{"uuid": "dea0a4c1-6f71-40ba-ac1a-9ee9a3791aa7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24880", "type": "published-proof-of-concept", "source": "https://t.me/breachdetector/218682", "content": "{\n  \"Source\": \"arvin_club\",\n  \"Content\": \"CVE-2023-24880 https://blog.google/threat-analysis-group/magniber-ransomware-actors-used-a-variant-of-microsoft-smartscreen-bypass GoogleMagniber ransomware actors used a variant of Microsoft SmartScreen bypass New research from Threat Analysis Group on Magniber's exploitation of Microsoft 0-day vulnerability.\", \n  \"author\": \"ARVIN\",\n  \"Detection Date\": \"16 Mar 2023\",\n  \"Type\": \"Data leak\"\n}\n\ud83d\udd39 t.me/breachdetector \ud83d\udd39", "creation_timestamp": "2023-03-16T19:55:48.000000Z"}