{"vulnerability": "CVE-2024-5602", "sightings": [{"uuid": "b42bb7fe-a219-4ee7-9370-519b174cb570", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56020", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113749991187239635", "content": "", "creation_timestamp": "2024-12-31T23:18:41.861220Z"}, {"uuid": "85431a97-068a-4702-9851-7d33254c95ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56021", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113749991202029814", "content": "", "creation_timestamp": "2024-12-31T23:18:42.164001Z"}, {"uuid": "0228d29c-3979-4981-b7f3-e06934a4b4e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56020", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lenbzfmcoe2i", "content": "", "creation_timestamp": "2025-01-01T00:19:25.532926Z"}, {"uuid": "294b4ad3-b2a9-44b8-bafd-e8d70dd66415", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56021", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lenbzhoapd2f", "content": "", "creation_timestamp": "2025-01-01T00:19:27.958751Z"}, {"uuid": "cdca8610-c65b-477b-9205-c3f2b1be190a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56027", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3leqtsy6xpf2i", "content": "", "creation_timestamp": "2025-01-02T10:15:43.969102Z"}, {"uuid": "eee58156-9020-413a-a7f2-13182289284c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56028", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3leqtt2k6xz2e", "content": "", "creation_timestamp": "2025-01-02T10:15:47.059982Z"}, {"uuid": "98cfdc1b-a222-40f4-8b07-7976ac056870", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56029", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3leqtt4xw3h2c", "content": "", "creation_timestamp": "2025-01-02T10:15:49.251611Z"}, {"uuid": "a3330bb2-f196-4d9a-af20-7371bf05c54a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56028", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3leqvcv2m3u2k", "content": "", "creation_timestamp": "2025-01-02T10:42:31.749723Z"}, {"uuid": "7c97a5a9-9074-421c-95d0-c9fea85a5a91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56027", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3leqvcw4urm2k", "content": "", "creation_timestamp": "2025-01-02T10:42:36.002864Z"}, {"uuid": "55d72ab5-0072-434d-8d49-718dcf6945f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56024", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2rwojy325", "content": "", "creation_timestamp": "2025-01-02T12:20:25.685199Z"}, {"uuid": "c916cad5-aafa-43c6-85e7-00430fe8a93c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56025", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2rzabiz2o", "content": "", "creation_timestamp": "2025-01-02T12:20:27.753082Z"}, {"uuid": "8b1c29aa-42b5-4880-9814-6247a56ad021", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56022", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2rs3arl2e", "content": "", "creation_timestamp": "2025-01-02T12:20:21.160863Z"}, {"uuid": "a09c2176-66d4-4d1f-bbf1-33eaffe09f7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56023", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2ruhdyk25", "content": "", "creation_timestamp": "2025-01-02T12:20:23.622748Z"}, {"uuid": "a7395c6e-698b-445f-84ff-d43c5f495c2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56026", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ler2s3i4es25", "content": "", "creation_timestamp": "2025-01-02T12:20:30.337723Z"}, {"uuid": "a431cd19-f116-4b16-af79-11f7f29a3969", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56022", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760332013809181", "content": "", "creation_timestamp": "2025-01-02T19:08:30.716777Z"}, {"uuid": "e541af57-ab10-40d7-95f3-59e71b3141a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56023", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760332027706244", "content": "", "creation_timestamp": "2025-01-02T19:08:30.808346Z"}, {"uuid": "eceb2ff4-0a6e-44cb-adca-7965fa9b5ba6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56024", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760391024732496", "content": "", "creation_timestamp": "2025-01-02T19:23:30.798423Z"}, {"uuid": "1c8f1bde-2aaa-41b8-9d0b-ff7657aea783", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56025", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760391039334070", "content": "", "creation_timestamp": "2025-01-02T19:23:31.104009Z"}, {"uuid": "9fa88573-a673-4b53-961e-66a694156386", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56026", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113760391053875471", "content": "", "creation_timestamp": "2025-01-02T19:23:31.386758Z"}, {"uuid": "1bc741fa-394c-4374-9478-5c83db71452f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5602", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14229", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-5602\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: A stack-based buffer overflow vulnerability due to a missing bounds check in the NI I/O Trace Tool may result in arbitrary code execution.  