{"vulnerability": "CVE-2024-39695", "sightings": [{"uuid": "6a8d04be-96b9-4fa3-a447-b4e220127258", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39695", "type": "seen", "source": "https://github.blog/security/vulnerability-research/bugs-that-survive-the-heat-of-continuous-fuzzing/", "content": "", "creation_timestamp": "2025-12-29T21:01:14.000000Z"}, {"uuid": "f835d1c4-f6a0-4e77-b452-f69d47d94b49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39695", "type": "seen", "source": "https://t.me/cvedetector/189", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39695 - Exiv2 is a command-line utility and C++ library fo\", \n  \"Content\": \"CVE ID : CVE-2024-39695 \nPublished : July 8, 2024, 4:15 p.m. | 23\u00a0minutes ago \nDescription : Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 version v0.28.2. The vulnerability is in the parser for the ASF video format, which was a new feature in v0.28.0. The out-of-bounds read is triggered when Exiv2 is used to read the metadata of a crafted video file. The bug is fixed in version v0.28.3. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-08T18:40:32.000000Z"}]}