \u0427\u0435\u0440\u0435\u0437 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0434\u043d\u0435\u0439 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0439 \u0431\u044b\u043b \u0432\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d.\n\n\u041e\u0442\u0447\u0435\u0442 \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2023-42282 \u0431\u044b\u043b \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d \u0432 \u043d\u0430\u0447\u0430\u043b\u0435 \u0444\u0435\u0432\u0440\u0430\u043b\u044f, \u0445\u043e\u0442\u044f \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c, \u0432\u044b\u044f\u0432\u0438\u0432\u0448\u0438\u0439 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443, \u043f\u044b\u0442\u0430\u043b\u0441\u044f \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0432\u043e\u0437\u043d\u0430\u0433\u0440\u0430\u0436\u0434\u0435\u043d\u0438\u0435 \u043d\u0430 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0435 Huntr \u0441 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430. \u0412 \u043e\u0442\u0447\u0435\u0442\u0435 \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0430\u0435\u0442\u0441\u044f, \u0447\u0442\u043e Huntr \u0431\u043e\u043b\u0435\u0435 \u0433\u043e\u0434\u0430 \u043f\u044b\u0442\u0430\u043b\u0438\u0441\u044c \u0441\u0432\u044f\u0437\u0430\u0442\u044c\u0441\u044f \u0441 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0430\u043c\u0438 node-ip \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b, \u0438 \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043e\u0441\u043b\u0435 \u044d\u0442\u043e\u0433\u043e \u0440\u0430\u0441\u043a\u0440\u044b\u043b\u0438 \u0434\u0435\u0442\u0430\u043b\u0438 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e.\n\n\u0421\u0443\u0442\u044c \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0437\u0430\u043a\u043b\u044e\u0447\u0430\u043b\u0430\u0441\u044c \u0432 \u0442\u043e\u043c, \u0447\u0442\u043e \u0444\u0443\u043d\u043a\u0446\u0438\u0438 isPublic() \u0438 isPrivate() \u043e\u0431\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u044e\u0442 \u0442\u043e\u043b\u044c\u043a\u043e \u043a\u0430\u043d\u043e\u043d\u0438\u0447\u0435\u0441\u043a\u043e\u0435 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u0438\u0435 IP-\u0430\u0434\u0440\u0435\u0441\u043e\u0432, \u0447\u0442\u043e \u043c\u043e\u0433\u043b\u043e \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u044b\u043c \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0430\u043c \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u043f\u0440\u0438 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0435 \u0430\u0434\u0440\u0435\u0441\u043e\u0432 \u0432 \u043d\u0435\u0442\u0438\u043f\u0438\u0447\u043d\u044b\u0445 \u0444\u043e\u0440\u043c\u0430\u0442\u0430\u0445. \u0423\u0442\u0432\u0435\u0440\u0436\u0434\u0430\u043b\u043e\u0441\u044c, \u0447\u0442\u043e \u043e\u0448\u0438\u0431\u043a\u0430 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0434\u043b\u044f \u043e\u0431\u0445\u043e\u0434\u0430 SSRF-\u0437\u0430\u0449\u0438\u0442\u044b \u0438 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c. \u0412 CVE \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (9.8 \u0438\u0437 10), \u0430 \u0432 \u043e\u0442\u0447\u0435\u0442\u0435 \u043d\u0430 GitHub \u0435\u0451 \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0438, \u043a\u0430\u043a \u043e\u043f\u0430\u0441\u043d\u0443\u044e.\n\n\u0410\u0432\u0442\u043e\u0440 node-ip \u0432\u044b\u0440\u0430\u0437\u0438\u043b \u043d\u0435\u0441\u043e\u0433\u043b\u0430\u0441\u0438\u0435 \u0441 \u043e\u0446\u0435\u043d\u043a\u043e\u0439 \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0443\u043a\u0430\u0437\u0430\u0432, \u0447\u0442\u043e \u0434\u043b\u044f \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0439 \u0430\u0442\u0430\u043a\u0438 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043f\u0435\u0440\u0435\u0434\u0430\u0442\u044c \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435 \u0432 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 isPublic() \u0438 isPrivate(). \u041e\u0431\u044b\u0447\u043d\u043e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 IP-\u0430\u0434\u0440\u0435\u0441\u0435 \u043a\u043b\u0438\u0435\u043d\u0442\u0430 \u043f\u043e\u043b\u0443\u0447\u0430\u0435\u0442\u0441\u044f \u0438\u0437 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0445 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0438\u043b\u0438 \u043f\u0435\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u0445 \u043e\u043a\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0432\u0435\u0431-\u0441\u0435\u0440\u0432\u0435\u0440\u0430, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0432\u044b\u0434\u0430\u044e\u0442 \u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u044b\u0435 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u044f.