{"vulnerability": "CVE-2024-54094", "sightings": [{"uuid": "57fcba4d-58cc-408d-aa92-e6a12dd2fbbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54094", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113629106157954588", "content": "", "creation_timestamp": "2024-12-10T14:56:02.835599Z"}, {"uuid": "3de0e9b4-3097-40db-895e-6e6bcd8aa8c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54094", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-18T16:44:35.000000Z"}, {"uuid": "d54275a7-97a7-4a72-9745-4846b7d40abd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54094", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-16T23:16:38.000000Z"}, {"uuid": "6e21dd44-3575-4b41-9c4d-1cd164b00dc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54094", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-347-07", "content": "", "creation_timestamp": "2024-12-12T11:00:00.000000Z"}, {"uuid": "355f04ae-3b3f-4ddf-a350-d7f305913f57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54094", "type": "seen", "source": "https://t.me/cvedetector/12502", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54094 - Solid Edge Heap-Based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54094 \nPublished : Dec. 10, 2024, 2:30 p.m. | 38\u00a0minutes ago \nDescription : A vulnerability has been identified in Solid Edge SE2024 (All versions &lt; V224.0 Update 5). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T16:38:09.000000Z"}]}