{"vulnerability": "cve-2024-4789", "sightings": [{"uuid": "b1c992a1-24f7-4b5b-953f-1d408bffe8a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47896", "type": "seen", "source": "https://t.me/cvedetector/18731", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47896 - VMware ESXi GPU Firmware Out-of-Bounds Write\", \n  \"Content\": \"CVE ID : CVE-2024-47896 \nPublished : Feb. 22, 2025, 3:15 p.m. | 2\u00a0hours, 16\u00a0minutes ago \nDescription : Kernel software installed and running inside a Guest VM may exploit memory shared with the GPU Firmware to write data outside the Guest's virtualised GPU memory. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-22T19:10:22.000000Z"}, {"uuid": "34a00cff-00c9-4d2b-b799-2e32093629cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47896", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5029", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47896\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Kernel software installed and running inside a Guest VM may exploit memory shared with the GPU Firmware to write data outside the Guest's virtualised GPU memory.\n\ud83d\udccf Published: 2025-02-22T14:50:58.213Z\n\ud83d\udccf Modified: 2025-02-22T14:50:58.213Z\n\ud83d\udd17 References:\n1. https://www.imaginationtech.com/gpu-driver-vulnerabilities/", "creation_timestamp": "2025-02-22T15:20:14.000000Z"}, {"uuid": "7654dd22-c0e3-4b06-b6cf-cde2527899ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47898", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8209", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47898\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Software installed and run as a non-privileged user may conduct improper GPU system calls to trigger use-after-free kernel exceptions.\n\ud83d\udccf Published: 2025-01-31T03:14:46.865Z\n\ud83d\udccf Modified: 2025-03-20T14:38:49.501Z\n\ud83d\udd17 References:\n1. https://www.imaginationtech.com/gpu-driver-vulnerabilities/", "creation_timestamp": "2025-03-20T15:18:22.000000Z"}, {"uuid": "63cdc9c3-425b-42a1-b488-de620895af6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47893", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16766", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47893\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Kernel software installed and running inside a Guest VM may exploit memory shared with the GPU Firmware to read and/or write data outside the Guest's virtualised GPU memory.\n\ud83d\udccf Published: 2025-05-17T00:47:52.800Z\n\ud83d\udccf Modified: 2025-05-17T00:47:52.800Z\n\ud83d\udd17 References:\n1. https://www.imaginationtech.com/gpu-driver-vulnerabilities/", "creation_timestamp": "2025-05-17T01:35:07.000000Z"}, {"uuid": "800618a9-c5e8-433b-9c8b-889ddf9748bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47897", "type": "seen", "source": "https://t.me/cvedetector/15130", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47897 - VMware vSphere GPU Usage Vulnerability (Improper Privilege)\", \n  \"Content\": \"CVE ID : CVE-2024-47897 \nPublished : Jan. 13, 2025, 11:15 a.m. | 34\u00a0minutes ago \nDescription : Software installed and run as a non-privileged user may conduct improper GPU system calls resulting in platform instability and reboots. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T12:53:26.000000Z"}, {"uuid": "4f1bca83-76dc-4392-97ee-50bc0019fa7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47895", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113821648880947589", "content": "", "creation_timestamp": "2025-01-13T15:02:11.779228Z"}, {"uuid": "c8b9827c-159a-400c-9c47-caac7ef78b82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47894", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113821648880947589", "content": "", "creation_timestamp": "2025-01-13T15:02:11.811292Z"}, {"uuid": "aa6a14a8-d4ea-488a-b536-c6ee369e69d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47897", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113821648880947589", "content": "", "creation_timestamp": "2025-01-13T15:02:11.843619Z"}, {"uuid": "e9f94128-80da-414c-8d17-b36f32c18ffc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47896", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lirvei2x4m2t", "content": "", "creation_timestamp": "2025-02-22T17:56:51.191701Z"}, {"uuid": "04587b1d-7603-4e30-b03b-f64f0b164e06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47893", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpdrl2nsho2p", "content": "", "creation_timestamp": "2025-05-17T05:08:02.144992Z"}, {"uuid": "d1015235-9301-43b4-a42f-bb9866b4b147", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47892", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/cf59c148-4047-4ccd-8ba0-26fb7197899c", "content": "", "creation_timestamp": "2025-02-03T19:33:09.293698Z"}, {"uuid": "1b6a59ee-af75-4432-8884-24265f8e0b52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47899", "type": "seen", "source": "https://t.me/cvedetector/16877", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47899 - Google GPU Use-After-Free Kernel Exception\", \n  \"Content\": \"CVE ID : CVE-2024-47899 \nPublished : Jan. 31, 2025, 4:15 a.m. | 1\u00a0hour, 24\u00a0minutes ago \nDescription : Software installed and run as a non-privileged user may conduct improper GPU system calls to trigger use-after-free kernel exceptions. