{"vulnerability": "cve-2024-1264", "sightings": [{"uuid": "78963fba-d36b-41da-b1f7-801ef9dffac8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12641", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lmuxy22atb2e", "content": "", "creation_timestamp": "2025-04-15T21:02:28.967958Z"}, {"uuid": "755552a8-dd78-433d-8da3-eefa44106289", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3224", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12647\n\ud83d\udd25 CVSS Score: 9.8 (CVSS_V3)\n\ud83d\udd39 Description: Buffer overflow in CPCA font download processing of Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *: Satera MF656Cdw/Satera MF654Cdw firmware v05.04 and earlier sold in Japan. Color imageCLASS MF656Cdw/Color imageCLASS MF654Cdw/Color imageCLASS MF653Cdw/Color imageCLASS MF652Cdw/Color imageCLASS LBP633Cdw/Color imageCLASS LBP632Cdw firmware v05.04 and earlier sold in US. i-SENSYS MF657Cdw/i-SENSYS MF655Cdw/i-SENSYS MF651Cdw/i-SENSYS LBP633Cdw/i-SENSYS LBP631Cdw firmware v05.04 and earlier sold in Europe.\n\ud83d\udccf Published: 2025-01-28T03:31:13Z\n\ud83d\udccf Modified: 2025-01-28T03:31:13Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-12647\n2. https://canon.jp/support/support-info/250127vulnerability-response\n3. https://psirt.canon/advisory-information/cp2025-001\n4. https://www.canon-europe.com/support/product-security/#news\n5. https://www.usa.canon.com/support/canon-product-advisories/service-notice-regarding-vulnerability-measure-against-buffer-overflow-for-laser-printers-and-small-office-multifunctional-printers", "creation_timestamp": "2025-01-28T04:09:26.000000Z"}, {"uuid": "16000005-c946-4792-8ab8-ab1d2fbf6cc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12644", "type": "seen", "source": "https://t.me/cvedetector/12971", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12644 - Chunghwa Telecom Tbm-Client Arbitrary File and CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12644 \nPublished : Dec. 16, 2024, 7:15 a.m. | 34\u00a0minutes ago \nDescription : The tbm-client from Chunghwa Telecom has an Arbitrary File vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection in the APIs, unauthenticated remote attackers could use these APIs through phishing. Additionally, one of the APIs contains an Absolute Path Traversal vulnerability. Attackers can copy arbitrary files on the user's system and paste them into any path, which poses a potential risk of information leakage or could consume hard drive space by copying files in large volumes. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-16T08:58:51.000000Z"}, {"uuid": "91b1c21b-2537-47bf-b733-fc753f0fc08a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12641", "type": "seen", "source": "https://t.me/cvedetector/12974", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12641 - Chunghwa Telecom TenderDocTransfer Cross-Site Scripting (XSS) and Command Injection\", \n  \"Content\": \"CVE ID : CVE-2024-12641 \nPublished : Dec. 16, 2024, 7:15 a.m. | 34\u00a0minutes ago \nDescription : TenderDocTransfer from Chunghwa Telecom has a Reflected Cross-site scripting vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection for the APIs, unauthenticated remote attackers could use specific APIs through phishing to execute arbitrary JavaScript code in the user\u2019s browser. Since the web server set by the application supports Node.Js features, attackers can further leverage this to run OS commands. \nSeverity: 9.6 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-16T08:58:56.000000Z"}, {"uuid": "457e7959-7d0a-49e6-8bbc-5becb4532dd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12646", "type": "seen", "source": "https://t.me/cvedetector/12973", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12646 - Chunghwa Telecom Topm-Client Absolute Path Traversal/CSRF ACK\", \n  \"Content\": \"CVE ID : CVE-2024-12646 \nPublished : Dec. 16, 2024, 7:15 a.m. | 34\u00a0minutes ago \nDescription : The topm-client from Chunghwa Telecom has an Arbitrary File Delete vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection in the APIs, unauthenticated remote attackers could use these APIs through phishing. Additionally, one of the APIs contains an Absolute Path Traversal vulnerability, allowing attackers to delete arbitrary files on the user's system. