{"vulnerability": "cve-2024-3954", "sightings": [{"uuid": "aa557bdc-6ae6-47d0-aca0-3d907a342948", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39549", "type": "seen", "source": "https://t.me/cvedetector/17314", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39564 - Juniper Junos OS/ Junos OS Evolved Double-Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39564 \nPublished : Feb. 5, 2025, 4:15 p.m. | 1\u00a0hour, 48\u00a0minutes ago \nDescription : This is a similar, but different vulnerability than the issue reported as CVE-2024-39549.  \n  \nA\u00a0double-free vulnerability\u00a0in the routing process daemon (rpd) of\u00a0Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to log the bad path attribute. This double free of memory is causing an rpd crash, leading to a Denial of Service (DoS).  \n  \n  \nThis issue affects:  \n  \nJunos OS:\u00a0  *  from 22.4 before 22.4R3-S4.  \n  \n  \nJunos OS Evolved:  *  from 22.4 before 22.4R3-S4-EVO. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T19:09:22.000000Z"}, {"uuid": "e9016f1b-2bf8-4a3f-82dd-c6c05a05e9e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39543", "type": "seen", "source": "https://t.me/cvedetector/685", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39543 - A Buffer Copy without Checking Size of Input\u00a0vulne\", \n  \"Content\": \"CVE ID : CVE-2024-39543 \nPublished : July 11, 2024, 5:15 p.m. | 42\u00a0minutes ago \nDescription : A Buffer Copy without Checking Size of Input\u00a0vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to send specific RPKI-RTR packets resulting in a crash,\u00a0creating a Denial of Service (DoS) condition.\u00a0Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.  \n  \nThis issue affects\u00a0  \n  \nJunos OS:\u00a0  \n  \n  \n  \n  *  All versions before 21.2R3-S8,\u00a0  \n  *  from 21.4 before 21.4R3-S8,  \n  *  from 22.2 before 22.2R3-S4,\u00a0  \n  *  from 22.3 before 22.3R3-S3,\u00a0  \n  *  from 22.4 before 22.4R3-S2,\u00a0  \n  *  from 23.2 before 23.2R2-S1,\u00a0  \n  *  from 23.4 before 23.4R2.  \n  \n  \n  \nJunos OS Evolved:  *  All versions before 21.2R3-S8-EVO,  \n  *  from 21.4 before 21.4R3-S8-EVO,  \n  *  from 22.2 before 22.2R3-S4-EVO,\u00a0  \n  *  from 22.3 before 22.3R3-S3-EVO,  \n  *  from 22.4 before 22.4R3-S2-EVO,\u00a0  \n  *  from 23.2 before 23.2R2-S1-EVO,  \n  *  from 23.4 before 23.4R2-EVO. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T20:00:02.000000Z"}, {"uuid": "289f6e97-7800-4dc0-aac3-c4d06f7da3a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39540", "type": "seen", "source": "https://t.me/cvedetector/689", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39540 - An Improper Check for Unusual or Exceptional Condi\", \n  \"Content\": \"CVE ID : CVE-2024-39540 \nPublished : July 11, 2024, 5:15 p.m. | 42\u00a0minutes ago \nDescription : An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on SRX Series, and MX Series with SPC3 allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).  \n  \nWhen an affected device receives specific valid TCP traffic, the pfe crashes and restarts leading to a momentary but complete service outage.  \n  \nThis issue affects Junos OS:  \n  \n21.2 releases from 21.2R3-S5 before 21.2R3-S6.  \n  \nThis issue does not affect earlier or later releases. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T20:00:07.000000Z"}, {"uuid": "a483957a-94e7-4cc8-8038-f19b44787325", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39542", "type": "seen", "source": "https://t.me/cvedetector/688", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39542 - An Improper Validation of Syntactic Correctness of\", \n  \"Content\": \"CVE ID : CVE-2024-39542 \nPublished : July 11, 2024, 5:15 p.m. | 42\u00a0minutes ago \nDescription : An Improper Validation of Syntactic Correctness of Input vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series with MPC10/11 or LC9600, MX304, and Junos OS Evolved on ACX Series and PTX Series allows an unauthenticated, network based attacker to cause a Denial-of-Service (DoS).  \n  \nThis issue can occur in two scenarios:  \n  \n1. If a device, which is configured with SFLOW and ECMP, receives specific valid transit traffic, which is subject to sampling, the packetio process crashes, which in turn leads to an evo-aftman crash and causes the FPC to stop working until it is restarted. (This scenario is only applicable to PTX but not to ACX or MX.)  \n  \n2. If a device receives a malformed CFM packet on an interface configured with CFM, the packetio process crashes, which in turn leads to an evo-aftman crash and causes the FPC to stop working until it is restarted.\u00a0Please note that the CVSS score is for the formally more severe issue 1.  \n  \nThe CVSS score for scenario 2. is: 6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)  \n  \n  \n  \n  \nThis issue affects Junos OS:  \n  \n  \n  \n  *  All versions before\u00a021.2R3-S4,  \n  *  21.4 versions before 21.4R2,  \n  *  22.2 versions before 22.2R3-S2;\u00a0  \n  \n  \n  \n  \nJunos OS Evolved:  \n  \n  \n  \n  \n  *  All versions before\u00a021.2R3-S8-EVO,  \n  *  21.4 versions before 21.4R2-EVO. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T20:00:06.000000Z"}, {"uuid": "0e51da4a-b5e4-48e0-8284-d076b7d74890", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39548", "type": "seen", "source": "https://t.me/cvedetector/684", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39548 - An Uncontrolled Resource Consumption vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39548 \nPublished : July 11, 2024, 5:15 p.m. | 42\u00a0minutes ago \nDescription : An Uncontrolled Resource Consumption vulnerability in the aftmand process of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to consume memory resources, resulting in a Denial of Service (DoS) condition. The processes do not recover on their own and must be manually restarted.  \n  \nThis issue affects both IPv4 and IPv6.\u00a0  \n  \nChanges in memory usage can be monitored using the following CLI command:  \nuser@device&gt; show system memory node  | grep evo-aftmann  \nThis issue affects Junos OS Evolved:\u00a0  \n  \n  \n  \n  *  All versions before 21.2R3-S8-EVO,\u00a0  \n  *  21.3 versions before 21.3R3-S5-EVO,\u00a0  \n  *  21.4 versions before 21.4R3-S5-EVO,\u00a0  \n  *  22.1 versions before 22.1R3-S4-EVO,\u00a0  \n  *  22.2 versions before 22.2R3-S4-EVO,  \n  *  22.3 versions before 22.3R3-S3-EVO,  \n  *  22.4 versions before 22.4R2-S2-EVO, 22.4R3-EVO,\u00a0  \n  *  23.2 versions before 23.2R1-S1-EVO, 23.2R2-EVO. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T19:59:58.000000Z"}, {"uuid": "c4bafbd3-af72-4600-81b4-5f0615926577", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39546", "type": "seen", "source": "https://t.me/cvedetector/683", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39546 - A Missing Authorization vulnerability in the Socke\", \n  \"Content\": \"CVE ID : CVE-2024-39546 \nPublished : July 11, 2024, 5:15 p.m. | 42\u00a0minutes ago \nDescription : A Missing Authorization vulnerability in the Socket Intercept (SI) command file interface of Juniper Networks Junos OS Evolved allows an authenticated, low-privilege local attacker to modify certain files, allowing the attacker to cause any command to execute with root privileges leading to privilege escalation ultimately compromising the system.\u00a0  \n  \nThis issue affects Junos OS Evolved:\u00a0  \n  \n  \n  \n  *  All versions prior to 21.2R3-S8-EVO,\u00a0  \n  *  21.4 versions prior to\u00a0 21.4R3-S6-EVO,\u00a0  \n  *  22.1 versions prior to 22.1R3-S5-EVO,\u00a0  \n  *  22.2 versions prior to 22.2R3-S3-EVO,\u00a0  \n  *  22.3 versions prior to 22.3R3-S3-EVO,\u00a0  \n  *  22.4 versions prior to 22.4R3-EVO,\u00a0  \n  *  23.2 versions prior to 23.2R2-EVO. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T19:59:57.000000Z"}, {"uuid": "01a4d230-2414-4fa3-acd6-a7a95ae24848", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39549", "type": "seen", "source": "https://t.me/cvedetector/681", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39549 - A Missing Release of Memory after Effective Lifeti\", \n  \"Content\": \"CVE ID : CVE-2024-39549 \nPublished : July 11, 2024, 5:15 p.m. | 42\u00a0minutes ago \nDescription : A Missing Release of Memory after Effective Lifetime vulnerability in the routing process daemon (rpd) of\u00a0Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to log the bad path attribute. This memory is not properly freed in all circumstances, leading to a Denial of Service (DoS).  \n  \nConsumed memory can be freed by manually restarting Routing Protocol Daemon (rpd).  \n  \nMemory utilization could be monitored by:\u00a0  \nuser@host&gt; show system memory or show system monitor memory status  \n  \nThis issue affects:  \n  \nJunos OS:\u00a0  *  All versions before 21.2R3-S8,\u00a0  \n  *  from 21.4 before 21.4R3-S8,  \n  \n  *  from 22.2 before 22.2R3-S4,\u00a0  \n  *  from 22.3 before 22.3R3-S3,\u00a0  \n  *  from 22.4 before 22.4R3-S3,  \n  *  from 23.2 before 23.2R2-S1,\u00a0  \n  *  from 23.4 before 23.4R1-S2, 23.4R2,  \n  *  from 24.2 before\u00a024.2R2-EVO.  \n  \n  \nJunos OS Evolved:  \n  *  All versions before 21.2R3-S8-EVO,   \n  *  from 21.4 before 21.4R3-S8-EVO,  \n  *  from 22.2 before 22.2R3-S4-EVO,   \n  *  from 22.3 before 22.3R3-S3-EVO,   \n  *  from 22.4 before 22.4R3-S3-EVO,  \n  \n  *  from 23.2 before 23.2R2-S1-EVO,   \n  *  from 23.4 before 23.4R1-S2, 23.4R2,  \n  *  from 24.2 before 24.2R2-EVO. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T19:59:55.000000Z"}, {"uuid": "0c4d76f7-baed-4ecf-833f-c2a952300111", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39541", "type": "seen", "source": "https://t.me/cvedetector/687", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39541 - An Improper Handling of Exceptional Conditions vul\", \n  \"Content\": \"CVE ID : CVE-2024-39541 \nPublished : July 11, 2024, 5:15 p.m. | 42\u00a0minutes ago \nDescription : An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS).  \n  \nWhen conflicting information (IP or ISO addresses) about a node is added to the Traffic Engineering (TE) database and then a subsequent operation attempts to process these, rpd will crash and restart.  \n  \nThis issue affects:  \n  \nJunos OS:  \n  \n  \n  \n  *  22.4 versions before 22.4R3-S1,  \n  *  23.2 versions before 23.2R2,\u00a0  \n  *  23.4 versions before 23.4R1-S1, 23.4R2,\u00a0  \n  \n  \n  \n  \nThis issue does not affect Junos OS versions earlier than 22.4R1.  \n  \nJunos OS Evolved:  \n  \n  \n  \n  *  22.4-EVO versions before 22.4R3-S2-EVO,  \n  *  23.2-EVO versions before 23.2R2-EVO,  \n  *  23.4-EVO versions before 23.4R1-S1-EVO, 23.4R2-EVO,  \n  \n  \n  \n  \n  \n  \nThis issue does not affect Junos OS Evolved versions earlier than   \n  \nbefore 22.4R1. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T20:00:05.000000Z"}, {"uuid": "e97c69a3-1e65-4c15-9abf-baa9e7fcea81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39549", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhgxsjbsnx2r", "content": "", "creation_timestamp": "2025-02-05T16:16:01.149163Z"}, {"uuid": "877c9071-0923-47bb-b97d-df9c1f383f36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39549", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5563", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-39549\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: A Missing Release of Memory after Effective Lifetime vulnerability in the routing process daemon (rpd) of\u00a0Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to log the bad path attribute. This memory is not properly freed in all circumstances, leading to a Denial of Service (DoS).