{"vulnerability": "CVE-2024-12227", "sightings": [{"uuid": "348e8ab7-597d-4d66-9bdc-039202f70bca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12227", "type": "published-proof-of-concept", "source": "Telegram/OHr82OtRsE7SrX-5JX0BTKOCwGseELWPcAGkyhObfyZN6dU", "content": "", "creation_timestamp": "2025-12-14T15:00:08.000000Z"}, {"uuid": "4eca710e-b830-489a-adb3-fe21560b97b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12227", "type": "seen", "source": "https://t.me/cvedetector/12106", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12227 - A vulnerability, which was classified as problemat\", \n  \"Content\": \"CVE ID : CVE-2024-12227 \nPublished : Dec. 5, 2024, 2:15 p.m. | 38\u00a0minutes ago \nDescription : A vulnerability, which was classified as problematic, was found in MSI Dragon Center up to 2.0.146.0. This affects the function MmUnMapIoSpace in the library NTIOLib_X64.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. Upgrading to version 2.0.148.0 is able to address this issue. It is recommended to upgrade the affected component. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T16:11:53.000000Z"}]}