{"vulnerability": "CVE-2024-5384", "sightings": [{"uuid": "78301226-6923-4af8-9dd5-f325b961cce2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53848", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113567765118810869", "content": "", "creation_timestamp": "2024-11-29T18:56:12.852862Z"}, {"uuid": "c211fe66-055c-43f7-87fa-ceafa6641e4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53846", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113601319926430730", "content": "", "creation_timestamp": "2024-12-05T17:09:38.514234Z"}, {"uuid": "5b03596e-02b8-49e9-8265-7b5b7e963252", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53849", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113551881054414514", "content": "", "creation_timestamp": "2024-11-26T23:36:41.377824Z"}, {"uuid": "dfdeaf4c-11dc-42cc-89d1-77937711e7fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53843", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113546189025985403", "content": "", "creation_timestamp": "2024-11-25T23:29:07.715221Z"}, {"uuid": "279f8000-5845-4cef-8b34-dcf5662e1301", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53847", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113624371046573962", "content": "", "creation_timestamp": "2024-12-09T18:51:50.585968Z"}, {"uuid": "7fea896a-360e-4c9c-a34b-ff5fa0f93fee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53845", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113636589336290307", "content": "", "creation_timestamp": "2024-12-11T22:39:07.199506Z"}, {"uuid": "b671b4e0-c168-48ec-b124-405a4decc848", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53840", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113762457436162539", "content": "", "creation_timestamp": "2025-01-03T04:09:01.946469Z"}, {"uuid": "a23dbc21-bda1-4941-b9d9-d2cc64f58477", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53842", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113762457465487966", "content": "", "creation_timestamp": "2025-01-03T04:09:02.320444Z"}, {"uuid": "aca73b8c-3348-4e9f-919e-43cec1ccd347", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53841", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113762457450490131", "content": "", "creation_timestamp": "2025-01-03T04:09:02.381393Z"}, {"uuid": "f9ed2e02-f521-485b-b2c5-ee2fc3864653", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53840", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lesq6getrk2f", "content": "", "creation_timestamp": "2025-01-03T04:15:52.516368Z"}, {"uuid": "f2c04e1f-b74f-4fd9-a8a7-9d7cf4cc1161", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53841", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lesq6ih7q225", "content": "", "creation_timestamp": "2025-01-03T04:15:54.965182Z"}, {"uuid": "fce7a33c-f63d-4954-afb1-02186736eb11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53842", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lesq6kjbgs2o", "content": "", "creation_timestamp": "2025-01-03T04:15:57.192949Z"}, {"uuid": "6752a815-3911-450b-afef-286d53235118", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53842", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lesrodvbx52q", "content": "", "creation_timestamp": "2025-01-03T04:42:40.717221Z"}, {"uuid": "efa48a32-73c7-4b20-8edf-d4944a7f3d3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53841", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lesroeofh62e", "content": "", "creation_timestamp": "2025-01-03T04:42:42.994307Z"}, {"uuid": "a3e9ae47-d628-4efd-828b-d4955e9aa023", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53840", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lesrof626o2k", "content": "", "creation_timestamp": "2025-01-03T04:42:45.037502Z"}, {"uuid": "779a4e27-9d1b-403f-bf99-9c357b19595b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53842", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113762797652955807", "content": "", "creation_timestamp": "2025-01-03T05:35:33.030470Z"}, {"uuid": "b157a9da-d8f9-4043-afa7-ce255cb598a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53842", "type": "seen", "source": "https://t.me/cvedetector/14213", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53842 - \"Adobe CC Remote Code Execution via Out-of-Bounds Write\"\", \n  \"Content\": \"CVE ID : CVE-2024-53842 \nPublished : Jan. 3, 2025, 4:15 a.m. | 41\u00a0minutes ago \nDescription : In cc_SendCcImsInfoIndMsg of cc_MmConManagement.