{"vulnerability": "CVE-2024-35366", "sightings": [{"uuid": "56907f87-0a41-4154-993d-692b31c82ad6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-35366", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113568052974885285", "content": "", "creation_timestamp": "2024-11-29T20:09:25.026183Z"}, {"uuid": "caa7c9cf-90ad-4fb5-afb8-f229561f03ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-35366", "type": "seen", "source": "https://t.me/cvedetector/11693", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-35366 - FFmpeg n6.1.1 is Integer Overflow. The vulnerabili\", \n  \"Content\": \"CVE ID : CVE-2024-35366 \nPublished : Nov. 29, 2024, 8:15 p.m. | 16\u00a0hours, 20\u00a0minutes ago \nDescription : FFmpeg n6.1.1 is Integer Overflow. The vulnerability exists in the parse_options function of sbgdec.c within the libavformat module. When parsing certain options, the software does not adequately validate the input. This allows for negative duration values to be accepted without proper bounds checking. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-30T14:04:38.000000Z"}, {"uuid": "05d7028e-ed11-425c-916c-619060fb3a6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-35366", "type": "seen", "source": "https://gist.github.com/Darkcrai86/d4b1a38863b6a56fd60b4594084a9b41", "content": "", "creation_timestamp": "2025-10-16T07:46:53.000000Z"}]}