Successful exploitation requires an attacker to provide a user with a specially crafted nitrace file.\n\nThe NI I/O Trace tool is installed as part of the NI System Configuration utilities included with many NI software products.\u202f Refer to the NI Security Advisory for identifying the version of NI IO Trace.exe installed. The NI I/O Trace tool was also previously released as NI Spy.\n\ud83d\udccf Published: 2024-07-23T13:15:50.508Z\n\ud83d\udccf Modified: 2025-05-01T03:55:27.855Z\n\ud83d\udd17 References:\n1. https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/stack-based-buffer-overflow-vulnerability-in-ni-io-trace-tool.html", "creation_timestamp": "2025-05-01T04:14:50.000000Z"}, {"uuid": "9017d08b-664c-4beb-ab51-21b85e0e03eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5602", "type": "seen", "source": "https://t.me/cvedetector/1504", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5602 - NI I/O Trace Tool Stack-Based Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-5602 \nPublished : July 23, 2024, 2:15 p.m. | 43\u00a0minutes ago \nDescription : A stack-based buffer overflow vulnerability due to a missing bounds check in the NI I/O Trace Tool may result in arbitrary code execution.  Successful exploitation requires an attacker to provide a user with a specially crafted nitrace file.  \n  \nThe NI I/O Trace tool is installed as part of the NI System Configuration utilities included with many NI software products.\u202f Refer to the NI Security Advisory for identifying the version of NI IO Trace.exe installed. The NI I/O Trace tool was also previously released as NI Spy. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-23T17:14:13.000000Z"}, {"uuid": "fcc0bccb-ba85-412d-85ad-f83f59799efc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56020", "type": "seen", "source": "https://t.me/cvedetector/14069", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56020 - SvegliaT Buttons Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-56020 \nPublished : Jan. 1, 2025, 12:15 a.m. | 41\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mario Di Pasquale SvegliaT Buttons allows Stored XSS.This issue affects SvegliaT Buttons: from n/a through 1.3.0. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-01T02:16:41.000000Z"}, {"uuid": "002bbd5a-c539-4573-90f1-29175c18c6be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56021", "type": "seen", "source": "https://t.me/cvedetector/14068", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56021 - Ibnuyahya Category Post Shortcode Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-56021 \nPublished : Jan. 1, 2025, 12:15 a.m. | 41\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ibnuyahya Category Post Shortcode allows Stored XSS.This issue affects Category Post Shortcode: from n/a through 2.4. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-01T02:16:40.000000Z"}, {"uuid": "3b881bc1-755d-45b8-ab33-b50412be7a2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56027", "type": "seen", "source": "https://t.me/cvedetector/14112", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56027 - BizSwoop Leads CRM Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56027 \nPublished : Jan. 2, 2025, 10:15 a.m. | 26\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BizSwoop a CPF Concepts, LLC Brand Leads CRM allows Reflected XSS.This issue affects Leads CRM: from n/a through 2.0.13. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T11:44:26.000000Z"}, {"uuid": "51727612-29da-43a0-bf4e-7c1caf9db554", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56029", "type": "seen", "source": "https://t.me/cvedetector/14107", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56029 - Dreamwinner Easy Language Switcher Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-56029 \nPublished : Jan. 2, 2025, 10:15 a.m. | 26\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Dreamwinner Easy Language Switcher allows Reflected XSS.This issue affects Easy Language Switcher: from n/a through 1.0. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T11:44:20.000000Z"}, {"uuid": "1c26a549-8869-4a4e-8ae1-3c8bfbc9287e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56028", "type": "seen", "source": "https://t.me/cvedetector/14106", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56028 - Lemonade Coding Studio Lemonade Social Networks Autoposter Pinterest Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-56028 \nPublished : Jan. 2, 2025, 10:15 a.m. | 26\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Lemonade Coding Studio Lemonade Social Networks Autoposter Pinterest allows Reflected XSS.This issue affects Lemonade Social Networks Autoposter Pinterest: from n/a through 2.0. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T11:44:19.000000Z"}]}