\n\nConsumed memory can be freed by manually restarting Routing Protocol Daemon (rpd).\n\nMemory utilization could be monitored by:\u00a0\nuser@host&gt; show system memory or show system monitor memory status\n\nThis issue affects:\n\nJunos OS:\u00a0  *  All versions before 21.2R3-S8,\u00a0\n  *  from 21.4 before 21.4R3-S8,\n\n  *  from 22.2 before 22.2R3-S4,\u00a0\n  *  from 22.3 before 22.3R3-S3,\u00a0\n  *  from 22.4 before 22.4R3-S3,\n  *  from 23.2 before 23.2R2-S1,\u00a0\n  *  from 23.4 before 23.4R1-S2, 23.4R2.\n\n\nJunos OS Evolved:\n  *  All versions before 21.2R3-S8-EVO, \n  *  from 21.4 before 21.4R3-S8-EVO,\n  *  from 22.2 before 22.2R3-S4-EVO, \n  *  from 22.3 before 22.3R3-S3-EVO, \n  *  from 22.4 before 22.4R3-S3-EVO,\n\n  *  from 23.2 before 23.2R2-S1-EVO, \n  *  from 23.4 before 23.4R1-S2-EVO, 23.4R2-EVO.\n\ud83d\udccf Published: 2024-07-11T16:27:19.238Z\n\ud83d\udccf Modified: 2025-02-26T18:16:27.497Z\n\ud83d\udd17 References:\n1. https://supportportal.juniper.net/JSA83011", "creation_timestamp": "2025-02-26T18:24:07.000000Z"}, {"uuid": "505c54df-7fa3-4b73-b0b1-cac78069c736", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39549", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5562", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-39564\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: This is a similar, but different vulnerability than the issue reported as CVE-2024-39549.\n\nA\u00a0double-free vulnerability\u00a0in the routing process daemon (rpd) of\u00a0Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to log the bad path attribute. This double free of memory is causing an rpd crash, leading to a Denial of Service (DoS).\n\n\nThis issue affects:\n\nJunos OS:\u00a0  *  from 22.4 before 22.4R3-S4.\n\n\nJunos OS Evolved:  *  from 22.4 before 22.4R3-S4-EVO.\n\ud83d\udccf Published: 2025-02-05T15:31:23.063Z\n\ud83d\udccf Modified: 2025-02-26T18:16:35.494Z\n\ud83d\udd17 References:\n1. https://supportportal.juniper.net/JSA83011", "creation_timestamp": "2025-02-26T18:24:06.000000Z"}, {"uuid": "7f29dec4-412e-4786-820e-8822b7f46da8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39545", "type": "seen", "source": "https://t.me/cvedetector/686", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39545 - An Improper Check for Unusual or Exceptional Condi\", \n  \"Content\": \"CVE ID : CVE-2024-39545 \nPublished : July 11, 2024, 5:15 p.m. | 42\u00a0minutes ago \nDescription : An Improper Check for Unusual or Exceptional Conditions vulnerability in the the IKE daemon (iked) of Juniper Networks Junos OS on SRX Series, MX Series with SPC3 and NFX350 allows allows an unauthenticated, network-based attacker sending specific mismatching parameters as part of the IPsec negotiation to trigger an iked crash leading to Denial of Service (DoS).  \n  \nThis issue is applicable to all platforms that run iked.\u00a0This issue affects Junos OS on SRX Series, MX Series with SPC3 and NFX350:\u00a0  \n  \n  \n  \n  *  All versions before 21.2R3-S8,\u00a0  \n  *  from 21.4 before 21.4R3-S7,\u00a0  \n  *  from 22.1 before 22.1R3-S2,\u00a0  \n  *  from 22.2 before 22.2R3-S1,\u00a0  \n  *  from 22.3 before 22.3R2-S1, 22.3R3,\u00a0  \n  *  from 22.4 before 22.4R1-S2, 22.4R2, 22.4R3. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T20:00:03.000000Z"}, {"uuid": "12aaab56-5085-4476-abf8-a13ce03595cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39549", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113952018883330797", "content": "", "creation_timestamp": "2025-02-05T15:36:59.984391Z"}]}