{"vulnerability": "CVE-2024-54091", "sightings": [{"uuid": "72cc1082-886e-4cf7-ad5a-293e2a065269", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54091", "type": "seen", "source": "https://t.me/cvedetector/12498", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54091 - \"Parasolid Out-of-Bounds Write Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-54091 \nPublished : Dec. 10, 2024, 2:30 p.m. | 38\u00a0minutes ago \nDescription : A vulnerability has been identified in Parasolid V36.1 (All versions &lt; V36.1.225), Parasolid V37.0 (All versions &lt; V37.0.173), Parasolid V37.1 (All versions &lt; V37.1.109). The affected applications contain an out of bounds write vulnerability when parsing specially crafted PAR files.  \nThis could allow an attacker to execute code in the context of the current process. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T16:38:06.000000Z"}, {"uuid": "8842a5cf-694f-4993-bdf8-3f2e7c394f73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54091", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-347-04", "content": "", "creation_timestamp": "2024-12-12T11:00:00.000000Z"}, {"uuid": "366d85f4-9962-4dbb-b943-a100b8a80bd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54091", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-03", "content": "", "creation_timestamp": "2025-04-10T10:00:00.000000Z"}]}