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-31T07:00:19.000000Z"}, {"uuid": "df212302-3e56-4138-a03f-d7512d2e1311", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47898", "type": "seen", "source": "https://t.me/cvedetector/16876", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47898 - \"Gigabyte Graphics GPU use-after-free Kernel Exception\"\", \n  \"Content\": \"CVE ID : CVE-2024-47898 \nPublished : Jan. 31, 2025, 4:15 a.m. | 1\u00a0hour, 24\u00a0minutes ago \nDescription : Software installed and run as a non-privileged user may conduct improper GPU system calls to trigger use-after-free kernel exceptions. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-31T07:00:18.000000Z"}, {"uuid": "4a1ac1c8-7239-45c9-a759-97e2c93c8888", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47891", "type": "seen", "source": "https://t.me/cvedetector/16875", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47891 - Apache wxWidgets GPU Use-After-Free\", \n  \"Content\": \"CVE ID : CVE-2024-47891 \nPublished : Jan. 31, 2025, 4:15 a.m. | 1\u00a0hour, 24\u00a0minutes ago \nDescription : Software installed and run as a non-privileged user may conduct improper GPU system calls to trigger use-after-free kernel exceptions. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-31T07:00:14.000000Z"}, {"uuid": "005496d7-1afe-4d02-8cb0-cea55f794b9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47894", "type": "seen", "source": "https://t.me/cvedetector/15128", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47894 - VMware ESXi GPU Firmware Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-47894 \nPublished : Jan. 13, 2025, 11:15 a.m. | 34\u00a0minutes ago \nDescription : Kernel software installed and running inside a Guest VM may post improper commands to the GPU Firmware to read data outside the Guest's virtualised GPU memory. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T12:53:24.000000Z"}, {"uuid": "f7277cda-5a26-434e-87f8-cbf395383f67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47895", "type": "seen", "source": "https://t.me/cvedetector/15129", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47895 - VMWare ESXi GPU Firmware Data Exposure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47895 \nPublished : Jan. 13, 2025, 11:15 a.m. | 34\u00a0minutes ago \nDescription : Kernel software installed and running inside a Guest VM may post improper commands to the GPU Firmware to read data outside the Guest's virtualised GPU memory. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T12:53:25.000000Z"}, {"uuid": "ab589bd1-186e-49be-9e52-4ee67fe0815c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47892", "type": "seen", "source": "https://t.me/cvedetector/12900", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47892 - NVIDIA GPU Memory Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47892 \nPublished : Dec. 13, 2024, 6:15 p.m. | 35\u00a0minutes ago \nDescription : Software installed and run as a non-privileged user may conduct GPU system calls to read and write freed physical memory from the GPU. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-13T19:57:36.000000Z"}, {"uuid": "e4686b7e-ad56-437d-a897-5ef2fe33a019", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47897", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113822538784013448", "content": "", "creation_timestamp": "2025-01-13T18:48:37.190748Z"}, {"uuid": "23a23190-ae38-4ae2-8c33-637e650ce465", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47895", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfmo37gelk2q", "content": "", "creation_timestamp": "2025-01-13T11:47:30.372894Z"}, {"uuid": "ea1a273a-ddd6-471a-8df1-84172c42bdb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47894", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfmo37pylt2y", "content": "", "creation_timestamp": "2025-01-13T11:47:31.064541Z"}, {"uuid": "5749b52b-810e-4a96-8b2e-92e8d63a9a7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47897", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfmo37zr3b2u", "content": "", "creation_timestamp": "2025-01-13T11:47:32.220304Z"}, {"uuid": "8f2673e2-9a65-459a-85fb-2b9aa5002937", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47891", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113924461046134312", "content": "", "creation_timestamp": "2025-01-31T18:48:46.942004Z"}, {"uuid": "fa5c23c6-046c-4ae5-95a3-fa3a9522121b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47891", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lh2xd7ecju2e", "content": "", "creation_timestamp": "2025-01-31T21:35:33.199112Z"}, {"uuid": "58ced2d8-2e5c-4540-9aba-6fea23f2c912", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47891", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