{"vulnerability": "CVE-2024-5795", "sightings": [{"uuid": "3c0b9059-b5c5-47a2-a0be-350ae4ea7c91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57954", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhj6b3ighg2w", "content": "", "creation_timestamp": "2025-02-06T13:16:51.543867Z"}, {"uuid": "d2549d10-0051-4bce-910a-6257702a3725", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57955", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhj6b5xziy2n", "content": "", "creation_timestamp": "2025-02-06T13:16:54.267975Z"}, {"uuid": "36b38192-3cbc-44d5-aed0-554ad4391c19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57956", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhj6ba7xba2n", "content": "", "creation_timestamp": "2025-02-06T13:16:56.873889Z"}, {"uuid": "1e052e6a-d55d-49f8-9f60-550688fdb397", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57957", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhj6bcktzr2e", "content": "", "creation_timestamp": "2025-02-06T13:16:59.228543Z"}, {"uuid": "a4ebbfb7-9b78-4361-b66d-c482383674e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57958", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhj6beztgr2j", "content": "", "creation_timestamp": "2025-02-06T13:17:01.671629Z"}, {"uuid": "fef19512-fe28-4fb6-875a-fd0d3af989c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57959", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhj6bh4blm2f", "content": "", "creation_timestamp": "2025-02-06T13:17:03.812983Z"}, {"uuid": "50bb416c-8375-4e1a-b8f0-f69cc857a546", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57959", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhjjt4zfaz2v", "content": "", "creation_timestamp": "2025-02-06T16:43:49.788308Z"}, {"uuid": "0f4f32e1-afd7-4d3a-8201-2e36054cfa2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57956", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhjjt54psb2q", "content": "", "creation_timestamp": "2025-02-06T16:43:50.440188Z"}, {"uuid": "2893d762-85df-4d71-8afd-cbe2867ee984", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57957", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhjjt5ffjq27", "content": "", "creation_timestamp": "2025-02-06T16:43:51.708597Z"}, {"uuid": "7569415e-7406-4de7-b0fe-ded2c98a6f15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57958", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhjjt5iuf72w", "content": "", "creation_timestamp": "2025-02-06T16:43:52.331524Z"}, {"uuid": "2f654084-c723-4f6d-b07d-759c2d282971", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57955", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhjjt5m64j2g", "content": "", "creation_timestamp": "2025-02-06T16:43:52.945341Z"}, {"uuid": "b0c1672d-078b-4b4e-9e3e-a386be3cc7a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57950", "type": "seen", "source": "https://t.me/cvedetector/17579", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57950 - AMD Display Zero Division Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57950 \nPublished : Feb. 10, 2025, 4:15 p.m. | 1\u00a0hour, 27\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ndrm/amd/display: Initialize denominator defaults to 1  \n  \n[WHAT &amp; HOW]  \nVariables, used as denominators and maybe not assigned to other values,  \nshould be initialized to non-zero to avoid DIVIDE_BY_ZERO, as reported  \nby Coverity.  \n  \n(cherry picked from commit e2c4c6c10542ccfe4a0830bb6c9fd5b177b7bbb7) \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-10T18:45:56.000000Z"}, {"uuid": "31cf62c7-7dc5-4068-97e9-0d5a51cce052", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57954", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhjjt5snuh2w", "content": "", "creation_timestamp": "2025-02-06T16:43:54.172390Z"}, {"uuid": "837d0414-44e3-4e2c-8b1f-984c2179ed50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57950", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhtx7oro232f", "content": "", "creation_timestamp": "2025-02-10T20:10:11.044368Z"}, {"uuid": "ce2a7b6f-dc80-493c-bbbd-b6f9fe46afc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57950", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhtk5oznep2x", "content": "", "creation_timestamp": "2025-02-10T16:16:20.251041Z"}, {"uuid": "5d16f9af-770b-457e-ac31-08aef730ebe0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57951", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113991178455812072", "content": "", "creation_timestamp": "2025-02-12T13:35:47.584392Z"}, {"uuid": "bb3c43f6-8426-41fe-ad4f-bbdf48adc387", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57951", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhyeetd5sz2c", "content": "", "creation_timestamp": "2025-02-12T14:16:15.829410Z"}, {"uuid": "648c826d-800f-4c99-baef-1ee1d89ca8ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57952", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhyeewjky62z", "content": "", "creation_timestamp": "2025-02-12T14:16:19.185267Z"}, {"uuid": "1d28c155-b6ce-4e78-a188-3d8b603eb76e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-57950", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "ab97f7b0-42ac-469a-a9e5-09a4775767e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-57952", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "40509b87-82ce-4c1c-86fc-87ecc2fc737f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57950", "type": "seen", "source": "Telegram/G14E19btSE1dOH9LutuSv3vwaIV9x_Q82Yjj2-8QdGdGq9ol", "content": "", "creation_timestamp": "2025-02-21T22:10:25.000000Z"}, {"uuid": "3b790b68-0d53-46e4-982b-3e64e6dd5313", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5795", "type": "seen", "source": "https://t.me/cvedetector/1021", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5795 - GitHub Enterprise Server Git Server Unbounded Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-5795 \nPublished : July 16, 2024, 10:15 p.m. | 22\u00a0minutes ago \nDescription : A Denial of Service vulnerability was identified in GitHub Enterprise Server that allowed an attacker to cause unbounded resource exhaustion by sending a large payload to the Git server. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in version 3.13.1, 3.12.6, 3.11.12, 3.10.14, and 3.9.17. This vulnerability was reported via the GitHub Bug Bounty program. \nSeverity: 7.7 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-17T00:39:26.000000Z"}, {"uuid": "f60c5401-375c-42fd-aab9-9fdca0f93a52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57957", "type": "seen", "source": "https://t.me/cvedetector/17393", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57957 - Apache Stash Log Information Exposure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57957 \nPublished : Feb. 6, 2025, 1:15 p.m. | 1\u00a0hour, 20\u00a0minutes ago \nDescription : Vulnerability of improper log information control in the UI framework module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 6.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-06T16:04:03.000000Z"}, {"uuid": "ab2706ba-b2ce-4641-b420-c831a4ace96c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57956", "type": "seen", "source": "https://t.me/cvedetector/17392", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57956 - Cisco Interpreters Out-of-Bounds Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57956 \nPublished : Feb. 6, 2025, 1:15 p.m. | 1\u00a0hour, 20\u00a0minutes ago \nDescription : Out-of-bounds read vulnerability in the interpreter string module  \nImpact: Successful exploitation of this vulnerability may affect availability. \nSeverity: 2.8 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-06T16:04:03.000000Z"}, {"uuid": "55e13c9c-c9e6-4d96-aa1b-32586532a469", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57955", "type": "seen", "source": "https://t.me/cvedetector/17391", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57955 - WordPress Gallery Module Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57955 \nPublished : Feb. 6, 2025, 1:15 p.m. | 1\u00a0hour, 20\u00a0minutes ago \nDescription : Arbitrary write vulnerability in the Gallery module   \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-06T16:03:59.000000Z"}, {"uuid": "423bd42d-3209-4734-8cc6-f69f8f919f43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57954", "type": "seen", "source": "https://t.me/cvedetector/17390", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57954 - Apache Media Library Permission Verification Vulnerability (Information Disclosure)\", \n  \"Content\": \"CVE ID : CVE-2024-57954 \nPublished : Feb. 6, 2025, 1:15 p.m. | 1\u00a0hour, 20\u00a0minutes ago \nDescription : Permission verification vulnerability in the media library module  \nImpact: Successful exploitation of this vulnerability may affect service confidentiality. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-06T16:03:58.000000Z"}, {"uuid": "6935d2a2-d394-48e5-9ae3-d6dd7349850a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57959", "type": "seen", "source": "https://t.me/cvedetector/17386", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57959 - Cisco Networking Equipment Use-After-Free Display Module Memory Corruption\", \n  \"Content\": \"CVE ID : CVE-2024-57959 \nPublished : Feb. 6, 2025, 1:15 p.m. | 1\u00a0hour, 20\u00a0minutes ago \nDescription : Use-After-Free (UAF) vulnerability in the display module  \nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-06T16:03:52.000000Z"}, {"uuid": "74e35656-9574-4654-b13e-5da7348cd7cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57958", "type": "seen", "source": "https://t.me/cvedetector/17385", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57958 - Fujitsu Flashcache Robustness Tool Out-of-Bounds Read\", \n  \"Content\": \"CVE ID : CVE-2024-57958 \nPublished : Feb. 6, 2025, 1:15 p.m. | 1\u00a0hour, 20\u00a0minutes ago \nDescription : Out-of-bounds array read vulnerability in the FFRT module  \nImpact: Successful exploitation of this vulnerability may cause features to perform abnormally. \nSeverity: 5.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-06T16:03:51.000000Z"}, {"uuid": "4e1315b5-a955-4495-94bd-f7014202aa68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-57951", "type": "seen", "source": "Telegram/HIFWLVaplusfZGY4DhmDqkXWasjJIcESSRo0aUevVt9RFpRH", "content": "", "creation_timestamp": "2025-02-14T10:05:07.000000Z"}]}