{"vulnerability": "CVE-2024-41132", "sightings": [{"uuid": "776b8958-023d-4694-91df-f32fcc4b512b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41132", "type": "seen", "source": "https://t.me/cvedetector/1455", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41132 - ImageSharp Gif Decoder Memory Corruption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41132 \nPublished : July 22, 2024, 3:15 p.m. | 34\u00a0minutes ago \nDescription : ImageSharp is a 2D graphics API. A vulnerability discovered in the ImageSharp library, where the processing of specially crafted files can lead to excessive memory usage in the Gif decoder. The vulnerability is triggered when ImageSharp attempts to process image files that are designed to exploit this flaw. All users are advised to upgrade to v3.1.5 or v2.1.9. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-22T17:49:58.000000Z"}]}