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-03T06:09:04.000000Z"}, {"uuid": "f560a461-5a6f-4186-9ee3-21c9e6f73a3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53849", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3m4lt3xh4ts2f", "content": "", "creation_timestamp": "2025-11-01T20:24:14.843087Z"}, {"uuid": "bfce3b50-6b01-4613-bba0-85ebd4753404", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53847", "type": "seen", "source": "https://t.me/cvedetector/12439", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53847 - Trix Rich Text Editor Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-53847 \nPublished : Dec. 9, 2024, 7:15 p.m. | 44\u00a0minutes ago \nDescription : The Trix rich text editor, prior to versions 2.1.9 and 1.3.3, is vulnerable to cross-site scripting (XSS) + mutation XSS attacks when pasting malicious code. An attacker could trick a user to copy and paste malicious code that would execute arbitrary JavaScript code within the context of the user's session, potentially leading to unauthorized actions being performed or sensitive information being disclosed. Users should upgrade to Trix editor version 2.1.9 or 1.3.3, which uses DOMPurify to sanitize the pasted content. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-09T21:24:01.000000Z"}, {"uuid": "87cd7f50-4ef3-4abb-9bec-0a80153b6e93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53841", "type": "seen", "source": "https://t.me/cvedetector/14212", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53841 - Google Android Confused Deputy Permission Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-53841 \nPublished : Jan. 3, 2025, 4:15 a.m. | 41\u00a0minutes ago \nDescription : In startListeningForDeviceStateChanges, there is a possible Permission Bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-03T06:09:03.000000Z"}, {"uuid": "d38ecabd-636f-43b4-be3a-3a650e39fc3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53840", "type": "seen", "source": "https://t.me/cvedetector/14211", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53840 - Venezuela Biometrics Extractables Fingerprint Extraction\", \n  \"Content\": \"CVE ID : CVE-2024-53840 \nPublished : Jan. 3, 2025, 4:15 a.m. | 41\u00a0minutes ago \nDescription : there is a possible biometric bypass due to an unusual root cause. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-03T06:09:00.000000Z"}, {"uuid": "a45df038-2dbc-4510-88b0-4a58332067f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53846", "type": "seen", "source": "https://t.me/cvedetector/12124", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53846 - OTP is a set of Erlang libraries, which consists o\", \n  \"Content\": \"CVE ID : CVE-2024-53846 \nPublished : Dec. 5, 2024, 5:15 p.m. | 58\u00a0minutes ago \nDescription : OTP is a set of Erlang libraries, which consists of the Erlang runtime system, a number of ready-to-use components mainly written in Erlang, and a set of design principles for Erlang programs. A regression was introduced into the ssl application of OTP starting at OTP-25.3.2.8, OTP-26.2, and OTP-27.0, resulting in a server or client verifying the peer when incorrect extended key usage is presented (i.e., a server will verify a client if they have server auth ext key usage and vice versa). \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T19:32:41.000000Z"}, {"uuid": "28690241-673c-47e8-a3c1-a500d5901d52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53848", "type": "seen", "source": "https://t.me/cvedetector/11696", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53848 - check-jsonschema is a CLI and set of pre-commit ho\", \n  \"Content\": \"CVE ID : CVE-2024-53848 \nPublished : Nov. 29, 2024, 7:15 p.m. | 17\u00a0hours, 20\u00a0minutes ago \nDescription : check-jsonschema is a CLI and set of pre-commit hooks for jsonschema validation. The default cache strategy uses the basename of a remote schema as the name of the file in the cache, e.g. `` will be stored as `schema.json`. This naming allows for conflicts. If an attacker can get a user to run `check-jsonschema` against a malicious schema URL, e.g., ``, they can insert their own schema into the cache and it will be picked up and used instead of the appropriate schema. Such a cache confusion attack could be used to allow data to pass validation which should have been rejected. This issue has been patched in version 0.30.0. All users are advised to upgrade. A few workarounds exist: 1. Users can use `--no-cache` to disable caching. 2. Users can use `--cache-filename` to select filenames for use in the cache, or to ensure that other usages do not overwrite the cached schema. (Note: this flag is being deprecated as part of the remediation effort.) 3. Users can explicitly download the schema before use as a local file, as in `curl -LOs  check-jsonschema --schemafile ./schema.json` \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-30T14:04:41.000000Z"}, {"uuid": "8fe2181a-136e-4086-b2d4-64109b560e9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5384", "type": "seen", "source": "Telegram/PumtoLv5DzWvg5dem_J2gBwiVGKncDY-OEoR-GcC5h0afuLo", "content": "", "creation_timestamp": "2025-02-14T10:03:08.000000Z"}]}