{"vulnerability": "CVE-2024-37151", "sightings": [{"uuid": "6a959f51-4f6c-45e8-87da-d23c472cc024", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37151", "type": "seen", "source": "https://t.me/cvedetector/659", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37151 - Suricata is a network Intrusion Detection System,\", \n  \"Content\": \"CVE ID : CVE-2024-37151 \nPublished : July 11, 2024, 3:15 p.m. | 39\u00a0minutes ago \nDescription : Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine.   \nMishandling of multiple fragmented packets using the same IP ID value can lead to packet reassembly failure, which can lead to policy bypass. Upgrade to 7.0.6 or 6.0.20. When using af-packet, enable `defrag` to reduce the scope of the problem. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T18:19:13.000000Z"}]}