{"vulnerability": "CVE-2024-3894", "sightings": [{"uuid": "cff6ce03-6867-4c56-8bc5-9d13292a2118", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38944", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lmifned7kt27", "content": "", "creation_timestamp": "2025-04-10T21:02:21.101362Z"}, {"uuid": "ab38df97-e072-4a1a-9065-8e873d872ba6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38944", "type": "seen", "source": "MISP/af790da0-9e28-4cb7-bd4e-46ad005115c6", "content": "", "creation_timestamp": "2025-10-08T21:59:29.000000Z"}, {"uuid": "d5c43973-3a1c-4b0b-a679-1f1581659b69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38944", "type": "seen", "source": "MISP/af790da0-9e28-4cb7-bd4e-46ad005115c6", "content": "", "creation_timestamp": "2025-10-01T18:11:57.000000Z"}, {"uuid": "139d292b-2485-4e58-a327-26ccc938fd0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38945", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3m7emopzezw2h", "content": "", "creation_timestamp": "2025-12-07T03:56:23.183000Z"}, {"uuid": "039b2932-70f9-4109-9cc0-103e142edd05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38944", "type": "seen", "source": "https://t.me/cvedetector/1471", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-38944 - Intelight X-1L Traffic Controller Code Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-38944 \nPublished : July 22, 2024, 7:15 p.m. | 37\u00a0minutes ago \nDescription : An issue in Intelight X-1L Traffic controller Maxtime v.1.9.6 allows a remote attacker to execute arbitrary code via the /cgi-bin/generateForm.cgi?formID=142 component. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T22:00:40.000000Z"}]}