{"vulnerability": "CVE-2024-53379", "sightings": [{"uuid": "40370ed1-7546-4a9c-b34a-c28e97b03010", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53379", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2851", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53379\n\ud83d\udd39 Description: Heap buffer overflow in the server site handshake implementation in Real Time Logic LLC's SharkSSL version (from 05/05/24) commit 64808a5e12c83b38f85c943dee0112e428dc2a43 allows a remote attacker to trigger a Denial-of-Service via a malformed Client-Hello message.\n\ud83d\udccf Published: 2025-01-23T00:00:00.000Z\n\ud83d\udccf Modified: 2025-01-23T22:15:48.953Z\n\ud83d\udd17 References:\n1. https://www.telekom.com/resource/blob/1086326/e6e800ec1e4e675ca0d8fdafab86ea8c/dl-250122-cve-2024-53379-data.pdf", "creation_timestamp": "2025-01-23T23:03:50.000000Z"}, {"uuid": "bc7d4c39-a04f-4e97-a4b4-ebbef18c7d1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53379", "type": "seen", "source": "https://t.me/cvedetector/16246", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53379 - \"Real Time Logic LLC's SharkSSL Heap Buffer Overflow\"\", \n  \"Content\": \"CVE ID : CVE-2024-53379 \nPublished : Jan. 23, 2025, 11:15 p.m. | 35\u00a0minutes ago \nDescription : Heap buffer overflow in the server site handshake implementation in Real Time Logic LLC's SharkSSL version (from 05/05/24) commit 64808a5e12c83b38f85c943dee0112e428dc2a43 allows a remote attacker to trigger a Denial-of-Service via a malformed Client-Hello message. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T01:00:33.000000Z"}, {"uuid": "8db817cf-274d-4205-b804-6de72ff9dede", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53379", "type": "seen", "source": "Telegram/1Fm6MVXwMgQXpvnMKXj8erCd38BB4e8QXVgCbq1ULvciBHWT", "content": "", "creation_timestamp": "2025-03-02T11:44:19.000000Z"}, {"uuid": "52c2d658-ba32-41f4-b7ce-26a048cb7ec3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53379", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lggz6z3f2r2h", "content": "", "creation_timestamp": "2025-01-23T23:15:42.169487Z"}, {"uuid": "df79cec4-5757-4fc2-b13c-eb837cbd694c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53379", "type": "published-proof-of-concept", "source": "Telegram/WlT7fxqJoMrEewkREVp6_yWmcg0i-LBQHbwkPVsrrsb1fvQf", "content": "", "creation_timestamp": "2025-04-28T18:21:05.000000Z"}, {"uuid": "7c7985d1-a1b9-4940-93ca-569cb75bf5d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53379", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgh3g3btpu2r", "content": "", "creation_timestamp": "2025-01-23T23:55:31.815267Z"}, {"uuid": "5da00208-a5c0-442f-81f2-9b3a91126a37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53379", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5764", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53379\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Heap buffer overflow in the server site handshake implementation in Real Time Logic LLC's SharkSSL version (from 05/05/24) commit 64808a5e12c83b38f85c943dee0112e428dc2a43 allows a remote attacker to trigger a Denial-of-Service via a malformed Client-Hello message.\n\ud83d\udccf Published: 2025-01-23T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-27T19:06:26.144Z\n\ud83d\udd17 References:\n1. https://www.telekom.com/resource/blob/1086326/e6e800ec1e4e675ca0d8fdafab86ea8c/dl-250122-cve-2024-53379-data.pdf", "creation_timestamp": "2025-02-27T19:26:05.000000Z"}]}