{"vulnerability": "CVE-2024-52333", "sightings": [{"uuid": "4c1420a8-08aa-4e74-a653-adb3c552ed10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52333", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113821491830819005", "content": "", "creation_timestamp": "2025-01-13T14:22:15.750640Z"}, {"uuid": "97d79a1f-a6df-4176-a267-d4dd4acbcdc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52333", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfmzoz67mw2p", "content": "", "creation_timestamp": "2025-01-13T15:15:26.135320Z"}, {"uuid": "db8190d5-6083-4b01-bbd9-57a54e0f5bd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52333", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfn37uk6pl2g", "content": "", "creation_timestamp": "2025-01-13T15:42:45.464901Z"}, {"uuid": "75480896-7fdc-494e-8543-07a2b78a6865", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52333", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfn37v2flc2y", "content": "", "creation_timestamp": "2025-01-13T15:42:46.627840Z"}, {"uuid": "02397930-02b2-48a4-8bd8-b0c8257f6a0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52333", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113821831184460017", "content": "", "creation_timestamp": "2025-01-13T15:48:33.400561Z"}, {"uuid": "40831199-9a12-4fc8-ad46-d836d1ed7098", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52333", "type": "seen", "source": "https://t.me/cvedetector/15154", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52333 - A foundry OFFIS DCMTK Array Index Validation Bypass Out-of-Bounds Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52333 \nPublished : Jan. 13, 2025, 3:15 p.m. | 41\u00a0minutes ago \nDescription : An improper array index validation vulnerability exists in the determineMinMax functionality of OFFIS DCMTK 3.6.8. A specially crafted DICOM file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability. \nSeverity: 8.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T17:04:37.000000Z"}]}