{"vulnerability": "cve-2024-10106", "sightings": [{"uuid": "a65643bd-3a57-496b-9198-6b0c34fe86d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10106", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113798982541004567", "content": "", "creation_timestamp": "2025-01-09T14:57:50.562309Z"}, {"uuid": "fc585f7a-542e-469b-a332-3d9029d05a90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10106", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfcxty2wea2f", "content": "", "creation_timestamp": "2025-01-09T15:15:47.651266Z"}, {"uuid": "3c9c7f4a-419c-468f-9038-1a2e79ae2b3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10106", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfcz4lrmkl2i", "content": "", "creation_timestamp": "2025-01-09T15:38:31.103703Z"}, {"uuid": "7727da92-7839-4312-aa08-43329d7b39ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10106", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-027-03", "content": "", "creation_timestamp": "2026-01-27T11:00:00.000000Z"}, {"uuid": "b054f0b6-9cdf-4313-a15e-21c535f589ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10106", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/959", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10106\n\ud83d\udd39 Description: A buffer overflow vulnerability in the packet handoff plugin allows an attacker to overwrite memory outside the plugin's buffer.\n\ud83d\udccf Published: 2025-01-09T14:56:47.355Z\n\ud83d\udccf Modified: 2025-01-09T14:56:47.355Z\n\ud83d\udd17 References:\n1. https://github.com/SiliconLabs/simplicity_sdk/releases\n2. https://community.silabs.com/069Vm00000I1JawIAF", "creation_timestamp": "2025-01-09T15:14:42.000000Z"}, {"uuid": "4263e0a0-01ba-4d28-8e26-858f3e813ea9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10106", "type": "seen", "source": "https://t.me/cvedetector/14849", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10106 - Citrix NetScaler Packet Handoff Plugin Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-10106 \nPublished : Jan. 9, 2025, 3:15 p.m. | 39\u00a0minutes ago \nDescription : A buffer overflow vulnerability in the packet handoff plugin allows an attacker to overwrite memory outside the plugin's buffer. \nSeverity: 3.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T16:55:40.000000Z"}]}