{"vulnerability": "CVE-2024-3305", "sightings": [{"uuid": "7a0f92f0-d7f8-49bb-a3df-522ea266be00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33053", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113582793723358521", "content": "", "creation_timestamp": "2024-12-02T10:38:11.171746Z"}, {"uuid": "6bf938b7-5871-4f49-8a15-6bb11a7ca71d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33056", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113582793756408007", "content": "", "creation_timestamp": "2024-12-02T10:38:11.537942Z"}, {"uuid": "1a0dcde5-883a-42bf-9c28-404781ae9112", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33055", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113780989515910688", "content": "", "creation_timestamp": "2025-01-06T10:41:58.928156Z"}, {"uuid": "a0829f35-1f56-4f05-8292-723a85aaff9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33059", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113781048518027362", "content": "", "creation_timestamp": "2025-01-06T10:56:59.116473Z"}, {"uuid": "fec2373e-e9a2-4ff1-bee1-a7e0c535b4d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33055", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf2yzqo2qy2m", "content": "", "creation_timestamp": "2025-01-06T11:15:37.506926Z"}, {"uuid": "0b1750ba-32e8-4732-87a5-5426193bc764", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33059", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf2yzt34nx2o", "content": "", "creation_timestamp": "2025-01-06T11:15:39.610355Z"}, {"uuid": "c1d84a12-4b9e-4abf-9c6a-4ed7e6ad0a54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33059", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf2yzt34nx2o", "content": "", "creation_timestamp": "2025-01-06T11:15:39.620627Z"}, {"uuid": "5a294954-265b-4baa-a5f1-65b8beb39455", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33059", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf32kwou6t2k", "content": "", "creation_timestamp": "2025-01-06T11:43:08.848584Z"}, {"uuid": "66919ee5-bd0d-4d04-af2c-1bff1591ca01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33056", "type": "seen", "source": "https://t.me/cvedetector/11760", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-33056 - Intel Meltdown SMEM Partition Memory Corruption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-33056 \nPublished : Dec. 2, 2024, 11:15 a.m. | 35\u00a0minutes ago \nDescription : Memory corruption when allocating and accessing an entry in an SMEM partition continuously. \nSeverity: 8.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-02T12:53:55.000000Z"}, {"uuid": "779a8398-734f-42e5-9d1d-9bfe2609e3c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33058", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-08-09T17:25:38.000000Z"}, {"uuid": "4dd2bb79-cad2-4f1e-8036-d9bee9ffb7f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33058", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-09-10T07:00:41.000000Z"}, {"uuid": "4e3c67d1-60de-43b2-860c-dd762ef647a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33059", "type": "seen", "source": "https://t.me/cvedetector/14351", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-33059 - Apache Web Server Memory Corruption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-33059 \nPublished : Jan. 6, 2025, 11:15 a.m. | 28\u00a0minutes ago \nDescription : Memory corruption while processing frame command IOCTL calls. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-06T12:44:59.000000Z"}, {"uuid": "fb222e5f-5cd1-4209-8e67-f0683f03e2ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33055", "type": "seen", "source": "https://t.me/cvedetector/14350", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-33055 - Acronis Storage OpenStack flaw in IOCTL Handler\", \n  \"Content\": \"CVE ID : CVE-2024-33055 \nPublished : Jan. 6, 2025, 11:15 a.m. | 28\u00a0minutes ago \nDescription : Memory corruption while invoking IOCTL calls to unmap the DMA buffers. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-06T12:44:58.000000Z"}, {"uuid": "d6e6adc6-33f7-4625-a2e7-971427caf32c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33053", "type": "seen", "source": "https://t.me/cvedetector/11759", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-33053 - Cisco CVP Buffer Corruption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-33053 \nPublished : Dec. 2, 2024, 11:15 a.m. | 35\u00a0minutes ago \nDescription : Memory corruption when multiple threads try to unregister the CVP buffer at the same time. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-02T12:53:54.000000Z"}, {"uuid": "405b770f-14cd-4503-98d4-b273b82d9ba2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3305", "type": "seen", "source": "https://t.me/cvedetector/5470", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-3305 - Utarit SoliClub Sensitive Information Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-3305 \nPublished : Sept. 12, 2024, 1:15 p.m. | 16\u00a0minutes ago \nDescription : Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Utarit Information SoliClub allows Retrieve Embedded Sensitive Data.This issue affects SoliClub: before 4.4.0 for iOS, before 5.2.1 for Android. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-12T15:37:04.000000Z"}, {"uuid": "d6d86059-d637-4e23-b0e4-c041b22543f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33051", "type": "seen", "source": "https://t.me/cvedetector/4632", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-33051 - Cisco Wireless LAN Authentication Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-33051 \nPublished : Sept. 2, 2024, 12:15 p.m. | 55\u00a0minutes ago \nDescription : Transient DOS while processing TIM IE from beacon frame as there is no check for IE length. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-02T15:33:18.000000Z"}, {"uuid": "47d5e244-404d-4e28-812c-1d1c46cf5f4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33052", "type": "seen", "source": "https://t.me/cvedetector/4631", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-33052 - Adobe Flash Memory Corruption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-33052 \nPublished : Sept. 2, 2024, 12:15 p.m. | 55\u00a0minutes ago \nDescription : Memory corruption when user provides data for FM HCI command control operations. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-02T15:33:15.000000Z"}, {"uuid": "c76d0541-2db6-4853-9f6c-de975fde8066", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33054", "type": "seen", "source": "https://t.me/cvedetector/4629", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-33054 - VMware ESXi Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-33054 \nPublished : Sept. 2, 2024, 12:15 p.m. | 55\u00a0minutes ago \nDescription : Memory corruption during the handshake between the Primary Virtual Machine and Trusted Virtual Machine. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-02T15:33:13.000000Z"}, {"uuid": "a286238a-88a9-491e-a3c2-da6ce4640c03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33057", "type": "seen", "source": "https://t.me/cvedetector/4627", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-33057 - Myricom Layer 2 Ethernet Switch Remote Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-33057 \nPublished : Sept. 2, 2024, 12:15 p.m. | 54\u00a0minutes ago \nDescription : Transient DOS while parsing the multi-link element Control field when common information length check is missing before updating the location. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-02T15:33:11.000000Z"}, {"uuid": "18eb9d16-bf5f-4f45-b08f-dc52a9eb918f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33050", "type": "seen", "source": "https://t.me/cvedetector/4613", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-33050 - Transient DOS while parsing MBSSID during new IE g\", \n  \"Content\": \"CVE ID : CVE-2024-33050 \nPublished : Sept. 2, 2024, 12:15 p.m. | 25\u00a0minutes ago \nDescription : Transient DOS while parsing MBSSID during new IE generation in beacon/probe frame when IE length check is either missing or improper. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-02T14:42:51.000000Z"}]}