{"vulnerability": "CVE-2024-9448", "sightings": [{"uuid": "d5d53397-7605-4cf0-8271-f0919e595fe0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9448", "type": "seen", "source": "https://t.me/cvedetector/24872", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9448 - Arista EOS Traffic Policy Unvalidated Packet Forwarding\", \n  \"Content\": \"CVE ID : CVE-2024-9448 \nPublished : May 8, 2025, 8:15 p.m. | 1\u00a0hour, 18\u00a0minutes ago \nDescription : On affected platforms running Arista EOS with Traffic Policies configured the vulnerability will cause received untagged packets not to hit Traffic Policy rules that they are expected to hit. If the rule was to drop the packet, the packet will not be dropped and instead will be forwarded as if the rule was not in place. This could lead to packets being delivered to unexpected destinations. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-09T00:19:10.000000Z"}, {"uuid": "17a1ca7d-3720-4e22-9ebb-04c7498eb8f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9448", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3looxq2e52d2o", "content": "", "creation_timestamp": "2025-05-08T22:32:18.428936Z"}, {"uuid": "e4350406-d788-4759-a30e-03d25503b553", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9448", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3looojpjnavy2", "content": "", "creation_timestamp": "2025-05-08T19:48:23.612785Z"}]}