{"vulnerability": "CVE-2024-3605", "sightings": [{"uuid": "59380f52-451c-4f34-8849-03f27b5c7801", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-3605", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lg7ad6vcjx22", "content": "", "creation_timestamp": "2025-01-20T21:02:14.055965Z"}, {"uuid": "e4873176-1a54-41a7-a252-4b3cc48e11ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-3605", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3meovcejsy22h", "content": "", "creation_timestamp": "2026-02-12T21:03:27.644670Z"}, {"uuid": "9e8068d3-0a66-45bd-85fd-0a7585aec756", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-3605", "type": "seen", "source": "https://infosec.exchange/users/random_robbie/statuses/113826790893332300", "content": "", "creation_timestamp": "2025-01-14T12:49:54.698942Z"}, {"uuid": "6d09fa7a-1b4c-4f86-86c5-4c287b2a805a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-3605", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mjaqdooejt2o", "content": "", "creation_timestamp": "2026-04-11T21:03:05.092468Z"}, {"uuid": "018f86e4-72a6-4b15-bac3-7e042b61d9b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-36051", "type": "seen", "source": "https://t.me/cvedetector/7602", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-36051 - btcd Invalid Transaction Verification RCE\", \n  \"Content\": \"CVE ID : CVE-2024-36051 \nPublished : Oct. 10, 2024, 1:15 p.m. | 31\u00a0minutes ago \nDescription : In btcd before 0.24.2, removeOpcodeByData mishandles the consensus rules for legacy signature verification. There can be a standard transaction that would be considered valid by Bitcoin Core but invalid by btcd. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-10T15:55:21.000000Z"}, {"uuid": "cee381d5-2928-4ff5-ac62-37fd9717cfa3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-36052", "type": "seen", "source": "https://t.me/HackingInsights/844", "content": "\u200aWinRAR Update Patches Text Vulnerability (CVE-2024-33899, CVE-2024-36052)\n\nhttps://securityonline.info/winrar-update-patches-text-vulnerability-cve-2024-33899-cve-2024-36052/", "creation_timestamp": "2024-05-23T19:33:10.000000Z"}]}