{"vulnerability": "CVE-2024-3826", "sightings": [{"uuid": "a7616d6e-6b55-4372-aad6-957cec20d109", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38262", "type": "seen", "source": "https://www.thezdi.com/blog/2024/10/8/the-october-2024-security-update-review", "content": "", "creation_timestamp": "2024-10-08T17:54:47.000000Z"}, {"uuid": "ffa159a6-01e5-4e18-8fed-e199fe0aaf8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38263", "type": "seen", "source": "https://www.thezdi.com/blog/2024/9/10/the-september-2024-security-update-review", "content": "", "creation_timestamp": "2024-09-10T17:25:32.000000Z"}, {"uuid": "6c7cb7a4-3b0b-4cc8-9662-e66bd9f4220d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38261", "type": "seen", "source": "https://www.thezdi.com/blog/2024/10/8/the-october-2024-security-update-review", "content": "", "creation_timestamp": "2024-10-08T17:54:47.000000Z"}, {"uuid": "6f9f45a4-ab8f-4a1c-b5e6-f431cf824b94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38265", "type": "seen", "source": "https://www.thezdi.com/blog/2024/10/8/the-october-2024-security-update-review", "content": "", "creation_timestamp": "2024-10-08T17:54:47.000000Z"}, {"uuid": "a2475950-f770-4fa7-90e5-36bbf0687f99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38260", "type": "seen", "source": "https://www.thezdi.com/blog/2024/9/10/the-september-2024-security-update-review", "content": "", "creation_timestamp": "2024-09-10T17:25:32.000000Z"}, {"uuid": "fe5786c7-dfb4-420a-a9f0-8db318fe5597", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38264", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113471268469690045", "content": "", "creation_timestamp": "2024-11-12T17:55:51.188687Z"}, {"uuid": "9274c2b0-6f6b-417d-a166-845d9b6311b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38264", "type": "seen", "source": "https://www.thezdi.com/blog/2024/11/12/the-november-2024-security-update-review", "content": "", "creation_timestamp": "2024-11-12T18:26:35.000000Z"}, {"uuid": "cf7d0238-8a3c-451a-81ab-2084fd8fc9a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38268", "type": "seen", "source": "https://t.me/cvedetector/6236", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-38268 - Zyxel VMG8825-T50K Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-38268 \nPublished : Sept. 24, 2024, 2:15 a.m. | 35\u00a0minutes ago \nDescription : An improper restriction of operations within the bounds of a memory buffer in the MAC address parser of the Zyxel VMG8825-T50K firmware versions through 5.50(ABOM.8)C0 could allow an authenticated attacker with administrator privileges to cause potential memory corruptions, resulting in a thread crash on an affected device. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-24T04:52:05.000000Z"}, {"uuid": "e56dd9dc-2c97-439f-ba1c-116e5d97cf4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38267", "type": "seen", "source": "https://t.me/cvedetector/6235", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-38267 - Zyxel VMG8825-T50K Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-38267 \nPublished : Sept. 24, 2024, 2:15 a.m. | 35\u00a0minutes ago \nDescription : An improper restriction of operations within the bounds of a memory buffer in the IPv6 address parser of the Zyxel VMG8825-T50K firmware versions through 5.50(ABOM.8)C0 could allow an authenticated attacker with administrator privileges to cause potential memory corruptions, resulting in a thread crash on an affected device. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-24T04:52:01.000000Z"}, {"uuid": "4bcc738e-f17f-4a73-becd-a5da3eb90d88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38266", "type": "seen", "source": "https://t.me/cvedetector/6234", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-38266 - Zyxel VMG8825-T50K Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-38266 \nPublished : Sept. 24, 2024, 2:15 a.m. | 35\u00a0minutes ago \nDescription : An improper restriction of operations within the bounds of a memory buffer in the parameter type parser of the Zyxel VMG8825-T50K firmware versions through 5.50(ABOM.8)C0 could allow an authenticated attacker with administrator privileges to cause potential memory corruptions, resulting in a thread crash on an affected device. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-24T04:52:00.000000Z"}, {"uuid": "d02e6ff4-5904-4a71-af83-297d0b1e5b49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38269", "type": "seen", "source": "https://t.me/cvedetector/6230", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-38269 - Zyxel VMG8825-T50K Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-38269 \nPublished : Sept. 24, 2024, 2:15 a.m. | 35\u00a0minutes ago \nDescription : An improper restriction of operations within the bounds of a memory buffer in the USB file-sharing handler of the Zyxel VMG8825-T50K firmware versions through 5.50(ABOM.8)C0 could allow an authenticated attacker with administrator privileges to cause potential memory corruptions, resulting in a thread crash on an affected device. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-24T04:51:54.000000Z"}]}