{"vulnerability": "CVE-2024-5650", "sightings": [{"uuid": "c968fd70-9447-434b-9b3f-acf8d7fb7936", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56507", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lecf5kwa7q2e", "content": "", "creation_timestamp": "2024-12-27T16:15:58.168817Z"}, {"uuid": "e49cd36b-1eb0-438a-8888-37bd81bca8ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56508", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lecf5nj2et2m", "content": "", "creation_timestamp": "2024-12-27T16:16:00.888591Z"}, {"uuid": "4df6aa35-eca2-4759-852e-a38947d0bdbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56509", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lecf5qzanb25", "content": "", "creation_timestamp": "2024-12-27T16:16:04.496744Z"}, {"uuid": "6b7b98b8-375d-498f-b3f5-134046ca1516", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56506", "type": "seen", "source": "https://t.me/cvedetector/20542", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56506 - NetSarang PSFTP Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-56506 \nPublished : March 17, 2025, 11:15 p.m. | 52\u00a0minutes ago \nDescription : Rejected reason: Not used \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-18T01:50:40.000000Z"}, {"uuid": "728a1ece-c6f8-46d6-a6b2-40683a176054", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56505", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkml5prh262x", "content": "", "creation_timestamp": "2025-03-18T02:01:11.642395Z"}, {"uuid": "a200a4e7-ca90-4bf6-a3b0-e70aaaa405d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56506", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkml5pv6ey2w", "content": "", "creation_timestamp": "2025-03-18T02:01:12.145981Z"}, {"uuid": "d67cfbfe-954b-4b93-ad75-bf2047042af8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56503", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkml5q3l2r2s", "content": "", "creation_timestamp": "2025-03-18T02:01:12.818440Z"}, {"uuid": "c12488ff-46c1-4186-bade-9a59bbc5e0a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56504", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkml5qnsjl2e", "content": "", "creation_timestamp": "2025-03-18T02:01:15.491936Z"}, {"uuid": "01b38b64-d45e-42ec-a2f7-d0f6d1d71074", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56505", "type": "seen", "source": "https://t.me/cvedetector/20541", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56505 - Apple Safari Unvalidated Redirect\", \n  \"Content\": \"CVE ID : CVE-2024-56505 \nPublished : March 17, 2025, 11:15 p.m. | 52\u00a0minutes ago \nDescription : Rejected reason: Not used \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-18T01:50:39.000000Z"}, {"uuid": "c1dc3c8f-c5fa-4c5e-952f-e95357348c7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56500", "type": "seen", "source": "https://t.me/cvedetector/20545", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56500 - Apache HTTP Server Cross-Site Request Forgery\", \n  \"Content\": \"CVE ID : CVE-2024-56500 \nPublished : March 17, 2025, 11:15 p.m. | 52\u00a0minutes ago \nDescription : Rejected reason: Not used \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-18T01:50:45.000000Z"}, {"uuid": "93d6b132-9f2b-4ad1-be7f-0a559d81ce18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56501", "type": "seen", "source": "https://t.me/cvedetector/20550", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56501 - Apache HTTP Server Unvalidated User Input\", \n  \"Content\": \"CVE ID : CVE-2024-56501 \nPublished : March 17, 2025, 11:15 p.m. | 52\u00a0minutes ago \nDescription : Rejected reason: Not used \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-18T01:50:52.000000Z"}, {"uuid": "37f0846e-950c-4475-a147-1ac75ff13164", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56503", "type": "seen", "source": "https://t.me/cvedetector/20548", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56503 - Apache HTTP Server Cross-Site Request Forgery\", \n  \"Content\": \"CVE ID : CVE-2024-56503 \nPublished : March 17, 2025, 11:15 p.m. | 52\u00a0minutes ago \nDescription : Rejected reason: Not used \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-18T01:50:50.000000Z"}, {"uuid": "4b51e79a-57d8-4020-a0cc-0d9196d7d9db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56504", "type": "seen", "source": "https://t.me/cvedetector/20547", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56504 - Apache HTTP Server Unvalidated User Input\", \n  \"Content\": \"CVE ID : CVE-2024-56504 \nPublished : March 17, 2025, 11:15 p.m. | 52\u00a0minutes ago \nDescription : Rejected reason: Not used \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-18T01:50:47.000000Z"}, {"uuid": "009e690f-73d2-4482-8d86-04ae589b4023", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56509", "type": "seen", "source": "https://t.me/cvedetector/13785", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56509 - changedetection.io Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56509 \nPublished : Dec. 27, 2024, 4:15 p.m. | 23\u00a0minutes ago \nDescription : changedetection.io is a free open source web page change detection, website watcher, restock monitor and notification service. Improper input validation in the application can allow attackers to perform local file read (LFR) or path traversal attacks. These vulnerabilities occur when user input is used to construct file paths without adequate sanitization or validation. For example, using file:../../../etc/passwd or file: ///etc/passwd can bypass weak validations and allow unauthorized access to sensitive files. Even though this has been addressed in previous patch, it is still insufficient. This vulnerability is fixed in 0.48.05. \nSeverity: 8.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-27T17:41:57.000000Z"}, {"uuid": "81460138-e6f3-4ebf-b109-88a9309398a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56508", "type": "seen", "source": "https://t.me/cvedetector/13784", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56508 - LinkAce File Upload Vulnerability, Reflected/XSS\", \n  \"Content\": \"CVE ID : CVE-2024-56508 \nPublished : Dec. 27, 2024, 4:15 p.m. | 23\u00a0minutes ago \nDescription : LinkAce is a self-hosted archive to collect links of your favorite websites. Prior to 1.15.6, a file upload vulnerability exists in the LinkAce. This issue occurs in the \"Import Bookmarks\" functionality, where malicious HTML files can be uploaded containing JavaScript payloads. These payloads execute when the uploaded links are accessed, leading to potential reflected or persistent XSS scenarios. This vulnerability is fixed in 1.15.6. \nSeverity: 7.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-27T17:41:56.000000Z"}, {"uuid": "fe2c04f9-91fa-47b5-ab2e-f418c606f4eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56507", "type": "seen", "source": "https://t.me/cvedetector/13783", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56507 - LinkAce Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56507 \nPublished : Dec. 27, 2024, 4:15 p.m. | 23\u00a0minutes ago \nDescription : LinkAce is a self-hosted archive to collect links of your favorite websites. Prior to 1.15.6, a reflected cross-site scripting (XSS) vulnerability exists in the LinkAce. This issue occurs in the \"URL\" field of the \"Edit Link\" module, where user input is not properly sanitized or encoded before being reflected in the HTML response. This allows attackers to inject and execute arbitrary JavaScript in the context of the victim\u2019s browser, leading to potential session hijacking, data theft, and unauthorized actions. This vulnerability is fixed in 1.15.6. \nSeverity: 4.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-27T17:41:55.000000Z"}]}