{"vulnerability": "cve-2024-5409", "sightings": [{"uuid": "57fcba4d-58cc-408d-aa92-e6a12dd2fbbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54094", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113629106157954588", "content": "", "creation_timestamp": "2024-12-10T14:56:02.835599Z"}, {"uuid": "4d9356a8-1237-4a55-bdfd-53625676faf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54099", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113639602735961361", "content": "", "creation_timestamp": "2024-12-12T11:25:27.850016Z"}, {"uuid": "cc45959f-5403-4f8c-940a-29d26e3c4609", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54093", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-347-07", "content": "", "creation_timestamp": "2024-12-12T11:00:00.000000Z"}, {"uuid": "6e21dd44-3575-4b41-9c4d-1cd164b00dc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54094", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-347-07", "content": "", "creation_timestamp": "2024-12-12T11:00:00.000000Z"}, {"uuid": "01cd979a-0084-493e-aada-83f5a126cb29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54095", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-347-07", "content": "", "creation_timestamp": "2024-12-12T11:00:00.000000Z"}, {"uuid": "8842a5cf-694f-4993-bdf8-3f2e7c394f73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54091", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-347-04", "content": "", "creation_timestamp": "2024-12-12T11:00:00.000000Z"}, {"uuid": "9944df31-c5e3-4599-839e-9acccb0f7f52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54090", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhvjteztsi22", "content": "", "creation_timestamp": "2025-02-11T11:15:53.696418Z"}, {"uuid": "e7db0250-cb0b-4b25-a7f6-6339f43a287b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54090", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhvu4qsuhg2y", "content": "", "creation_timestamp": "2025-02-11T14:20:13.246377Z"}, {"uuid": "6a413ec9-de82-4679-a84e-99450067e189", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54092", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lmc6mbtvbv2e", "content": "", "creation_timestamp": "2025-04-08T09:40:27.334157Z"}, {"uuid": "d31cb9f5-f0d9-43cf-adc8-2c19645cf815", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54092", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114302183113806542", "content": "", "creation_timestamp": "2025-04-08T11:48:22.505389Z"}, {"uuid": "e45d80b8-ed64-43d3-8e9e-44b2a89ef2ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54092", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmcgsovwjq2c", "content": "", "creation_timestamp": "2025-04-08T12:07:15.883322Z"}, {"uuid": "08c6a814-f21b-4804-ae48-2c1f1ff1e780", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54092", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lmcvg5wqfq2g", "content": "", "creation_timestamp": "2025-04-08T16:28:37.993180Z"}, {"uuid": "05b118f4-eb4c-43a3-8e2c-80ee797d70e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54092", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-04", "content": "", "creation_timestamp": "2025-04-10T10:00:00.000000Z"}, {"uuid": "366d85f4-9962-4dbb-b943-a100b8a80bd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54091", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-03", "content": "", "creation_timestamp": "2025-04-10T10:00:00.000000Z"}, {"uuid": "eb322710-f3bf-4580-8787-a3843779cf59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54092", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-02", "content": "", "creation_timestamp": "2025-04-15T10:00:00.000000Z"}, {"uuid": "0b6b45ef-65ab-4f52-a302-07c686c365d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54095", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-16T23:16:38.000000Z"}, {"uuid": "b216d20e-6404-4665-8a40-9340838e2cf8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54093", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-16T23:16:38.000000Z"}, {"uuid": "d54275a7-97a7-4a72-9745-4846b7d40abd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54094", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-16T23:16:38.000000Z"}, {"uuid": "6670cb5e-a67f-4539-ad7d-3e1282cc16f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54090", "type": "seen", "source": "https://t.me/cvedetector/17701", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54090 - APOGEE PXC and TALON TC BACnet Out-of-Bounds Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54090 \nPublished : Feb. 11, 2025, 11:15 a.m. | 52\u00a0minutes ago \nDescription : A vulnerability has been identified in APOGEE PXC Series (BACnet) (All versions), APOGEE PXC Series (P2 Ethernet) (All versions), TALON TC Series (BACnet) (All versions). Affected devices contain an out-of-bounds read in the memory dump function.  \nThis could allow an attacker with Medium (MED) or higher privileges to cause the device to enter an insecure cold start state. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T13:10:34.000000Z"}, {"uuid": "72cc1082-886e-4cf7-ad5a-293e2a065269", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54091", "type": "seen", "source": "https://t.me/cvedetector/12498", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54091 - \"Parasolid Out-of-Bounds Write Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-54091 \nPublished : Dec. 10, 2024, 2:30 p.m. | 38\u00a0minutes ago \nDescription : A vulnerability has been identified in Parasolid V36.1 (All versions &lt; V36.1.225), Parasolid V37.0 (All versions &lt; V37.0.173), Parasolid V37.1 (All versions &lt; V37.1.109). The affected applications contain an out of bounds write vulnerability when parsing specially crafted PAR files.  \nThis could allow an attacker to execute code in the context of the current process. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T16:38:06.000000Z"}, {"uuid": "17b1f552-5125-4114-9d60-a4e291206e89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54090", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113984882060309073", "content": "", "creation_timestamp": "2025-02-11T10:54:32.177820Z"}, {"uuid": "b22bde2b-4c74-4094-9ee8-6ab3fcce91b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54090", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-11", "content": "", "creation_timestamp": "2025-02-13T11:00:00.000000Z"}, {"uuid": "6189f2ad-bdbf-44a5-963e-1b7c43bd4ce6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54092", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114308178260624821", "content": "", "creation_timestamp": "2025-04-09T13:13:01.032986Z"}, {"uuid": "e4f9817e-9f27-4646-9d60-83481f652174", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54095", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-18T16:44:35.000000Z"}, {"uuid": "e3404ab3-d75c-44c9-abef-c90ebbbe4b43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54093", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-18T16:44:35.000000Z"}, {"uuid": "3de0e9b4-3097-40db-895e-6e6bcd8aa8c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54094", "type": "seen", "source": "MISP/be792712-f638-4d7d-b62d-4f5032e86764", "content": "", "creation_timestamp": "2025-09-18T16:44:35.000000Z"}, {"uuid": "035a566b-2788-4fbf-9b38-741ced61eed0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54095", "type": "seen", "source": "https://t.me/cvedetector/12503", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54095 - Solid Edge PAR File Integer Underflow Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-54095 \nPublished : Dec. 10, 2024, 2:30 p.m. | 38\u00a0minutes ago \nDescription : A vulnerability has been identified in Solid Edge SE2024 (All versions &lt; V224.0 Update 10). The affected application is vulnerable to integer underflow vulnerability which can be triggered while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T16:38:13.000000Z"}, {"uuid": "355f04ae-3b3f-4ddf-a350-d7f305913f57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54094", "type": "seen", "source": "https://t.me/cvedetector/12502", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54094 - Solid Edge Heap-Based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54094 \nPublished : Dec. 10, 2024, 2:30 p.m. | 38\u00a0minutes ago \nDescription : A vulnerability has been identified in Solid Edge SE2024 (All versions &lt; V224.0 Update 5). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T16:38:09.000000Z"}, {"uuid": "fe4bd8fd-88a6-4957-bce7-e9d39b197674", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54093", "type": "seen", "source": "https://t.me/cvedetector/12501", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54093 - Solid Edge Heap-Based Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54093 \nPublished : Dec. 10, 2024, 2:30 p.m. | 38\u00a0minutes ago \nDescription : A vulnerability has been identified in Solid Edge SE2024 (All versions &lt; V224.0 Update 5). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted ASM files. This could allow an attacker to execute code in the context of the current process. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T16:38:08.000000Z"}]}