{"vulnerability": "CVE-2024-3935", "sightings": [{"uuid": "d4a44127-7351-43f6-96a5-efdf5bdd241f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39354", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-312-02", "content": "", "creation_timestamp": "2024-11-07T12:00:00.000000Z"}, {"uuid": "dac49d7b-fd20-4ddc-ae2d-948c92beb82f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39354", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1470/", "content": "", "creation_timestamp": "2024-11-08T06:00:00.000000Z"}, {"uuid": "c884e905-51b7-436b-a245-03afb3e586c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39354", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1464/", "content": "", "creation_timestamp": "2024-11-08T06:00:00.000000Z"}, {"uuid": "5d18c29f-c2cb-4f70-9be3-fd8e1ddc93ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39354", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113464956653366927", "content": "", "creation_timestamp": "2024-11-11T15:10:40.019882Z"}, {"uuid": "440dcc11-f439-4190-8a42-6ca73dfce3e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39357", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpkaecuyb2n", "content": "", "creation_timestamp": "2025-01-14T15:16:47.479234Z"}, {"uuid": "71eb306c-80fa-47d4-b4fb-76f4a1ee945d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39358", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpkahwq3t2c", "content": "", "creation_timestamp": "2025-01-14T15:16:51.244669Z"}, {"uuid": "c98cc7e9-d953-4b63-8cde-ec1cc815c1b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39355", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhz7ccgnpr2d", "content": "", "creation_timestamp": "2025-02-12T22:18:02.206729Z"}, {"uuid": "7e841c30-8500-49a0-9d90-69f7446f9d8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39356", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhz7cephup2a", "content": "", "creation_timestamp": "2025-02-12T22:18:04.505341Z"}, {"uuid": "333181e5-ce46-48e0-8a7b-bbd519c83f8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39355", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113993626199118656", "content": "", "creation_timestamp": "2025-02-12T23:58:17.231169Z"}, {"uuid": "5a483cdd-d2dd-416f-85e7-932b78ca2d55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39356", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113993685201946475", "content": "", "creation_timestamp": "2025-02-13T00:13:17.490593Z"}, {"uuid": "97eba396-d902-401e-832f-9bc1d8b21d71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3935", "type": "seen", "source": "https://t.me/cvedetector/9416", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-3935 - Eclipse Mosquitto Double Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-3935 \nPublished : Oct. 30, 2024, 12:15 p.m. | 36\u00a0minutes ago \nDescription : In Eclipse Mosquito, versions from 2.0.0 through 2.0.18, if a Mosquitto broker is configured to create an outgoing bridge connection, and that bridge connection has an incoming topic configured that makes use of topic remapping, then if the remote connection sends a crafted PUBLISH packet to the broker a double free will occur with a subsequent crash of the broker. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-30T14:11:33.000000Z"}, {"uuid": "857e03cc-6420-441c-a3b7-d587343bd197", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39354", "type": "seen", "source": "https://t.me/cvedetector/10506", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39354 - Delta Electronics DIAScreen Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39354 \nPublished : Nov. 11, 2024, 3:15 p.m. | 35\u00a0minutes ago \nDescription : If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in CEtherIPTagItem can be exploited, allowing the attacker to remotely execute arbitrary code. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T16:56:29.000000Z"}]}