{"vulnerability": "CVE-2024-5753", "sightings": [{"uuid": "0deddb78-9a93-4165-8d04-eaf81eff651b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57536", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbrkyewmx2j", "content": "", "creation_timestamp": "2025-01-21T21:15:55.754689Z"}, {"uuid": "880a9353-784d-4cf0-a648-70808390ea63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57537", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbrl2oiwh2t", "content": "", "creation_timestamp": "2025-01-21T21:15:58.052533Z"}, {"uuid": "d29431c1-19ec-4483-839c-e71dfded95fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57538", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbrl543he2f", "content": "", "creation_timestamp": "2025-01-21T21:16:00.357705Z"}, {"uuid": "2e58e247-30cb-4f96-b814-f6dc9bb44c83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57539", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbrl7iwhd2h", "content": "", "creation_timestamp": "2025-01-21T21:16:03.130141Z"}, {"uuid": "d6724a67-9d38-4cab-bcea-df4cb918f3e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57534", "type": "seen", "source": "https://gist.github.com/binophism/8bb2135e18c363d1a5da873212d33b86", "content": "", "creation_timestamp": "2025-01-22T20:49:59.000000Z"}, {"uuid": "40b8e0c7-eef7-4201-aed7-c48918eb69fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57536", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2652", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57536\n\ud83d\udd39 Description: Linksys E8450 v1.2.00.360516 was discovered to contain a command injection vulnerability via wizard_status.\n\ud83d\udccf Published: 2025-01-21T00:00:00.000Z\n\ud83d\udccf Modified: 2025-01-22T20:28:37.848Z\n\ud83d\udd17 References:\n1. https://github.com/Wood1314/Linksys_E8450_vul/blob/main/8/8.md", "creation_timestamp": "2025-01-22T21:02:16.000000Z"}, {"uuid": "e4618ed8-c29f-4424-93c0-a1c9a22fa76c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5753", "type": "seen", "source": "https://gist.github.com/YLChen-007/251cb05f6b16f03e75e9f6c80ea3162f", "content": "", "creation_timestamp": "2026-02-27T04:04:35.000000Z"}, {"uuid": "a2b64ce2-4fe9-4b96-8cb4-6768da2691ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57537", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2651", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57537\n\ud83d\udd39 Description: Linksys E8450 v1.2.00.360516 was discovered to contain a buffer overflow vulnerability. The parsed field (page) is copied to the stack without length verification.\n\ud83d\udccf Published: 2025-01-21T00:00:00.000Z\n\ud83d\udccf Modified: 2025-01-22T20:32:10.398Z\n\ud83d\udd17 References:\n1. https://github.com/Wood1314/Linksys_E8450_vul/blob/main/1/1.md", "creation_timestamp": "2025-01-22T21:02:15.000000Z"}, {"uuid": "1e09bb81-c582-43ae-a8a1-e4a58341eb22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5753", "type": "seen", "source": "https://t.me/cvedetector/136", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5753 - vanna-ai/vanna version v0.3.4 is vulnerable to SQL\", \n  \"Content\": \"CVE ID : CVE-2024-5753 \nPublished : July 5, 2024, 8:15 p.m. | 16\u00a0minutes ago \nDescription : vanna-ai/vanna version v0.3.4 is vulnerable to SQL injection in some file-critical functions such as `pg_read_file()`. This vulnerability allows unauthenticated remote users to read arbitrary local files on the victim server, including sensitive files like `/etc/passwd`, by exploiting the exposed SQL queries via a Python Flask API. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-05T22:32:10.000000Z"}]}