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-16T08:58:56.000000Z"}, {"uuid": "17aa09af-8dd2-415d-b27b-a6ad7ef8e760", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12645", "type": "seen", "source": "https://t.me/cvedetector/12972", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12645 - Chunghwa Telecom Topm-Client Arbitrary File Read and CSRF Weakness Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12645 \nPublished : Dec. 16, 2024, 7:15 a.m. | 34\u00a0minutes ago \nDescription : The topm-client from Chunghwa Telecom has an Arbitrary File Read vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection for the APIs, unauthenticated remote attackers could use these APIs through phishing. Additionally, one of the APIs contains a Relative Path Traversal vulnerability, allowing attackers to read arbitrary files on the user's system. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-16T08:58:55.000000Z"}, {"uuid": "05ad1f28-c4c8-4d33-b1d2-1866d11fbc2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1264", "type": "seen", "source": "https://t.me/ctinow/197402", "content": "https://ift.tt/csiI9Aa\nCVE-2024-1264 | Juanpao JPShop up to 1.5.02 UploadsController.php actionUpdate imgage unrestricted upload", "creation_timestamp": "2024-03-01T09:11:14.000000Z"}, {"uuid": "a2b8ed4d-bdff-4374-8b06-cce97d2e840d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12644", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113661174616006257", "content": "", "creation_timestamp": "2024-12-16T06:51:29.214024Z"}, {"uuid": "e4095f14-6b75-4dda-a0a2-723c86bd2396", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12645", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113661174631706111", "content": "", "creation_timestamp": "2024-12-16T06:51:29.279144Z"}, {"uuid": "abd7145e-9330-482b-a8da-66a831ce8aa7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12646", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113661200226119510", "content": "", "creation_timestamp": "2024-12-16T06:57:59.408497Z"}, {"uuid": "b6ee664d-d447-4460-8a69-edfba860a5f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lgv3u254m22z", "content": "", "creation_timestamp": "2025-01-29T13:40:33.083457Z"}, {"uuid": "aa3b2af6-2932-4ba8-a0f3-fe173bca0271", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12648", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lgv3u254m22z", "content": "", "creation_timestamp": "2025-01-29T13:40:33.122800Z"}, {"uuid": "2d1105b1-5d02-4be7-92d7-8cb7ac26c79a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12649", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lgv3u254m22z", "content": "", "creation_timestamp": "2025-01-29T13:40:33.158011Z"}, {"uuid": "534a03f5-5097-4519-b471-f749b96f4ec4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12649", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgrvbtqk7x2e", "content": "", "creation_timestamp": "2025-01-28T07:05:02.656458Z"}, {"uuid": "e36fffbc-5b35-4c79-8582-d1e46eead6d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-12647", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lgwxhtxbcc2b", "content": "", "creation_timestamp": "2025-01-30T07:27:27.465377Z"}, {"uuid": "aa900790-be30-4d07-876f-434875b40d43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lgsoanhcd22k", "content": "", "creation_timestamp": "2025-01-28T14:31:46.388833Z"}, {"uuid": "875339b4-c485-40ef-8206-f2805801541b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12648", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lgsoanu6gk2k", "content": "", "creation_timestamp": "2025-01-28T14:31:47.111996Z"}, {"uuid": "e80467ee-0f4a-4106-a50c-66d85e9e1160", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12649", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lgsoao7vnh2q", "content": "", "creation_timestamp": "2025-01-28T14:31:47.824342Z"}, {"uuid": "ad973c7c-fd24-4c4a-af73-a749f52a309f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12648", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113903251543751834", "content": "", "creation_timestamp": "2025-01-28T00:54:50.264702Z"}, {"uuid": "38669468-a89