{"vulnerability": "CVE-2024-3928", "sightings": [{"uuid": "f4d05898-eefa-4c67-aa9d-80536be06616", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39281", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113470679639217215", "content": "", "creation_timestamp": "2024-11-12T15:26:05.821037Z"}, {"uuid": "f0c097fc-b55d-4d5f-a012-3a8b923e2d53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39285", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113478650386695262", "content": "", "creation_timestamp": "2024-11-14T01:13:09.837338Z"}, {"uuid": "db4fe0e9-d138-4e7f-a207-6c59ecfaffe9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39280", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpk7wlfcn2r", "content": "", "creation_timestamp": "2025-01-14T15:16:33.042179Z"}, {"uuid": "d18b7d11-b25b-45d3-a594-434fd0fea5cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39288", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpk7zxw5t2b", "content": "", "creation_timestamp": "2025-01-14T15:16:36.564104Z"}, {"uuid": "c4637eb6-f8ff-4d3b-bf14-ab738404ecf3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39282", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfrtxg6c2b2n", "content": "", "creation_timestamp": "2025-01-15T13:16:04.629458Z"}, {"uuid": "aefeefb4-4942-47ae-90ab-b7962a23cd39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39284", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhz7c5iaeo2a", "content": "", "creation_timestamp": "2025-02-12T22:17:56.936190Z"}, {"uuid": "2308eac4-f3da-49c0-ac68-10c0cbf702ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39286", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhz7ca5wjm2p", "content": "", "creation_timestamp": "2025-02-12T22:17:59.698677Z"}, {"uuid": "4151f254-5ef6-4365-82d2-eec461163dfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39284", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113993626168638131", "content": "", "creation_timestamp": "2025-02-12T23:58:16.633791Z"}, {"uuid": "f6526607-a997-44e4-b8ed-62b3365a2076", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39286", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113993626183933675", "content": "", "creation_timestamp": "2025-02-12T23:58:17.032821Z"}, {"uuid": "fb829fd8-57a8-40e5-aee9-5618e5fb9923", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39289", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114870205065116436", "content": "", "creation_timestamp": "2025-07-17T19:23:49.741415Z"}, {"uuid": "91d52904-f4e5-4bc4-9410-97e421dee17b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39281", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1139", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-39281\n\ud83d\udd39 Description: The command ctl_persistent_reserve_out allows the caller to specify an arbitrary size which will be passed to the kernel's memory allocator.\n\ud83d\udccf Published: 2024-11-12T15:01:57.151Z\n\ud83d\udccf Modified: 2025-01-10T13:06:46.829Z\n\ud83d\udd17 References:\n1. https://security.freebsd.org/advisories/FreeBSD-SA-24:18.ctl.asc", "creation_timestamp": "2025-01-10T14:06:18.000000Z"}, {"uuid": "a71fd263-16af-4756-9d1d-9e046fcbd393", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-39282", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "06b8509c-2251-4ad5-9950-ddae1db1e2ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-39286", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "9539d9c8-8497-4c16-938b-4e901f413fca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39286", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:33.000000Z"}, {"uuid": "f67b9dad-8f52-48e7-bc54-88eae49809a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39284", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:33.000000Z"}, {"uuid": "fc0af1e8-413e-4c59-8dff-a55f753a1e28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39283", "type": "seen", "source": "https://t.me/cvedetector/3134", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39283 - Intel TDX Local Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39283 \nPublished : Aug. 14, 2024, 2:15 p.m. | 39\u00a0minutes ago \nDescription : Incomplete filtering of special elements in Intel(R) TDX module software before version TDX_1.5.01.00.592 may allow an authenticated user to potentially enable escalation of privilege via local access. \nSeverity: 6.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-14T17:22:59.000000Z"}, {"uuid": "702d0ec1-5f66-4a4e-8061-71c8dd72ec58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39281", "type": "seen", "source": "https://t.me/cvedetector/10625", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39281 - Apache Intel\u00ae PRO/10GbE and PRO/10GbE-V Linux Vulnerability: Integer Overflow in Persistent Reserve Out\", \n  \"Content\": \"CVE ID : CVE-2024-39281 \nPublished : Nov. 12, 2024, 3:15 p.m. | 42\u00a0minutes ago \nDescription : The command ctl_persistent_reserve_out allows the caller to specify an arbitrary size which will be passed to the kernel's memory allocator. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-12T17:12:47.000000Z"}, {"uuid": "2c89214a-67c8-402d-b318-ec5b78ef3ca3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39285", "type": "seen", "source": "https://t.me/cvedetector/10893", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39285 - Intel(R) Server M20NTP UEFI Firmware Access Control Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39285 \nPublished : Nov. 13, 2024, 9:15 p.m. | 41\u00a0minutes ago \nDescription : Improper access control in UEFI firmware in some Intel(R) Server M20NTP Family may allow a privileged user to potentially enable information disclosure via local access. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T23:05:54.000000Z"}, {"uuid": "439de563-477e-4de7-b7f1-6674e62f118c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39287", "type": "seen", "source": "https://t.me/cvedetector/2812", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39287 - Dorsett Controls Central Server Unprotected File Storage Vulnerability (Information Disclosure)\", \n  \"Content\": \"CVE ID : CVE-2024-39287 \nPublished : Aug. 8, 2024, 6:15 p.m. | 16\u00a0minutes ago \nDescription : Dorsett Controls Central Server update server has potential information   \nleaks with an unprotected file that contains passwords and API keys. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-08T20:35:09.000000Z"}]}