{"vulnerability": "CVE-2024-5519", "sightings": [{"uuid": "e3ac246f-56f8-455f-8b80-fa305b85eaea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55196", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-15T13:28:31.000000Z"}, {"uuid": "eac84de1-65f3-4818-9098-a6f4bdcd80de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55196", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-16T03:45:01.000000Z"}, {"uuid": "ecb6b598-9fed-4be2-ba5f-f4bbbff209ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55193", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2860", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55193\n\ud83d\udd39 Description: OpenImageIO v3.1.0.0dev was discovered to contain a segmentation violation via the component /OpenImageIO/string_view.h.\n\ud83d\udccf Published: 2025-01-23T00:00:00.000Z\n\ud83d\udccf Modified: 2025-01-23T22:03:55.931Z\n\ud83d\udd17 References:\n1. https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4551", "creation_timestamp": "2025-01-23T23:04:03.000000Z"}, {"uuid": "86eb397e-583d-4f6f-97cf-5214f71ab246", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55194", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2859", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55194\n\ud83d\udd39 Description: OpenImageIO v3.1.0.0dev was discovered to contain a heap overflow via the component /OpenImageIO/fmath.h.\n\ud83d\udccf Published: 2025-01-23T00:00:00.000Z\n\ud83d\udccf Modified: 2025-01-23T22:04:33.244Z\n\ud83d\udd17 References:\n1. https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4552", "creation_timestamp": "2025-01-23T23:03:59.000000Z"}, {"uuid": "b0226760-778b-4f51-9ce0-5d8f1734b175", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55195", "type": "seen", "source": "https://t.me/cvedetector/16237", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55195 - OpenImageIO Image Buffer Allocation Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-55195 \nPublished : Jan. 23, 2025, 10:15 p.m. | 36\u00a0minutes ago \nDescription : An allocation-size-too-big bug in the component /imagebuf.cpp of OpenImageIO v3.1.0.0dev may cause a Denial of Service (DoS) when the program to requests to allocate too much space. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T00:10:15.000000Z"}, {"uuid": "1038ff97-9c52-4e19-9e41-a5136a66655c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55194", "type": "seen", "source": "https://t.me/cvedetector/16236", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55194 - OpenImageIO Heap Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-55194 \nPublished : Jan. 23, 2025, 10:15 p.m. | 36\u00a0minutes ago \nDescription : OpenImageIO v3.1.0.0dev was discovered to contain a heap overflow via the component /OpenImageIO/fmath.h. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T00:10:14.000000Z"}, {"uuid": "7d5888b9-67b5-4113-a86f-5ce93a7485e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55193", "type": "seen", "source": "https://t.me/cvedetector/16235", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55193 - OpenImageIO Integer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55193 \nPublished : Jan. 23, 2025, 10:15 p.m. | 36\u00a0minutes ago \nDescription : OpenImageIO v3.1.0.0dev was discovered to contain a segmentation violation via the component /OpenImageIO/string_view.h. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T00:10:13.000000Z"}, {"uuid": "903057f8-86be-4cc1-84df-95735e7269a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55192", "type": "seen", "source": "https://t.me/cvedetector/16234", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55192 - OpenImageIO Heap Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-55192 \nPublished : Jan. 23, 2025, 10:15 p.m. | 36\u00a0minutes ago \nDescription : OpenImageIO v3.1.0.0dev was discovered to contain a heap overflow via the component OpenImageIO_v3_1_0::farmhash::inlined::Fetch64(char const*). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T00:10:12.000000Z"}, {"uuid": "0cc6442e-4105-47cf-8d94-42c97af9e999", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55196", "type": "seen", "source": "https://t.me/cvedetector/13363", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55196 - GoPhish IMAP SMTP Credentials Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-55196 \nPublished : Dec. 19, 2024, 7:15 p.m. | 22\u00a0minutes ago \nDescription : Insufficiently Protected Credentials in the Mail Server Configuration in GoPhish v0.12.1 allows an attacker to access cleartext passwords for the configured IMAP and SMTP servers. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-19T20:40:34.000000Z"}, {"uuid": "12003e4f-b9c5-4c8d-9849-711f3b5a5dda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55196", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldolhmhffw2t", "content": "", "creation_timestamp": "2024-12-19T19:15:41.707758Z"}, {"uuid": "c4828928-ffba-4671-84ac-660c090fea95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55192", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgh3g2khmy2q", "content": "", "creation_timestamp": "2025-01-23T23:55:27.637851Z"}, {"uuid": "0b49b039-379d-40e7-9510-42e6ebcd0d7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55193", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgh3g2nxvd2q", "content": "", "creation_timestamp": "2025-01-23T23:55:28.228299Z"}, {"uuid": "19501c1a-da38-40f5-9b1c-709ce4fe0aa4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55194", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgh3g3343g2e", "content": "", "creation_timestamp": "2025-01-23T23:55:30.627220Z"}, {"uuid": "80681aee-19aa-4567-8d5a-08d1f9a967a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55195", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgh3g442h62k", "content": "", "creation_timestamp": "2025-01-23T23:55:36.647234Z"}, {"uuid": "e30a58df-eede-42dd-91c7-2be721c00cbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55193", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lggvu4bcxi2f", "content": "", "creation_timestamp": "2025-01-23T22:15:55.171683Z"}, {"uuid": "6ae8dce6-bbb2-4c7d-9bce-acfd1024504d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55194", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lggvu6ktc52j", "content": "", "creation_timestamp": "2025-01-23T22:15:57.689319Z"}, {"uuid": "f6c0fe6e-2199-4105-aa06-911ad6cc8b28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55195", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lggvuatnxf2t", "content": "", "creation_timestamp": "2025-01-23T22:16:00.080825Z"}, {"uuid": "d33b16a8-0bf3-4bab-a8af-1b6ca245148f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55195", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2858", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55195\n\ud83d\udd39 Description: An allocation-size-too-big bug in the component /imagebuf.cpp of OpenImageIO v3.1.0.0dev may cause a Denial of Service (DoS) when the program to requests to allocate too much space.