d-4ebf-9352-0c8b75ebe90a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12649", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113903698684985015", "content": "", "creation_timestamp": "2025-01-28T02:48:32.727504Z"}, {"uuid": "f66e6612-6cfc-4bd9-b312-7ef30369c583", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12649", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3m5hfe6lk7x2s", "content": "", "creation_timestamp": "2025-11-12T19:32:48.659943Z"}, {"uuid": "d71e75de-f12b-4b39-b7bd-97e986d51d52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12649", "type": "seen", "source": "MISP/d0bda5d9-8cbc-4c6c-8803-a5e3150f9ec2", "content": "", "creation_timestamp": "2025-09-01T19:03:02.000000Z"}, {"uuid": "bbb21530-3c68-4cf1-8efa-9baa2c5a718a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12648", "type": "seen", "source": "MISP/d0bda5d9-8cbc-4c6c-8803-a5e3150f9ec2", "content": "", "creation_timestamp": "2025-09-01T19:03:02.000000Z"}, {"uuid": "1fede94a-c73c-452e-bdcb-302837c856a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12649", "type": "seen", "source": "https://t.me/cvedetector/16568", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12649 - Canon Small Office Multifunction Printers and Laser Printers Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12649 \nPublished : Jan. 28, 2025, 1:15 a.m. | 1\u00a0hour, 53\u00a0minutes ago \nDescription : Buffer overflow in XPS data font processing of Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *: Satera MF656Cdw/Satera MF654Cdw firmware v05.04 and earlier sold in Japan. Color imageCLASS MF656Cdw/Color imageCLASS MF654Cdw/Color imageCLASS MF653Cdw/Color imageCLASS MF652Cdw/Color imageCLASS LBP633Cdw/Color imageCLASS LBP632Cdw firmware v05.04 and earlier sold in US. i-SENSYS MF657Cdw/i-SENSYS MF655Cdw/i-SENSYS MF651Cdw/i-SENSYS LBP633Cdw/i-SENSYS LBP631Cdw firmware v05.04 and earlier sold in Europe. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T04:34:48.000000Z"}, {"uuid": "794662eb-9bf8-4d58-8e7b-20c0efe70993", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12648", "type": "seen", "source": "https://t.me/cvedetector/16567", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12648 - Canon Small Office Multifunction Printers and Laser Printers Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12648 \nPublished : Jan. 28, 2025, 1:15 a.m. | 1\u00a0hour, 53\u00a0minutes ago \nDescription : Buffer overflow in TIFF data EXIF tag processing of Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *: Satera MF656Cdw/Satera MF654Cdw firmware v05.04 and earlier sold in Japan. Color imageCLASS MF656Cdw/Color imageCLASS MF654Cdw/Color imageCLASS MF653Cdw/Color imageCLASS MF652Cdw/Color imageCLASS LBP633Cdw/Color imageCLASS LBP632Cdw firmware v05.04 and earlier sold in US. i-SENSYS MF657Cdw/i-SENSYS MF655Cdw/i-SENSYS MF651Cdw/i-SENSYS LBP633Cdw/i-SENSYS LBP631Cdw firmware v05.04 and earlier sold in Europe. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T04:34:44.000000Z"}, {"uuid": "6a9eba76-66e3-4e7d-b639-11b2d05f668b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "https://t.me/cvedetector/16566", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12647 - Small Office Multifunction Printers and Laser Printers Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-12647 \nPublished : Jan. 28, 2025, 1:15 a.m. | 1\u00a0hour, 53\u00a0minutes ago \nDescription : Buffer overflow in CPCA font download processing of Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *: Satera MF656Cdw/Satera MF654Cdw firmware v05.04 and earlier sold in Japan. Color imageCLASS MF656Cdw/Color imageCLASS MF654Cdw/Color imageCLASS MF653Cdw/Color imageCLASS MF652Cdw/Color imageCLASS LBP633Cdw/Color imageCLASS LBP632Cdw firmware v05.04 and earlier sold in US. i-SENSYS MF657Cdw/i-SENSYS MF655Cdw/i-SENSYS MF651Cdw/i-SENSYS LBP633Cdw/i-SENSYS LBP631Cdw firmware v05.04 and earlier sold in Europe. