{"vulnerability": "cve-2024-3892", "sightings": [{"uuid": "bd43e309-7be6-44e5-94ba-1f96a26618a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-3892", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3262", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-3892\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2024-05-15T17:15:14.470\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://docs.telerik.com/devtools/winforms/knowledge-base/local-code-execution-vulnerability-cve-2024-3892\n2. https://docs.telerik.com/devtools/winforms/knowledge-base/local-code-execution-vulnerability-cve-2024-3892", "creation_timestamp": "2025-01-28T17:16:42.000000Z"}, {"uuid": "fcce1cae-0d9d-4c68-8bcb-b4b2ccf60461", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38925", "type": "seen", "source": "https://t.me/cvedetector/12292", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-38925 - Open Robotics Robotic Operating System 2 (ROS2) an\", \n  \"Content\": \"CVE ID : CVE-2024-38925 \nPublished : Dec. 6, 2024, 10:15 p.m. | 42\u00a0minutes ago \nDescription : Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble versions were discovered to contain a use-after-free via the nav2_amcl process. This vulnerability is triggered via remotely sending a request for change the value of dynamic-parameter`/amcl z_max` . \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-06T23:59:51.000000Z"}, {"uuid": "2bc5fe30-1fd0-4464-aa65-541ba8e1c0df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38924", "type": "seen", "source": "https://t.me/cvedetector/12297", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-38924 - Open Robotics Robotic Operating System 2 (ROS2) an\", \n  \"Content\": \"CVE ID : CVE-2024-38924 \nPublished : Dec. 6, 2024, 10:15 p.m. | 42\u00a0minutes ago \nDescription : Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble versions were discovered to contain a use-after-free via the nav2_amcl process. This vulnerability is triggered via remotely sending a request to change the value of dynamic-parameter`/amcl laser_model_type` . \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-06T23:59:58.000000Z"}, {"uuid": "324a39d7-c320-43e0-939f-cd6aeafb9f58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38922", "type": "seen", "source": "https://t.me/cvedetector/12295", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-38922 - Open Robotics Robotic Operating System 2 (ROS2) an\", \n  \"Content\": \"CVE ID : CVE-2024-38922 \nPublished : Dec. 6, 2024, 10:15 p.m. | 42\u00a0minutes ago \nDescription : Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble version was discovered to contain a heap overflow in the nav2_amcl process. This vulnerability is triggered via sending a crafted message to the component /initialpose. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-06T23:59:56.000000Z"}, {"uuid": "b5779501-1e03-4b6c-b153-c0251225895e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38921", "type": "seen", "source": "https://t.me/cvedetector/12294", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-38921 - Open Robotics Robotic Operating System 2 (ROS2) an\", \n  \"Content\": \"CVE ID : CVE-2024-38921 \nPublished : Dec. 6, 2024, 10:15 p.m. | 42\u00a0minutes ago \nDescription : Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble versions were discovered to contain a use-after-free via the nav2_amcl process. This vulnerability is triggered via remotely sending a request for change the value of dynamic-parameter`/amcl z_rand ` . \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-06T23:59:56.000000Z"}, {"uuid": "7be90059-95b3-4fb5-a90e-c2a1575d625f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38927", "type": "seen", "source": "https://t.me/cvedetector/12287", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-38927 - Open Robotics Robotic Operating System 2 (ROS2) an\", \n  \"Content\": \"CVE ID : CVE-2024-38927 \nPublished : Dec. 6, 2024, 10:15 p.m. | 42\u00a0minutes ago \nDescription : Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble versions were discovered to contain a use-after-free via the nav2_amcl process. This vulnerability is triggered via remotely sending a request to change the value of dynamic-parameter `/amcl do_beamskip`. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-06T23:59:44.000000Z"}, {"uuid": "216dde39-7021-4a21-8658-06ba3a1f1b84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38926", "type": "seen", "source": "https://t.me/cvedetector/12286", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-38926 - Open Robotics Robotic Operating System 2 (ROS2) an\", \n  \"Content\": \"CVE ID : CVE-2024-38926 \nPublished : Dec. 6, 2024, 10:15 p.m. | 42\u00a0minutes ago \nDescription : Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble versions were discovered to contain a use-after-free via the nav2_amcl process. This vulnerability is triggered via remotely sending a request for change the value of dynamic-parameter `/amcl z_short`. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-06T23:59:44.000000Z"}, {"uuid": "2d04d437-8372-4b16-9062-06a6c0830284", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38923", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113608005277618246", "content": "", "creation_timestamp": "2024-12-06T21:29:48.725726Z"}, {"uuid": "85fe6a25-933e-4fff-ba9c-7ada668baac4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38921", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113607970399497654", "content": "", "creation_timestamp": "2024-12-06T21:20:56.647560Z"}, {"uuid": "0957942c-6e49-4c1e-96d2-9affdf369e04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38923", "type": "seen", "source": "https://t.me/cvedetector/12296", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-38923 - Open Robotics Robotic Operating System 2 (ROS2) an\", \n  \"Content\": \"CVE ID : CVE-2024-38923 \nPublished : Dec. 6, 2024, 10:15 p.m. | 42\u00a0minutes ago \nDescription : Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble versions were discovered to contain a use-after-free via the nav2_amcl process. This vulnerability is triggered via remotely sending a request to change the value of dynamic-parameter`/amcl odom_frame_id` . \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-06T23:59:57.000000Z"}, {"uuid": "12d09417-09e4-4ffb-8484-55fbc4b71d67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38920", "type": "seen", "source": "https://t.me/cvedetector/12147", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-38920 - Open Robotics Robotic Operating System 2 (ROS2) an\", \n  \"Content\": \"CVE ID : CVE-2024-38920 \nPublished : Dec. 5, 2024, 11:15 p.m. | 42\u00a0minutes ago \nDescription : Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble versions were discovered to contain a use-after-free via the nav2_amcl process. This vulnerability is triggerd via remotely sending a request for change the value of dynamic-parameter`/amcl max_beams` . \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-06T01:23:55.000000Z"}, {"uuid": "06d011f3-bce4-4cd2-8c3a-c3d3c969c4f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38924", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113608005291747963", "content": "", "creation_timestamp": "2024-12-06T21:29:49.083182Z"}, {"uuid": "0c5b186b-4d01-480c-b6f3-9ea5bafbf1c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38926", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113608031442391525", "content": "", "creation_timestamp": "2024-12-06T21:36:29.027027Z"}, {"uuid": "03515dd4-272d-4d5a-a9af-4fa65cceafbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38927", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113608031457984133", "content": "", "creation_timestamp": "2024-12-06T21:36:29.071526Z"}, {"uuid": "7094bd5e-39a6-4a66-bfc7-4fce9c0b71e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38922", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113607970415545081", "content": "", "creation_timestamp": "2024-12-06T21:20:58.667212Z"}, {"uuid": "2c332ea5-2146-4f78-90a8-deaf5336bad8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38925", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113608031427650702", "content": "", "creation_timestamp": "2024-12-06T21:36:28.981530Z"}]}