{"vulnerability": "CVE-2024-47796", "sightings": [{"uuid": "8010e7e9-ab94-4972-8066-fd21afb8f3f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47796", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113821491815579060", "content": "", "creation_timestamp": "2025-01-13T14:22:14.888114Z"}, {"uuid": "a4298f00-8069-45e8-b666-4ccd6ae4a2c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47796", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfmzows6tw2h", "content": "", "creation_timestamp": "2025-01-13T15:15:23.764787Z"}, {"uuid": "67807d7a-9e0f-4718-855d-11f7c152aedc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47796", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfn37uwysw2w", "content": "", "creation_timestamp": "2025-01-13T15:42:46.126121Z"}, {"uuid": "3837b8a7-0bdc-44d0-a28b-00c322164617", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47796", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113821831125882012", "content": "", "creation_timestamp": "2025-01-13T15:48:32.848281Z"}, {"uuid": "481e36b2-3f64-4233-80f2-ea3a24c8b32f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47796", "type": "seen", "source": "https://bsky.app/profile/gothburz.bsky.social/post/3lfq4m2bww42z", "content": "", "creation_timestamp": "2025-01-14T20:45:27.115877Z"}, {"uuid": "3595ad33-597e-4290-ba2a-f0fcc7693a96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47796", "type": "seen", "source": "https://t.me/cvedetector/15155", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47796 - OFFIS DCMTK DICOM File Out-of-Bounds Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47796 \nPublished : Jan. 13, 2025, 3:15 p.m. | 41\u00a0minutes ago \nDescription : An improper array index validation vulnerability exists in the nowindow functionality of OFFIS DCMTK 3.6.8. A specially crafted DICOM file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability. \nSeverity: 8.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T17:04:38.000000Z"}]}