113920808266719706", "content": "", "creation_timestamp": "2025-01-31T03:19:43.698052Z"}, {"uuid": "e5dfc2ce-b432-488a-8692-a14c234ef0a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47898", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113920808283477970", "content": "", "creation_timestamp": "2025-01-31T03:19:44.076296Z"}, {"uuid": "6729a3df-de97-4974-a29d-cdd57a39d5fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47899", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113920808297804037", "content": "", "creation_timestamp": "2025-01-31T03:19:44.285415Z"}, {"uuid": "ed726548-6ba4-4947-ac9d-2e70a8a4d342", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47891", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgz5afde6a2b", "content": "", "creation_timestamp": "2025-01-31T04:15:58.987436Z"}, {"uuid": "11fefb1a-4429-48de-91e6-e4872412a1e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47898", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgz5ahmy5c2c", "content": "", "creation_timestamp": "2025-01-31T04:16:01.273419Z"}, {"uuid": "4a9da9bc-f7b0-486a-9ece-5b359263533b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47899", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgz5ak3kpf2h", "content": "", "creation_timestamp": "2025-01-31T04:16:03.880312Z"}, {"uuid": "d94adc4a-8bdf-4e66-8940-58fff29ef5e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47899", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3579", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47899\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-01-31T04:15:08.800\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://www.imaginationtech.com/gpu-driver-vulnerabilities/", "creation_timestamp": "2025-01-31T05:24:35.000000Z"}, {"uuid": "ca45f69b-abc3-4165-bcf4-fd430868e4c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47891", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3581", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47891\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-01-31T04:15:08.553\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://www.imaginationtech.com/gpu-driver-vulnerabilities/", "creation_timestamp": "2025-01-31T05:24:37.000000Z"}, {"uuid": "71aa6d95-8493-4092-9c69-73f6d98c2c3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47898", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3580", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47898\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-01-31T04:15:08.683\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://www.imaginationtech.com/gpu-driver-vulnerabilities/", "creation_timestamp": "2025-01-31T05:24:36.000000Z"}, {"uuid": "f98071b2-1be5-448b-a675-8e7a7d41d207", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47896", "type": "seen", "source": "Telegram/TZO5BFs2iOGjSTZA4LYTak3hEQEQyff43cfdH2mpfic2ElSy", "content": "", "creation_timestamp": "2025-03-06T02:16:33.000000Z"}, {"uuid": "9c7354c5-8fa7-4d18-8f99-237d7c3bce15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47891", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8006", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47891\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Software installed and run as a non-privileged user may conduct improper GPU system calls to trigger use-after-free kernel exceptions.\n\ud83d\udccf Published: 2025-01-31T03:11:58.828Z\n\ud83d\udccf Modified: 2025-03-18T20:22:22.937Z\n\ud83d\udd17 References:\n1. https://www.imaginationtech.com/gpu-driver-vulnerabilities/", "creation_timestamp": "2025-03-18T20:48:30.000000Z"}, {"uuid": "f1375b17-9208-4b25-8bbd-a6bd2ca91dfb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47894", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113820600810317629", "content": "", "creation_timestamp": "2025-01-13T10:35:39.168194Z"}, {"uuid": "ab03098e-4fe6-460a-adf7-af7e37bf7e7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47895", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113820600825337992", "content": "", "creation_timestamp": "2025-01-13T10:35:39.570482Z"}, {"uuid": "8033ec12-57c3-4dca-8abd-52f890c3ca6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47897", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113820600839220167", "content": "", "creation_timestamp": "2025-01-13T10:35:39.809922Z"}, {"uuid": "93c5fd33-8e46-4a1c-a401-bd432e1cbdaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47894", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfmmc2zhcf2t", "content": "", "creation_timestamp": "2025-01-13T11:15:33.597732Z"}, {"uuid": "ec1bef27-e72a-454b-818f-909a424d6409", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47895", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfmmc6cs7m2n", "content": "", "creation_timestamp": "2025-01-13T11:15:36.581163Z"}, {"uuid": "80e8a2ba-8b5e-4c0a-a973-034aee3c8ee4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47897", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfmmcaon5s2e", "content": "", "creation_timestamp": "2025-01-13T11:15:38.980351Z"}]}