{"vulnerability": "CVE-2024-3220", "sightings": [{"uuid": "95799845-6396-473e-a09a-470d87c4a866", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-3220", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114003188092204860", "content": "", "creation_timestamp": "2025-02-14T16:30:00.078165Z"}, {"uuid": "9a53b628-d7ca-428f-b4fd-9a6cf217aa59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-3220", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3li5oy2cjgy2i", "content": "", "creation_timestamp": "2025-02-14T17:09:16.873274Z"}, {"uuid": "d391f8e1-c4fa-4fdd-9192-0765e55c7a5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-3220", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li5pdf4kuz2e", "content": "", "creation_timestamp": "2025-02-14T17:15:37.651216Z"}, {"uuid": "a768eeb9-79e5-4525-9ef1-836e6bdc1b5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-3220", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0315/", "content": "", "creation_timestamp": "2026-03-18T00:00:00.000000Z"}, {"uuid": "797ff2c4-0ca0-4318-8008-e57dd35061b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-3220", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4506", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-3220\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: There is a defect in the CPython standard library module \u201cmimetypes\u201d where on Windows the default list of known file locations are writable meaning other users can create invalid files to cause MemoryError to be raised on Python runtime startup or have file extensions be interpreted as the incorrect file type.\n\nThis defect is caused by the default locations of Linux and macOS platforms (such as \u201c/etc/mime.types\u201d) also being used on Windows, where they are user-writable locations (\u201cC:\\etc\\mime.types\u201d).\n\nTo work-around this issue a user can call mimetypes.init() with an empty list (\u201c[]\u201d) on Windows platforms to avoid using the default list of known file locations.\n\ud83d\udccf Published: 2025-02-14T18:30:51Z\n\ud83d\udccf Modified: 2025-02-14T21:31:04Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-3220\n2. https://mail.python.org/archives/list/security-announce@python.org/thread/CDXW34ND2LSAOYAR5N6UNONP4ZBX4D6R\n3. http://www.openwall.com/lists/oss-security/2025/02/14/8", "creation_timestamp": "2025-02-14T22:11:08.000000Z"}, {"uuid": "2f37becc-e7c4-4202-8b75-75b7efa8858a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-3220", "type": "seen", "source": "https://t.me/cvedetector/18133", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-3220 - Windows Mimetypes Writable Default Locations Directory Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-3220 \nPublished : Feb. 14, 2025, 5:15 p.m. | 1\u00a0hour, 2\u00a0minutes ago \nDescription : There is a defect in the CPython standard library module \u201cmimetypes\u201d where on Windows the default list of known file locations are writable meaning other users can create invalid files to cause MemoryError to be raised on Python runtime startup or have file extensions be interpreted as the incorrect file type.  \n  \nThis defect is caused by the default locations of Linux and macOS platforms (such as \u201c/etc/mime.types\u201d) also being used on Windows, where they are user-writable locations (\u201cC:\\etc\\mime.types\u201d).  \n  \nTo work-around this issue a user can call mimetypes.init() with an empty list (\u201c[]\u201d) on Windows platforms to avoid using the default list of known file locations. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-14T19:57:10.000000Z"}]}