{"vulnerability": "CVE-2024-52615", "sightings": [{"uuid": "7217a55b-9ba2-4259-ae3f-55796d9026c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52615", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113522877614306544", "content": "", "creation_timestamp": "2024-11-21T20:40:43.703603Z"}, {"uuid": "8e82e30a-165c-4220-a110-de976491241f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52615", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3mchisoor4c2g", "content": "", "creation_timestamp": "2026-01-15T11:40:41.446554Z"}, {"uuid": "511f158d-4756-4bdd-9149-4c6a987a50f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52615", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lz7rkofj6k2q", "content": "", "creation_timestamp": "2025-09-19T21:09:08.810361Z"}, {"uuid": "848377bc-8127-4e1f-a775-c384102faccd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52615", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/269", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52615\n\ud83d\udd39 Description: A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.\n\ud83d\udccf Published: 2024-11-21T20:34:00.981Z\n\ud83d\udccf Modified: 2025-01-06T22:02:09.214Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2024-52615\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2326418", "creation_timestamp": "2025-01-06T22:38:03.000000Z"}]}