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T04:34:43.000000Z"}, {"uuid": "2ef90945-f8ca-4c22-b280-05217e2efde0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1264", "type": "seen", "source": "https://t.me/ctinow/180453", "content": "https://ift.tt/DpcKjdl\nCVE-2024-1264", "creation_timestamp": "2024-02-07T01:26:41.000000Z"}, {"uuid": "5653a7ff-fd08-4136-be5c-e2060000971c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12648", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-074/", "content": "", "creation_timestamp": "2025-01-31T05:00:00.000000Z"}, {"uuid": "e1341090-9c7c-42fc-8216-8c3fa4c8e4ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lgwl3kmook2s", "content": "", "creation_timestamp": "2025-01-30T03:45:55.066680Z"}, {"uuid": "1749ada2-e607-4a9e-9d77-fa70b607f85b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lgyhrueimy2x", "content": "", "creation_timestamp": "2025-01-30T21:52:03.578486Z"}, {"uuid": "5c522419-eb26-4609-ae9c-8fbdf5cd905d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113903251527116478", "content": "", "creation_timestamp": "2025-01-28T00:54:49.208241Z"}, {"uuid": "cdad9616-1c0c-4032-a4b1-8764a00390a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12649", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113903251559525668", "content": "", "creation_timestamp": "2025-01-28T00:54:50.170274Z"}, {"uuid": "2179e0b6-c7c1-4de8-a139-53e882d604e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgrbrjo3p42b", "content": "", "creation_timestamp": "2025-01-28T01:15:50.863500Z"}, {"uuid": "be9a8ed1-b1eb-422a-83c7-46a6a59f0cb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12648", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgrbrmy7du2f", "content": "", "creation_timestamp": "2025-01-28T01:15:54.341848Z"}, {"uuid": "cc39991b-957f-4452-a8ed-f6b49f431856", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12649", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgrbrq5bag2i", "content": "", "creation_timestamp": "2025-01-28T01:15:57.750346Z"}, {"uuid": "ccd7d811-0088-44f6-b836-a7b29ce58178", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113903698571274333", "content": "", "creation_timestamp": "2025-01-28T02:48:30.689733Z"}, {"uuid": "a2f4c76e-7838-4336-a312-f4f240a207db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12648", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113903698622362108", "content": "", "creation_timestamp": "2025-01-28T02:48:32.619607Z"}, {"uuid": "050717e3-9b43-45f0-877d-0245ca7d4511", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lh3hs3wo6d2l", "content": "", "creation_timestamp": "2025-02-01T02:30:10.776656Z"}, {"uuid": "d7547861-b4cb-4e43-8640-c24f069d59ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-073/", "content": "", "creation_timestamp": "2025-01-31T05:00:00.000000Z"}, {"uuid": "28d09772-9201-46e3-8c40-8fc201697bdb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "MISP/ca7dfd4e-d0b5-4d10-8982-36d9f6e53c8e", "content": "", "creation_timestamp": "2025-09-01T13:53:38.000000Z"}, {"uuid": "6203c1b5-d120-42eb-91e4-9013f8e0b77e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12649", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3229", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12649\n\ud83d\udd25 CVSS Score: 9.8 (CVSS_V3)\n\ud83d\udd39 Description: Buffer overflow in XPS data font processing of Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *: Satera MF656Cdw/Satera MF654Cdw firmware v05.04 and earlier sold in Japan. Color imageCLASS MF656Cdw/Color imageCLASS MF654Cdw/Color imageCLASS MF653Cdw/Color imageCLASS MF652Cdw/Color imageCLASS LBP633Cdw/Color imageCLASS LBP632Cdw firmware v05.04 and earlier sold in US. i-SENSYS MF657Cdw/i-SENSYS MF655Cdw/i-SENSYS MF651Cdw/i-SENSYS LBP633Cdw/i-SENSYS LBP631Cdw firmware v05.04 and earlier sold in Europe.\n\ud83d\udccf Published: 2025-01-28T03:31:13Z\n\ud83d\udccf Modified: 2025-01-28T03:31:13Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-12649\n2. https://canon.jp/support/support-info/250127vulnerability-response\n3. https://psirt.canon/advisory-information/cp2025-001\n4. https://www.canon-europe.com/support/product-security/#news\n5. https://www.usa.canon.com/support/canon-product-advisories/service-notice-regarding-vulnerability-measure-against-buffer-overflow-for-laser-printers-and-small-office-multifunctional-printers", "creation_timestamp": "2025-01-28T04:09:33.000000Z"}, {"uuid": "05eab25e-217a-4051-97d5-28055ebbc018", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12648", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3226", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12648\n\ud83d\udd25 