{"vulnerability": "CVE-2024-11235", "sightings": [{"uuid": "0b43fe48-dac3-4688-a312-12ad8f94aee1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11235", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114281067875557615", "content": "", "creation_timestamp": "2025-04-04T18:18:29.461606Z"}, {"uuid": "0404a7d1-7ea7-4b01-9d2e-9dca0a5c5ea3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11235", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lkea5pding2d", "content": "", "creation_timestamp": "2025-03-14T18:23:02.022812Z"}, {"uuid": "e9de1d33-1532-4b9a-8395-8005fc0c1f40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11235", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114162482090787141", "content": "", "creation_timestamp": "2025-03-14T19:40:33.551765Z"}, {"uuid": "c8e4d935-8805-4645-84c1-1b68d4913b7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11235", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114281067875557615", "content": "", "creation_timestamp": "2025-04-04T18:18:29.464089Z"}, {"uuid": "5cf3ddeb-d7f8-41c0-9039-962ece7441f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11235", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3llz2vq5va42p", "content": "", "creation_timestamp": "2025-04-04T18:40:11.874474Z"}, {"uuid": "191986bb-3139-4212-9e6d-2525d21d0f70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11235", "type": "seen", "source": "https://bsky.app/profile/cerb.ai/post/3lme5hlwzfh2z", "content": "", "creation_timestamp": "2025-04-09T04:25:16.807287Z"}, {"uuid": "ff6867b8-6e8d-45c7-9da8-62bc0f53f82b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11235", "type": "seen", "source": "https://t.me/cvedetector/22168", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11235 - Apache PHP Use-After-Free Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11235 \nPublished : April 4, 2025, 6:15 p.m. | 1\u00a0hour, 46\u00a0minutes ago \nDescription : In PHP versions 8.3.* before 8.3.19 and 8.4.* before 8.4.5, a code sequence involving __set handler or ??=\u00a0\u00a0operator and exceptions can lead to a use-after-free vulnerability. If the third party can control the memory layout leading to this, for example by supplying specially crafted inputs to the script, it could lead to remote code execution. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T22:12:42.000000Z"}]}