{"vulnerability": "CVE-2024-2817", "sightings": [{"uuid": "8ca9347e-502c-4592-b665-ec7cdeecf403", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28172", "type": "seen", "source": "https://t.me/cvedetector/3142", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-28172 - Intel Trace Analyzer and Collector Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-28172 \nPublished : Aug. 14, 2024, 2:15 p.m. | 39\u00a0minutes ago \nDescription : Uncontrolled search path for some Intel(R) Trace Analyzer and Collector software before version 2022.1 may allow an authenticated user to potentially enable escalation of privilege via local access. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-14T17:23:08.000000Z"}, {"uuid": "3d81f653-0dd2-41f2-a0d7-031c38902340", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28175", "type": "seen", "source": "https://t.me/ctinow/207227", "content": "https://ift.tt/IOtTlsF\nCVE-2024-28175", "creation_timestamp": "2024-03-13T22:26:47.000000Z"}, {"uuid": "255b0774-762e-42cd-90da-798bc3f18c82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28175", "type": "seen", "source": "https://t.me/ctinow/207251", "content": "https://ift.tt/IGCJRzT\nCVE-2024-28175", "creation_timestamp": "2024-03-13T22:36:48.000000Z"}, {"uuid": "cf1e9a4c-56b7-46a2-b3c3-6b8685f7a654", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28175", "type": "seen", "source": "https://t.me/ctinow/207245", "content": "https://ift.tt/IOtTlsF\nCVE-2024-28175", "creation_timestamp": "2024-03-13T22:31:49.000000Z"}, {"uuid": "6ba91050-824d-4ad1-b3d4-0a3a6dc1c4a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28176", "type": "seen", "source": "https://t.me/ctinow/204346", "content": "https://ift.tt/XnGNjf5\nCVE-2024-28176", "creation_timestamp": "2024-03-10T21:16:32.000000Z"}, {"uuid": "d462ecb5-0897-486f-878b-5cf01f2ee05e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28179", "type": "seen", "source": "Telegram/s9mhSLEbTpYi3l9dlWQ8mlfwhKavjrB33ApVPKx6vJLOJ-DL", "content": "", "creation_timestamp": "2025-02-21T22:10:25.000000Z"}, {"uuid": "7fe8ed37-aef1-4569-8790-64fc340c7a84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28170", "type": "seen", "source": "https://t.me/cvedetector/5738", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-28170 - Intel RAID Web Console Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-28170 \nPublished : Sept. 16, 2024, 5:16 p.m. | 14\u00a0minutes ago \nDescription : Improper access control in Intel(R) RAID Web Console all versions may allow an authenticated user to potentially enable information disclosure via local access. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-16T19:32:28.000000Z"}, {"uuid": "38b58557-63f7-4b37-90c7-92ddaeef6e6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28176", "type": "seen", "source": "https://t.me/ctinow/203727", "content": "https://ift.tt/F0n1GCL\nCVE-2024-28176", "creation_timestamp": "2024-03-09T02:31:49.000000Z"}, {"uuid": "9f72931f-923d-4640-b04e-cfd223e2c303", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28176", "type": "seen", "source": "https://t.me/ctinow/203723", "content": "https://ift.tt/F0n1GCL\nCVE-2024-28176", "creation_timestamp": "2024-03-09T02:26:40.000000Z"}, {"uuid": "5e44cf9c-9e13-4ec4-94b2-95510aef0a39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28173", "type": "seen", "source": "https://t.me/ctinow/201634", "content": "https://ift.tt/tnGU9I5\nCVE-2024-28173", "creation_timestamp": "2024-03-06T18:27:03.000000Z"}]}