CVSS Score: 9.8 (CVSS_V3)\n\ud83d\udd39 Description: Buffer overflow in TIFF data EXIF tag processing of Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *: Satera MF656Cdw/Satera MF654Cdw firmware v05.04 and earlier sold in Japan. Color imageCLASS MF656Cdw/Color imageCLASS MF654Cdw/Color imageCLASS MF653Cdw/Color imageCLASS MF652Cdw/Color imageCLASS LBP633Cdw/Color imageCLASS LBP632Cdw firmware v05.04 and earlier sold in US. i-SENSYS MF657Cdw/i-SENSYS MF655Cdw/i-SENSYS MF651Cdw/i-SENSYS LBP633Cdw/i-SENSYS LBP631Cdw firmware v05.04 and earlier sold in Europe.\n\ud83d\udccf Published: 2025-01-28T03:31:13Z\n\ud83d\udccf Modified: 2025-01-28T03:31:13Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-12648\n2. https://canon.jp/support/support-info/250127vulnerability-response\n3. https://psirt.canon/advisory-information/cp2025-001\n4. https://www.canon-europe.com/support/product-security/#news\n5. https://www.usa.canon.com/support/canon-product-advisories/service-notice-regarding-vulnerability-measure-against-buffer-overflow-for-laser-printers-and-small-office-multifunctional-printers", "creation_timestamp": "2025-01-28T04:09:28.000000Z"}, {"uuid": "3427457d-0fef-4940-832c-c6be9129ea71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "Telegram/j26DGJrd6hDEzfZlHw-97vNbm4BY4Cj8D1GznJ10D93Qv7eF", "content": "", "creation_timestamp": "2025-01-28T03:22:55.000000Z"}, {"uuid": "57c9597a-80ba-41b0-bedb-e76f9f8917bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12643", "type": "seen", "source": "https://t.me/cvedetector/12970", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12643 - Chunghwa Telecom TBM-Client CSRF Absolute Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12643 \nPublished : Dec. 16, 2024, 7:15 a.m. | 34\u00a0minutes ago \nDescription : The tbm-client from Chunghwa Telecom has an Arbitrary File Delete vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection in the APIs, unauthenticated remote attackers could use these APIs through phishing. Additionally, one of the APIs contains an Absolute Path Traversal vulnerability, allowing attackers to delete arbitrary files on the user's system. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-16T08:58:50.000000Z"}, {"uuid": "79d048af-7814-4cfc-916d-e28cbfe25183", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12642", "type": "seen", "source": "https://t.me/cvedetector/12969", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12642 - Chunghwa Telecom TenderDocTransfer CSRF Relative Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12642 \nPublished : Dec. 16, 2024, 7:15 a.m. | 34\u00a0minutes ago \nDescription : TenderDocTransfer from Chunghwa Telecom has an Arbitrary File Write vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection for the APIs, unauthenticated remote attackers could use these APIs through phishing. Additionally, one of the APIs contains a Relative Path Traversal vulnerability, allowing attackers to write arbitrary files to any path on the user's system. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-16T08:58:50.000000Z"}, {"uuid": "ef45888f-afd5-42f9-a19e-3bdd7dcb0d52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12649", "type": "seen", "source": "Telegram/ixHUP-WXVna5A54N_tdhkTLJbC-a2sXWoIbUvUgXsFrYjtjj", "content": "", "creation_timestamp": "2025-01-28T03:22:55.000000Z"}, {"uuid": "4b46155c-82ec-4642-af3c-2f4026bad9eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12648", "type": "seen", "source": "Telegram/H_sjgCE-h7FnF50YbBdLwAmcSesqgBogusiDwfeb13xGCAnS", "content": "", "creation_timestamp": "2025-01-28T03:22:55.000000Z"}, {"uuid": "3a56983d-fe0f-43c8-873f-9c2cbe44bc01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12647", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgrvbssl3c2q", "content": "", "creation_timestamp": "2025-01-28T07:04:58.744164Z"}, {"uuid": "13f6d516-a444-4897-bb6c-e795b86cfa3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-12649", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-075/", "content": "", "creation_timestamp": "2025-01-31T05:00:00.000000Z"}]}