\n\n\u0414\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0432 \u0441\u0435\u0440\u0435\u0434\u0438\u043d\u0435 \u0444\u0435\u0432\u0440\u0430\u043b\u044f \u0431\u044b\u043b\u0438 \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u044b \u0432\u0435\u0440\u0441\u0438\u0438 node-ip 1.1.9 \u0438 2.0.1 \u0441 \u0434\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u043c\u0438 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430\u043c\u0438 \u0434\u043b\u044f \u043d\u0435\u0442\u0438\u043f\u0438\u0447\u043d\u044b\u0445 \u0444\u043e\u0440\u043c \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u0438\u044f IP-\u0430\u0434\u0440\u0435\u0441\u043e\u0432. \u041e\u0434\u043d\u0430\u043a\u043e \u043f\u043e\u0442\u043e\u043a \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 \u0438 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u043d\u0435 \u043f\u0440\u0435\u043a\u0440\u0430\u0442\u0438\u043b\u0441\u044f. \u0412 \u0431\u0430\u0437\u0435 \u0434\u0430\u043d\u043d\u044b\u0445 MITRE \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u043e \u0441\u0438\u0445 \u043f\u043e\u0440 \u043e\u0442\u043c\u0435\u0447\u0435\u043d\u0430 \u043a\u0430\u043a \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f, \u043d\u043e \u0432 \u0431\u0430\u0437\u0435 \u0434\u0430\u043d\u043d\u044b\u0445 GitHub Advisory Database \u0435\u0451 \u0443\u0434\u0430\u043b\u043e\u0441\u044c \u043f\u043e\u043d\u0438\u0437\u0438\u0442\u044c \u0434\u043e \u043c\u0438\u043d\u0438\u043c\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0443\u0440\u043e\u0432\u043d\u044f \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\n\u041f\u0440\u0438\u043c\u0435\u0440\u043e\u043c \u0434\u0440\u0443\u0433\u043e\u0433\u043e \u043e\u0442\u0447\u0435\u0442\u0430 \u0441 \u0437\u0430\u0432\u044b\u0448\u0435\u043d\u043d\u044b\u043c \u0443\u0440\u043e\u0432\u043d\u0435\u043c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 LibreOffice 24.2.4 CVE-2024-5261 , \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (10 \u0438\u0437 10). \u041d\u0435\u0434\u0430\u0432\u043d\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0430\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u043b\u0430 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0443 LibreOfficeKit, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u0443\u044e \u0434\u043b\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0444\u0443\u043d\u043a\u0446\u0438\u044f\u043c LibreOffice \u0438\u0437 \u0432\u043d\u0435\u0448\u043d\u0438\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u043a\u043b\u044e\u0447\u0430\u043b\u0430\u0441\u044c \u0432 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438 libCurl (CURLOPT_SSL_VERIFYPEER=0), \u043e\u0442\u043a\u043b\u044e\u0447\u0430\u044e\u0449\u0435\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0432 \u043f\u0440\u0438 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 \u043f\u043e HTTPS.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2024-07-02T15:55:26.000000Z"}, {"uuid": "747a1144-f69e-4209-bdc7-3a7f7d971214", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52611", "type": "seen", "source": "https://t.me/cvedetector/17678", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52611 - SolarWinds Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52611 \nPublished : Feb. 11, 2025, 8:15 a.m. | 1\u00a0hour, 51\u00a0minutes ago \nDescription : The SolarWinds Platform is vulnerable to an information disclosure vulnerability through an error message. While the data does not provide anything sensitive, the information could assist an attacker in other malicious actions. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T11:29:53.000000Z"}, {"uuid": "848377bc-8127-4e1f-a775-c384102faccd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52615", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/269", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52615\n\ud83d\udd39 Description: A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.\n\ud83d\udccf Published: 2024-11-21T20:34:00.981Z\n\ud83d\udccf Modified: 2025-01-06T22:02:09.214Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2024-52615\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2326418", "creation_timestamp": "2025-01-06T22:38:03.000000Z"}, {"uuid": "b173261f-24fa-4283-9388-e9714a2184e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52616", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7266", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52616\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.