{"vulnerability": "cve-2024-1304", "sightings": [{"uuid": "9d90a6a5-3c42-4f40-8f30-3024d324984c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13040", "type": "seen", "source": "https://t.me/cvedetector/13967", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13040 - \"Quanta Computer QOCA Authorization Bypass Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-13040 \nPublished : Dec. 31, 2024, 2:15 a.m. | 24\u00a0minutes ago \nDescription : The QOCA aim from Quanta Computer has an Authorization Bypass Through User-Controlled Key vulnerability. By controlling the user ID parameter, remote attackers with regular privileges could access certain features as any user, modify any user's account information and privileges, leading to privilege escalation. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-31T03:40:08.000000Z"}, {"uuid": "2dded38f-4e4a-44d3-a0f1-8c36971af444", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1304", "type": "seen", "source": "https://t.me/ctinow/205894", "content": "https://ift.tt/AEjhO0s\nCVE-2024-1304", "creation_timestamp": "2024-03-12T17:32:02.000000Z"}, {"uuid": "d4086839-bf0d-4cf2-b4c1-0116765cb5bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1304", "type": "seen", "source": "https://t.me/ctinow/205902", "content": "https://ift.tt/AEjhO0s\nCVE-2024-1304", "creation_timestamp": "2024-03-12T17:32:11.000000Z"}, {"uuid": "4a4ef3b9-fe43-4583-8cef-849fc0535680", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13041", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113793610252558322", "content": "", "creation_timestamp": "2025-01-08T16:11:36.236214Z"}, {"uuid": "b40359f3-44be-4451-afb9-7cd91de9561c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13041", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113797009211537411", "content": "", "creation_timestamp": "2025-01-09T06:36:02.915869Z"}, {"uuid": "e5c903d9-7162-47f5-a3a5-9bf8a83ff76f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13041", "type": "seen", "source": "https://t.me/cvedetector/14799", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13041 - GitLab SAML Provider External Group Configuration Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13041 \nPublished : Jan. 9, 2025, 7:15 a.m. | 40\u00a0minutes ago \nDescription : An issue was discovered in GitLab CE/EE affecting all versions starting from 16.4 prior to 17.5.5, starting from 17.6 prior to 17.6.3, and starting from 17.7 prior to 17.7.1. When a user is created via the SAML provider, the external groups setting overrides the external provider configuration. As a result, the user may not be marked as external thereby giving those users access to internal projects or groups. \nSeverity: 4.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T09:23:32.000000Z"}, {"uuid": "944cd15a-6eda-48be-9923-49d785bd519c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13041", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfc4zvpojh27", "content": "", "creation_timestamp": "2025-01-09T07:15:55.928230Z"}, {"uuid": "e11d815c-fc78-4a75-aac6-f91cd0303798", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13045", "type": "seen", "source": "https://t.me/cvedetector/13962", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13045 - Ashlar-Vellum Cobalt AR File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13045 \nPublished : Dec. 30, 2024, 9:15 p.m. | 20\u00a0minutes ago \nDescription : Ashlar-Vellum Cobalt AR File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.  \n  \nThe specific flaw exists within the parsing of AR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24848. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-30T22:39:22.000000Z"}, {"uuid": "8db1f95f-a005-4122-895d-2731c5eaf456", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13044", "type": "seen", "source": "https://t.me/cvedetector/13961", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13044 - Ashlar-Vellum Cobalt AR File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13044 \nPublished : Dec. 30, 2024, 9:15 p.m. | 20\u00a0minutes ago \nDescription : Ashlar-Vellum Cobalt AR File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.  \n  \nThe specific flaw exists within the parsing of AR files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24870. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-30T22:39:21.000000Z"}, {"uuid": "7562fca6-1193-4d02-ad5d-9bccf2fa0383", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13043", "type": "seen", "source": "https://t.me/cvedetector/13960", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13043 - Panda Security Dome Link Following Local Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13043 \nPublished : Dec. 30, 2024, 9:15 p.m. | 20\u00a0minutes ago \nDescription : Panda Security Dome Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Panda Security Dome. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.  \n  \nThe specific flaw exists within the Hotspot Shield. By creating a junction, an attacker can abuse the application to delete arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23478. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-30T22:39:18.000000Z"}, {"uuid": "c08f9a52-cf1a-4d82-a76a-ca991263b756", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13042", "type": "seen", "source": "https://t.me/cvedetector/13959", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13042 - Tsinghua Unigroup Electronic Archives Management System File Path Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-13042 \nPublished : Dec. 30, 2024, 9:15 p.m. | 20\u00a0minutes ago \nDescription : A vulnerability was found in Tsinghua Unigroup Electronic Archives Management System 3.2.210802(62532). It has been classified as problematic. Affected is the function download of the file SubjectController.class.php. The manipulation of the argument path leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-30T22:39:17.000000Z"}, {"uuid": "4738ab9f-5989-4704-b690-d0fead31cdbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13048", "type": "seen", "source": "https://t.me/cvedetector/13953", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13048 - Ashlar-Vellum Cobalt XE File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13048 \nPublished : Dec. 30, 2024, 9:15 p.m. | 20\u00a0minutes ago \nDescription : Ashlar-Vellum Cobalt XE File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.  \n  \nThe specific flaw exists within the parsing of XE files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24844. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-30T22:39:10.000000Z"}, {"uuid": "84a90d0a-b1d1-4707-9b0d-1caa8399906c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13049", "type": "seen", "source": "https://t.me/cvedetector/13954", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13049 - Ashlar-Vellum Cobalt XE File Parsing Type Confusion Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13049 \nPublished : Dec. 30, 2024, 9:15 p.m. | 20\u00a0minutes ago \nDescription : Ashlar-Vellum Cobalt XE File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.  \n  \nThe specific flaw exists within the parsing of XE files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24847. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-30T22:39:10.000000Z"}, {"uuid": "6745dd1a-bc35-4eaf-a88d-486570ae0d82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13047", "type": "seen", "source": "https://t.me/cvedetector/13952", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13047 - Ashlar-Vellum Cobalt CO File Parsing Type Confusion Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13047 \nPublished : Dec. 30, 2024, 9:15 p.m. | 20\u00a0minutes ago \nDescription : Ashlar-Vellum Cobalt CO File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.  \n  \nThe specific flaw exists within the parsing of CO files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24843. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-30T22:39:09.000000Z"}, {"uuid": "e11081d9-dc29-43f7-a6e1-1e0ccb34663f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13046", "type": "seen", "source": "https://t.me/cvedetector/13951", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13046 - Ashlar-Vellum Cobalt CO File Parsing Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-13046 \nPublished : Dec. 30, 2024, 9:15 p.m. | 20\u00a0minutes ago \nDescription : Ashlar-Vellum Cobalt CO File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.  \n  \nThe specific flaw exists within the parsing of CO files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24867. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-30T22:39:08.000000Z"}, {"uuid": "c67e9168-1ca4-4bcd-8f9b-64ff6d3973bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13048", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1732/", "content": "", "creation_timestamp": "2024-12-30T05:00:00.000000Z"}, {"uuid": "ecc2a28c-480b-43f8-b271-218cf99cbfe0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13043", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113743682834418784", "content": "", "creation_timestamp": "2024-12-30T20:34:24.068609Z"}, {"uuid": "90b3ec95-da67-4d3d-88c5-f8c69e4aa203", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13044", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113743682848366947", "content": "", "creation_timestamp": "2024-12-30T20:34:24.332558Z"}, {"uuid": "71952b45-315d-4348-98a9-76fbd9323719", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13045", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113743682862014055", "content": "", "creation_timestamp": "2024-12-30T20:34:24.579007Z"}, {"uuid": "0ad99313-2565-4c82-ac10-02ca3aef0dcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13049", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113743741908450621", "content": "", "creation_timestamp": "2024-12-30T20:49:29.799951Z"}, {"uuid": "22f9f187-8b75-473f-ba98-eb1435706917", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13046", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113743741865046531", "content": "", "creation_timestamp": "2024-12-30T20:49:30.038047Z"}, {"uuid": "267712a1-4fb3-4a3f-bd18-ca12ba3fab5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13048", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113743741894507245", "content": "", "creation_timestamp": "2024-12-30T20:49:30.145602Z"}, {"uuid": "fc2c86f1-5ea0-427f-8a72-7a43342b9bac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13047", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113743741879163553", "content": "", "creation_timestamp": "2024-12-30T20:49:30.294618Z"}, {"uuid": "9d79a2a9-f2f6-473c-a338-fc6dcdfd90a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13042", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113743813918791710", "content": "", "creation_timestamp": "2024-12-30T21:07:44.271081Z"}, {"uuid": "c5320b5d-f103-470c-bb6a-202fb93235a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13049", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1733/", "content": "", "creation_timestamp": "2024-12-30T05:00:00.000000Z"}, {"uuid": "46fbe702-203c-464f-9002-16b24bf12d0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13047", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1731/", "content": "", "creation_timestamp": "2024-12-30T05:00:00.000000Z"}, {"uuid": "1870c50f-ac1b-4abb-8dd3-7904be942f5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13046", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1730/", "content": "", "creation_timestamp": "2024-12-30T05:00:00.000000Z"}, {"uuid": "5a789cb0-699c-405f-9fec-9b6d7ea38bf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13045", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1729/", "content": "", "creation_timestamp": "2024-12-30T05:00:00.000000Z"}, {"uuid": "e3032b84-873e-41bc-a5cf-060a4d80430a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13044", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1728/", "content": "", "creation_timestamp": "2024-12-30T05:00:00.000000Z"}, {"uuid": "a9d184c6-68f7-4b46-b90f-4ccbf5119713", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13043", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1727/", "content": "", "creation_timestamp": "2024-12-30T05:00:00.000000Z"}, {"uuid": "2aa4d6a6-c7ec-40d9-baf0-9475fc800286", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13040", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113744992650690013", "content": "", "creation_timestamp": "2024-12-31T02:07:30.310808Z"}, {"uuid": "f30a498a-88f3-411d-a92c-da1ff1e5a605", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13040", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113747171252357787", "content": "", "creation_timestamp": "2024-12-31T11:21:32.975044Z"}]}