\n\ud83d\udccf Published: 2025-01-23T00:00:00.000Z\n\ud83d\udccf Modified: 2025-01-23T22:05:21.930Z\n\ud83d\udd17 References:\n1. https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4553", "creation_timestamp": "2025-01-23T23:03:58.000000Z"}, {"uuid": "580070ba-c379-47ba-84f7-cac23cdf041c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55192", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2861", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55192\n\ud83d\udd39 Description: OpenImageIO v3.1.0.0dev was discovered to contain a heap overflow via the component OpenImageIO_v3_1_0::farmhash::inlined::Fetch64(char const*).\n\ud83d\udccf Published: 2025-01-23T00:00:00.000Z\n\ud83d\udccf Modified: 2025-01-23T22:03:04.630Z\n\ud83d\udd17 References:\n1. https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4550", "creation_timestamp": "2025-01-23T23:04:04.000000Z"}, {"uuid": "849b0969-44ad-4b5a-ac2e-799c0e146c65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55198", "type": "seen", "source": "https://t.me/cvedetector/20219", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55198 - Celk Sistemas Celk Saude User Enumeration Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55198 \nPublished : March 13, 2025, 3:15 p.m. | 41\u00a0minutes ago \nDescription : User Enumeration via Discrepancies in Error Messages in the Celk Sistemas Celk Saude v.3.1.252.1 password recovery functionality which allows a remote attacker to enumerate users through discrepancies in the responses. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-13T17:17:23.000000Z"}, {"uuid": "d2d71fdf-6f37-4b85-9111-65f651d5dd6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55199", "type": "seen", "source": "https://t.me/cvedetector/19976", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55199 - Celk Sistemas Celk Saude Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-55199 \nPublished : March 10, 2025, 6:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : A Stored Cross Site Scripting (XSS) vulnerability in Celk Sistemas Celk Saude v.3.1.252.1 allows a remote attacker to store JavaScript code inside a PDF file through the file upload feature. When the file is rendered, the injected code is executed on the user's browser. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T20:43:06.000000Z"}, {"uuid": "ff92b826-35c6-4b45-a8d8-8e145db97fc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55192", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3390", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55192\n\ud83d\udd25 CVSS Score: 9.8 (CVSS_V3)\n\ud83d\udd39 Description: OpenImageIO v3.1.0.0dev was discovered to contain a heap overflow via the component OpenImageIO_v3_1_0::farmhash::inlined::Fetch64(char const*).\n\ud83d\udccf Published: 2025-01-24T00:31:46Z\n\ud83d\udccf Modified: 2025-01-29T18:31:21Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-55192\n2. https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4550", "creation_timestamp": "2025-01-29T19:11:28.000000Z"}, {"uuid": "c2df2aea-9fb1-4b43-a396-292c833c12c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55199", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7025", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55199\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A Stored Cross Site Scripting (XSS) vulnerability in Celk Sistemas Celk Saude v.3.1.252.1 allows a remote attacker to store JavaScript code inside a PDF file through the file upload feature. When the file is rendered, the injected code is executed on the user's browser.\n\ud83d\udccf Published: 2025-03-10T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-10T17:10:53.517Z\n\ud83d\udd17 References:\n1. https://portswigger.net/web-security/cross-site-scripting/stored\n2. https://github.com/gabriel-bri/vulnerability-research/tree/main/CVE-2024-55199", "creation_timestamp": "2025-03-10T17:38:21.000000Z"}, {"uuid": "d460f4ef-b867-43c5-a7e5-bdfea3e7b25b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5519", "type": "seen", "source": "Telegram/H_TAUmBeJHpvDW0jqDIEnAl8Db0G-ySC0oJGUhSj5xvbg9XP", "content": "", "creation_timestamp": "2025-02-14T10:01:40.000000Z"}, {"uuid": "44766a66-ddd9-49e9-935b-fa2ddb2de0a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55194", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113880028388232876", "content": "", "creation_timestamp": "2025-01-23T22:28:52.118024Z"}, {"uuid": "62947bbd-936e-4ec1-ae6d-8085f13b3a01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55195", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113880028402380471", "content": "", "creation_timestamp": "2025-01-23T22:28:52.285900Z"}, {"uuid": "e908ed35-fa45-4082-8eca-36523d8d60fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55192", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113879933934042733", "content": "", "creation_timestamp": "2025-01-23T22:04:50.943872Z"}, {"uuid": "577073e9-1a3f-4e44-b4a3-59c7353f7672", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55193", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113879933948800600", "content": "", "creation_timestamp": "2025-01-23T22:04:51.450966Z"}, {"uuid": "1027493f-047b-4245-b978-721e4731551b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55192", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lggvtzyicx2x", "content": "", "creation_timestamp": "2025-01-23T22:15:52.755816Z"}]}