{"vulnerability": "CVE-2024-12133", "sightings": [{"uuid": "23669c69-bbc0-40b4-bcbd-6eef234a0c08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12133", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lhjpkkwq7n2a", "content": "", "creation_timestamp": "2025-02-06T18:26:23.628424Z"}, {"uuid": "093e37b2-71a8-49b4-9cbe-8886e91adade", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12133", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113980300155433076", "content": "", "creation_timestamp": "2025-02-10T15:29:19.952517Z"}, {"uuid": "3861592a-ffa6-49f4-b711-4deb0c5506b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12133", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhtx7nglsf2e", "content": "", "creation_timestamp": "2025-02-10T20:10:04.777060Z"}, {"uuid": "49572e5a-54f6-49d0-89c1-2ffa6d0becdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12133", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhtk5k5k4m2i", "content": "", "creation_timestamp": "2025-02-10T16:16:15.064521Z"}, {"uuid": "8dec4635-9a4d-46b3-a008-4cd02e09e7b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-12133", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/bbcbc485-b88d-4831-b8e9-6e37e7bd9875", "content": "", "creation_timestamp": "2026-01-21T21:18:16.771453Z"}, {"uuid": "5593eb62-2334-4518-ac99-6f8eefb875cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12133", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/114816361290443115", "content": "", "creation_timestamp": "2025-07-08T07:10:41.861230Z"}, {"uuid": "90b4fd69-096c-4f84-b4a5-b81fa5bb8464", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12133", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-05", "content": "", "creation_timestamp": "2025-06-12T10:00:00.000000Z"}, {"uuid": "69c8deee-638d-456f-b689-9d5ce40f7a08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12133", "type": "seen", "source": "https://bsky.app/profile/lambdawatchdog.bsky.social/post/3lupievbyrh2y", "content": "", "creation_timestamp": "2025-07-24T12:01:27.213869Z"}, {"uuid": "b4fcbdb6-af56-4561-ad9a-d7ce17d0ce38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12133", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4885", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12133\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.\n\ud83d\udccf Published: 2025-02-10T15:28:03.193Z\n\ud83d\udccf Modified: 2025-02-21T13:06:53.278Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2024-12133\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2344611\n3. https://gitlab.com/gnutls/libtasn1/-/issues/52", "creation_timestamp": "2025-02-21T13:18:12.000000Z"}, {"uuid": "2159708e-c172-482c-b4c3-5157429f7a95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12133", "type": "seen", "source": "https://t.me/cvedetector/17577", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12133 - Git - Libtasn1 Infinite Loop Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-12133 \nPublished : Feb. 10, 2025, 4:15 p.m. | 1\u00a0hour, 27\u00a0minutes ago \nDescription : A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-10T18:45:54.000000Z"}, {"uuid": "544e5ec5-d643-42f1-83d4-980d87f27ede", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12133", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9958", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12133\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.\n\ud83d\udccf Published: 2025-02-10T15:28:03.193Z\n\ud83d\udccf Modified: 2025-04-01T16:48:00.988Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2024-12133\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2344611\n3. https://gitlab.com/gnutls/libtasn1/-/issues/52", "creation_timestamp": "2025-04-01T17:32:37.000000Z"}, {"uuid": "1075c935-f5c5-4420-8cd2-840d3a259721", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12133", "type": "seen", "source": "Telegram/fjjOxxWjkfg9qUXECIHsvuyBdyIQzH60wabWSFmc2xlT4Msi", "content": "", "creation_timestamp": "2025-02-21T15:03:13.000000Z"}]}