{"vulnerability": "cve-2024-4905", "sightings": [{"uuid": "22bb2ecd-fb80-4418-8c9d-b522115e36b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49050", "type": "seen", "source": "https://bsky.app/profile/kilocode.ai/post/3lpjnkrw5iy25", "content": "", "creation_timestamp": "2025-05-19T13:12:17.013244Z"}, {"uuid": "4c6a73ed-e6e1-440c-a980-9c6dc7ca623c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49059", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/655", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-49059\n\ud83d\udd39 Description: Microsoft Office Elevation of Privilege Vulnerability\n\ud83d\udccf Published: 2024-12-10T17:49:05.468Z\n\ud83d\udccf Modified: 2025-01-08T04:55:54.967Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49059", "creation_timestamp": "2025-01-08T05:39:29.000000Z"}, {"uuid": "e9af17ba-c967-4bea-96b8-9e7f54aaa654", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49053", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113551097595837936", "content": "", "creation_timestamp": "2024-11-26T20:17:26.767821Z"}, {"uuid": "def31fb7-cf36-4f4f-a2d2-2e676f436c70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49054", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113527136963470290", "content": "", "creation_timestamp": "2024-11-22T14:43:56.522776Z"}, {"uuid": "4fc37776-39c1-49f2-a3e6-f5b0f4aea1cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-490597", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2024-0471", "content": "", "creation_timestamp": "2024-12-10T18:33:29.000000Z"}, {"uuid": "ff1a160a-d341-4ed3-8986-92076e015253", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49051", "type": "seen", "source": "https://bsky.app/profile/cti-news.bsky.social/post/3lemnguunde2x", "content": "", "creation_timestamp": "2024-12-31T18:10:56.639444Z"}, {"uuid": "5aac4752-5e76-4bbe-ba15-a6f82462bcd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49050", "type": "seen", "source": "https://bsky.app/profile/milescranmer.bsky.social/post/3lhzbxq7brs24", "content": "", "creation_timestamp": "2025-02-12T23:05:49.127356Z"}, {"uuid": "bd493959-0056-4c93-af09-24ba930da180", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49056", "type": "seen", "source": "https://t.me/cvedetector/10678", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49056 - Airlift Microsoft Authentication Bypass Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-49056 \nPublished : Nov. 12, 2024, 6:15 p.m. | 21\u00a0minutes ago \nDescription : Authentication bypass by assumed-immutable data on airlift.microsoft.com allows an authorized attacker to elevate privileges over a network. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-12T19:44:09.000000Z"}, {"uuid": "15b2aba8-a37a-4838-8bbc-f4005628b4d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49051", "type": "seen", "source": "https://t.me/cvedetector/10677", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49051 - Microsoft PC Manager Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-49051 \nPublished : Nov. 12, 2024, 6:15 p.m. | 21\u00a0minutes ago \nDescription : Microsoft PC Manager Elevation of Privilege Vulnerability \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-12T19:44:08.000000Z"}, {"uuid": "4830fc65-c964-49a6-b7db-f828d9d10946", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49051", "type": "seen", "source": "https://www.thezdi.com/blog/2024/11/12/the-november-2024-security-update-review", "content": "", "creation_timestamp": "2024-11-12T18:26:35.000000Z"}, {"uuid": "eb689ec9-309a-4268-a2a6-ada286a5be02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-490508", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2024-0435", "content": "", "creation_timestamp": "2024-11-12T18:54:00.000000Z"}, {"uuid": "ad8dac62-c40c-4d30-a9ec-669e5c25a7ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49051", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113472508448634951", "content": "", "creation_timestamp": "2024-11-12T23:11:11.446795Z"}, {"uuid": "8bc60d2b-9373-4e9e-9890-ce90d073cc3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49056", "type": "seen", "source": "https://www.thezdi.com/blog/2024/11/12/the-november-2024-security-update-review", "content": "", "creation_timestamp": "2024-11-12T18:26:35.000000Z"}, {"uuid": "bcf8861d-8bba-48eb-9097-7132a38e0170", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49056", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113472508462056070", "