\n\ud83d\udccf Published: 2024-11-21T20:41:11.636Z\n\ud83d\udccf Modified: 2025-03-12T04:13:23.818Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2024-52616\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2326429", "creation_timestamp": "2025-03-12T04:42:53.000000Z"}, {"uuid": "c5887968-cebd-48f0-b7d1-658e3fcb257d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52612", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4776", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52612\n\ud83d\udd25 CVSS Score: 6.8 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: SolarWinds Platform is vulnerable to a reflected cross-site scripting vulnerability. This was caused by an insufficient sanitation of input parameters. This vulnerability requires authentication by a high- privileged account to be exploitable.\n\ud83d\udccf Published: 2025-02-11T07:21:17.835Z\n\ud83d\udccf Modified: 2025-02-19T04:55:13.422Z\n\ud83d\udd17 References:\n1. https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2025-1_release_notes.htm\n2. https://www.solarwinds.com/trust-center/security-advisories/cve-2024-52612", "creation_timestamp": "2025-02-19T08:39:13.000000Z"}, {"uuid": "d917ac73-bec4-422c-918c-2e8abde388ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52616", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/268", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52616\n\ud83d\udd39 Description: A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.\n\ud83d\udccf Published: 2024-11-21T20:41:11.636Z\n\ud83d\udccf Modified: 2025-01-06T22:02:15.719Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2024-52616\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2326429", "creation_timestamp": "2025-01-06T22:37:53.000000Z"}, {"uuid": "060b33f7-600e-4464-980e-a16edb77fcab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52612", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3972", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52612\n\ud83d\udd25 CVSS Score: 6.8 (CVSS_V3)\n\ud83d\udd39 Description: SolarWinds Platform is vulnerable to a reflected cross-site scripting vulnerability. This was caused by an insufficient sanitation of input parameters. This vulnerability requires authentication by a high- privileged account to be exploitable.\n\ud83d\udccf Published: 2025-02-11T09:30:33Z\n\ud83d\udccf Modified: 2025-02-12T00:32:16Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-52612\n2. https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2025-1_release_notes.htm\n3. https://www.solarwinds.com/trust-center/security-advisories/cve-2024-52612", "creation_timestamp": "2025-02-12T01:11:12.000000Z"}, {"uuid": "e89bfcb5-ccde-4f21-b9a8-149d03cd5c8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52613", "type": "seen", "source": "https://t.me/cvedetector/11034", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52613 - tsMuxer Buffer Under-Read DoS\", \n  \"Content\": \"CVE ID : CVE-2024-52613 \nPublished : Nov. 14, 2024, 11:15 p.m. | 38\u00a0minutes ago \nDescription : A heap-based buffer under-read in tsMuxer version nightly-2024-05-12-02-01-18 allows attackers to cause Denial of Service (DoS) via a crafted MOV video file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T01:02:03.000000Z"}, {"uuid": "b741ef45-2706-440e-9fb4-5acbca768428", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52616", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16274", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52616\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.\n\ud83d\udccf Published: 2024-11-21T20:41:11.636Z\n\ud83d\udccf Modified: 2025-05-13T23:50:12.711Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2025:7437\n2. https://access.redhat.com/security/cve/CVE-2024-52616\n3. https://bugzilla.redhat.com/show_bug.cgi?id=2326429", "creation_timestamp": "2025-05-14T00:31:43.000000Z"}, {"uuid": "079c212f-bd4f-40db-89dd-593ac7f0568b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52614", "type": "seen", "source": "https://t.me/cvedetector/11558", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52614 - Kura Sushi Official App Produced by EPARK Cryptographic Key Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52614 \nPublished : Nov. 20, 2024, 6:15 a.m. | 34\u00a0minutes ago \nDescription : Use of hard-coded cryptographic key issue exists in \"Kura Sushi Official App Produced by EPARK\" for Android versions prior to 3.8.5. If this vulnerability is exploited, a local attacker may obtain the login ID and password for the affected product. \nSeverity: 4.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T07:53:18.000000Z"}, {"uuid": "6d6bc862-da18-4d92-a188-ce0a28bf447f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52611", "type": "seen", "source": "Telegram/PQJqqBGi-H_1IZgH4vJU8JCXyD9wNTe0z7covzLbOo0ylfZX", "content": "", "creation_timestamp": "2025-02-14T10:01:39.000000Z"}]}