{"vulnerability": "cve-2024-3549", "sightings": [{"uuid": "f970b47b-0616-4e4c-b938-8f828132428e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-35498", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113782858275011222", "content": "", "creation_timestamp": "2025-01-06T18:37:14.018081Z"}, {"uuid": "4c3748fd-3f86-4be2-a5d1-b573268a83e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-35498", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf3tu3y3o525", "content": "", "creation_timestamp": "2025-01-06T19:15:39.263098Z"}, {"uuid": "724439ee-eb8f-4d5d-9503-400622a59d2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-35498", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf3vn7hzsr2e", "content": "", "creation_timestamp": "2025-01-06T19:47:36.330089Z"}, {"uuid": "081cd925-1a42-4a9a-bbdb-27f1e7a39cf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-35495", "type": "seen", "source": "https://t.me/cvedetector/6676", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-35495 - TP-Link Telemetry Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-35495 \nPublished : Sept. 30, 2024, 6:15 p.m. | 31\u00a0minutes ago \nDescription : An Information Disclosure vulnerability in the Telemetry component in TP-Link Kasa KP125M V1.0.0 and Tapo P125M 1.0.0 Build 220930 Rel.143947 allows attackers to observe device state via observing network traffic. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-30T20:50:29.000000Z"}, {"uuid": "cafe63dd-4ea6-4528-865a-7dccdc838f5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-35498", "type": "seen", "source": "https://t.me/cvedetector/14403", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-35498 - Grav Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-35498 \nPublished : Jan. 6, 2025, 7:15 p.m. | 45\u00a0minutes ago \nDescription : A cross-site scripting (XSS) vulnerability in Grav v1.7.45 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-06T21:07:51.000000Z"}]}