content": "", "creation_timestamp": "2024-11-12T23:11:11.882339Z"}, {"uuid": "acb338fc-cb63-46bc-a1b3-306bbb5ff91d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49050", "type": "seen", "source": "https://www.thezdi.com/blog/2024/11/12/the-november-2024-security-update-review", "content": "", "creation_timestamp": "2024-11-12T18:26:35.000000Z"}, {"uuid": "1ba3c683-9bdb-4042-92f2-3a37c45435cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49050", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113472508434488186", "content": "", "creation_timestamp": "2024-11-12T23:11:11.155512Z"}, {"uuid": "fd549873-fdf3-41f2-8e97-0a1c1cee9364", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-490567", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2024-0436", "content": "", "creation_timestamp": "2024-11-12T18:54:41.000000Z"}, {"uuid": "d116ae03-3d33-4dd3-8814-4298faf360d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49052", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113551097595837936", "content": "", "creation_timestamp": "2024-11-26T20:17:26.895361Z"}, {"uuid": "50779ef9-ec13-458f-9b17-739d87946a8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49052", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113550980708800465", "content": "", "creation_timestamp": "2024-11-26T19:47:43.103541Z"}, {"uuid": "d074a963-832b-43d6-aa64-b5e6bd6870ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49053", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113551010810789254", "content": "", "creation_timestamp": "2024-11-26T19:55:22.274760Z"}, {"uuid": "849777f8-69d8-4c5f-9cf3-03e3d1bf1067", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49054", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113524048830700209", "content": "", "creation_timestamp": "2024-11-22T01:38:35.226544Z"}, {"uuid": "fce00dfd-68dc-4345-9918-8cc20ba7809e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49057", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113629799612423340", "content": "", "creation_timestamp": "2024-12-10T17:53:45.661140Z"}, {"uuid": "00026ca2-b096-4f3f-8ae1-9a6b28a4c67e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49059", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113629799627096555", "content": "", "creation_timestamp": "2024-12-10T17:53:46.411912Z"}, {"uuid": "1aa0f1f0-c8b8-4472-91af-2f4387fd3e43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49059", "type": "seen", "source": "https://www.thezdi.com/blog/2024/12/10/the-december-2024-security-update-review", "content": "", "creation_timestamp": "2024-12-10T17:33:56.000000Z"}, {"uuid": "93a43887-c2b6-471d-892c-9452a6ae2c8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49057", "type": "seen", "source": "https://www.thezdi.com/blog/2024/12/10/the-december-2024-security-update-review", "content": "", "creation_timestamp": "2024-12-10T17:33:56.000000Z"}, {"uuid": "39783192-afd3-4f33-a84e-2adbf9bf9327", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49057", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/649", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-49057\n\ud83d\udd39 Description: Microsoft Defender for Endpoint on Android Spoofing Vulnerability\n\ud83d\udccf Published: 2024-12-10T17:49:04.575Z\n\ud83d\udccf Modified: 2025-01-08T04:56:02.707Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49057", "creation_timestamp": "2025-01-08T05:38:45.000000Z"}, {"uuid": "8820d630-fc77-4969-bdd8-43dfbcd31dcc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49050", "type": "seen", "source": "https://t.me/cvedetector/10683", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49050 - Visual Studio Code Python Extension Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-49050 \nPublished : Nov. 12, 2024, 6:15 p.m. | 21\u00a0minutes ago \nDescription : Visual Studio Code Python Extension Remote Code Execution Vulnerability \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-12T19:44:16.000000Z"}, {"uuid": "d7f5eeb1-d851-4a5a-91d7-91f3962bad9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49052", "type": "seen", "source": "Telegram/oMkIFzJJx9w7-hz1UxcAEAAHsD9EXHgNCbHZzv1B147zZ6g6", "content": "", "creation_timestamp": "2025-02-06T02:44:20.000000Z"}, {"uuid": "6213c938-5d3c-490c-b3da-0e16e6cc87d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49054", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113527373430557668", "content": "", "creation_timestamp": "2024-11-22T15:44:04.354561Z"}]}