{"vulnerability": "CVE-2024-11454", "sightings": [{"uuid": "077bbad1-52f5-4406-865b-d1b2f3a5577e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11454", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113624135559974059", "content": "", "creation_timestamp": "2024-12-09T17:51:57.538219Z"}, {"uuid": "20245440-cf35-4816-8049-2ecee74f256e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11454", "type": "seen", "source": "https://t.me/cvedetector/12425", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11454 - Autodesk Revit DLL Loading Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11454 \nPublished : Dec. 9, 2024, 6:15 p.m. | 23\u00a0minutes ago \nDescription : A maliciously crafted DLL file, when placed in the same directory as an RVT file could be loaded by Autodesk Revit, and execute arbitrary code in the context of the current process due to an untrusted search patch being utilized. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-09T19:43:26.000000Z"}]}