{"vulnerability": "cve-2024-51406", "sightings": [{"uuid": "fd0a3094-73e8-4a47-b909-dba24a95ed84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51406", "type": "seen", "source": "https://t.me/cvedetector/9578", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51406 - Floodlight SDN OpenFlow Controller LLDP Packet Forgery permetting Cluster and Host Discovery Evasion\", \n  \"Content\": \"CVE ID : CVE-2024-51406 \nPublished : Nov. 1, 2024, 2:15 p.m. | 39\u00a0minutes ago \nDescription : Floodlight SDN Open Flow Controller v.1.2 has an issue that allows local hosts to build fake LLDP packets that allow specific clusters to be missed by Floodlight, which in turn leads to missed hosts inside and outside the cluster. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-01T16:10:47.000000Z"}]}