{"vulnerability": "CVE-2024-3275", "sightings": [{"uuid": "6b18259c-c901-4cfa-8b14-7b2ded4b8431", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32753", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114716215991477463", "content": "", "creation_timestamp": "2025-06-20T14:42:22.623407Z"}, {"uuid": "fea6d24f-a2df-4128-8462-508863d0b649", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32753", "type": "seen", "source": "https://t.me/cvedetector/673", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-32753 - Under certain circumstances the camera may be susc\", \n  \"Content\": \"CVE ID : CVE-2024-32753 \nPublished : July 11, 2024, 4:15 p.m. | 39\u00a0minutes ago \nDescription : Under certain circumstances the camera may be susceptible to known vulnerabilities associated with the JQuery versions prior to 3.5.0 third-party component \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T19:09:42.000000Z"}, {"uuid": "de6efe0b-7d8e-4c06-9338-30c0d875ef93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32754", "type": "seen", "source": "https://t.me/cvedetector/50", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-32754 - Under certain circumstances, when the controller i\", \n  \"Content\": \"CVE ID : CVE-2024-32754 \nPublished : July 4, 2024, 11:15 a.m. | 31\u00a0minutes ago \nDescription : Under certain circumstances, when the controller is in factory reset mode waiting for initial setup, it will broadcast its MAC address, serial number, and firmware version.  Once configured, the controller will no longer broadcast this information. \nSeverity: 3.1 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-04T13:55:10.000000Z"}, {"uuid": "8695f922-fd41-47ed-a890-593703dd17a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32759", "type": "seen", "source": "https://t.me/cvedetector/570", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-32759 - Under certain circumstances the Software House C\u25cfC\", \n  \"Content\": \"CVE ID : CVE-2024-32759 \nPublished : July 10, 2024, 6:15 p.m. | 35\u00a0minutes ago \nDescription : Under certain circumstances the Software House C\u25cfCURE 9000 installer will utilize weak credentials. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-10T20:58:55.000000Z"}, {"uuid": "9b1345d5-d1ee-4dbe-8571-967c85c67e4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32752", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114394746418260674", "content": "", "creation_timestamp": "2025-04-24T20:08:26.150910Z"}, {"uuid": "977f99b5-3ce8-465a-8c42-eb2a5034adf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-32754", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14224", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-32754\n\ud83d\udd25 CVSS Score: 3.1 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: Under certain circumstances, when the controller is in factory reset mode waiting for initial setup, it will broadcast its MAC address, serial number, and firmware version.  Once configured, the controller will no longer broadcast this information.\n\ud83d\udccf Published: 2024-07-04T10:43:46.161Z\n\ud83d\udccf Modified: 2025-05-01T03:55:33.268Z\n\ud83d\udd17 References:\n1. https://www.johnsoncontrols.com/trust-center/cybersecurity/security-advisories\n2. https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-01", "creation_timestamp": "2025-05-01T04:14:38.000000Z"}]}