{"vulnerability": "CVE-2024-56827", "sightings": [{"uuid": "c7712136-e2d7-4274-a8b5-bfb0fbae3750", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56827", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113796354761703507", "content": "", "creation_timestamp": "2025-01-09T03:49:34.446318Z"}, {"uuid": "cf6905f6-0657-48f4-b686-55e032d44082", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56827", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfbsxvlsvk2k", "content": "", "creation_timestamp": "2025-01-09T04:15:51.045914Z"}, {"uuid": "001cf45c-5f8c-41bc-85db-804fae54593a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56827", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfbuawwmje2k", "content": "", "creation_timestamp": "2025-01-09T04:38:49.940261Z"}, {"uuid": "350b330b-93ce-4be3-9cbf-f067aa59fc60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56827", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/883", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56827\n\ud83d\udd39 Description: A flaw was found in the OpenJPEG project. A heap buffer overflow condition may be triggered when certain options are specified while using the opj_decompress utility.  This can lead to an application crash or other undefined behavior.\n\ud83d\udccf Published: 2025-01-09T03:40:30.512Z\n\ud83d\udccf Modified: 2025-01-09T03:40:30.512Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2024-56827\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2335174\n3. https://github.com/uclouvain/openjpeg/commit/e492644fbded4c820ca55b5e50e598d346e850e8\n4. https://github.com/uclouvain/openjpeg/issues/1564", "creation_timestamp": "2025-01-09T04:14:17.000000Z"}, {"uuid": "82b9256c-99c1-4a1f-b1c6-72544cc75d6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56827", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16088", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56827\n\ud83d\udd25 CVSS Score: 5.6 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H)\n\ud83d\udd39 Description: A flaw was found in the OpenJPEG project. A heap buffer overflow condition may be triggered when certain options are specified while using the opj_decompress utility.  This can lead to an application crash or other undefined behavior.\n\ud83d\udccf Published: 2025-01-09T03:40:30.512Z\n\ud83d\udccf Modified: 2025-05-13T09:15:21.784Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2025:7309\n2. https://access.redhat.com/security/cve/CVE-2024-56827\n3. https://bugzilla.redhat.com/show_bug.cgi?id=2335174\n4. https://github.com/uclouvain/openjpeg/commit/e492644fbded4c820ca55b5e50e598d346e850e8\n5. https://github.com/uclouvain/openjpeg/issues/1564", "creation_timestamp": "2025-05-13T09:30:36.000000Z"}, {"uuid": "83c6a6d7-4da1-4fd7-9493-c57a921b14b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56827", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8214", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56827\n\ud83d\udd25 CVSS Score: 5.6 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H)\n\ud83d\udd39 Description: A flaw was found in the OpenJPEG project. A heap buffer overflow condition may be triggered when certain options are specified while using the opj_decompress utility.  This can lead to an application crash or other undefined behavior.\n\ud83d\udccf Published: 2025-01-09T03:40:30.512Z\n\ud83d\udccf Modified: 2025-03-20T14:35:03.672Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2024-56827\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2335174\n3. https://github.com/uclouvain/openjpeg/commit/e492644fbded4c820ca55b5e50e598d346e850e8\n4. https://github.com/uclouvain/openjpeg/issues/1564", "creation_timestamp": "2025-03-20T15:18:29.000000Z"}, {"uuid": "6fe6e728-d03a-47ea-b376-88a374aaf04e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56827", "type": "seen", "source": "https://t.me/cvedetector/14770", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56827 - OpenJPEG Heap Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-56827 \nPublished : Jan. 9, 2025, 4:15 a.m. | 38\u00a0minutes ago \nDescription : A flaw was found in the OpenJPEG project. A heap buffer overflow condition may be triggered when certain options are specified while using the opj_decompress utility.  This can lead to an application crash or other undefined behavior. \nSeverity: 5.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T06:02:40.000000Z"}]}