{"vulnerability": "CVE-2024-12426", "sightings": [{"uuid": "2ca90f8b-f1a3-437d-91ac-a68e2996ecab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12426", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf5sd5duoz2k", "content": "", "creation_timestamp": "2025-01-07T13:53:35.781261Z"}, {"uuid": "716ad1c8-72cc-47fc-a4a5-9fc131bae561", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12426", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf5q7ubh4m2a", "content": "", "creation_timestamp": "2025-01-07T13:15:57.742346Z"}, {"uuid": "d7c1ec82-7548-47eb-89eb-2f6440d16e43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-12426", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3ligbe4kacs2n", "content": "", "creation_timestamp": "2025-02-18T02:59:27.597200Z"}, {"uuid": "0e1da964-1da0-4d89-8bef-48398975f382", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12426", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lige5mhsjc2h", "content": "", "creation_timestamp": "2025-02-18T03:49:37.091889Z"}, {"uuid": "441f29ad-cdec-4580-a741-7ffdc1760234", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12426", "type": "seen", "source": "https://bsky.app/profile/securestep9.bsky.social/post/3ligvlwbngk2c", "content": "", "creation_timestamp": "2025-02-18T09:01:44.432767Z"}, {"uuid": "11c325c7-a649-48d0-bcab-03d79099c06d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12426", "type": "seen", "source": "https://t.me/cvedetector/14538", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12426 - LibreOffice Environmental Variable Exfiltration\", \n  \"Content\": \"CVE ID : CVE-2024-12426 \nPublished : Jan. 7, 2025, 1:15 p.m. | 21\u00a0minutes ago \nDescription : Exposure of Environmental Variables and arbitrary INI file values to an Unauthorized Actor vulnerability in The Document Foundation LibreOffice.  \n  \n  \n  \n  \nURLs could be constructed which expanded environmental variables or INI file values, so potentially sensitive information could be exfiltrated to a remote server on opening a document containing such links.  \n  \n  \nThis issue affects LibreOffice: from 24.8 before &lt; 24.8.4. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T14:42:42.000000Z"}, {"uuid": "09c7cc86-69c4-4e4c-a465-34caf6c9c067", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12426", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3livwjlrvma22", "content": "", "creation_timestamp": "2025-02-24T08:28:15.572998Z"}, {"uuid": "f84d8e27-7ad4-486e-bdf1-1f2e1f1ccb1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-12426", "type": "seen", "source": "https://infosec.exchange/users/securestep9/statuses/114024085695036829", "content": "", "creation_timestamp": "2025-02-18T10:26:00.160937Z"}, {"uuid": "a72f5a0c-6e6a-4e61-be55-7566bb75e848", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12426", "type": "seen", "source": "https://bsky.app/profile/stringsvsatoms.bsky.social/post/3lih3saq7hg26", "content": "", "creation_timestamp": "2025-02-18T10:52:38.986781Z"}, {"uuid": "71424cc6-c560-4049-a110-9c992a8aa7b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12426", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-16T01:45:14.000000Z"}, {"uuid": "a8c76f0c-bf63-4eaa-ad86-ba71d97b91f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12426", "type": "seen", "source": "MISP/4d9e0694-2872-4bfc-8eee-f1ab846c5ab0", "content": "", "creation_timestamp": "2025-08-19T04:06:36.000000Z"}, {"uuid": "cdadde42-bf55-4f00-8c11-5857e2872165", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12426", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/2471", "content": "#exploit\n1. CVE-2024-12425,\nCVE-2024-12426:\nLibreOffice Path Traversal\nhttps://codeanlabs.com/blog/general/exploiting-libreoffice-cve-2024-12425-and-cve-2024-12426\n\n2. CVE-2024-36412:\nUsing XSS filters against XSS filters - Unexpected SQLI/RCE\nhttps://secarius.fr/cves/cve_2024_36412_using_filters_against_filters_unexpected_sql_injection\n\n3. CVE-2024-42327:\nZabbix Privilege Escalation -&gt; RCE\nhttps://github.com/godylockz/CVE-2024-42327", "creation_timestamp": "2025-02-20T05:23:47.000000Z"}, {"uuid": "974ef64a-ad19-482e-9a1d-2756159c1e3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12426", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/6704", "content": "#exploit\n1. CVE-2024-12425,\nCVE-2024-12426:\nLibreOffice Path Traversal\nhttps://codeanlabs.com/blog/general/exploiting-libreoffice-cve-2024-12425-and-cve-2024-12426\n\n2. CVE-2024-36412:\nUsing XSS filters against XSS filters - Unexpected SQLI/RCE\nhttps://secarius.fr/cves/cve_2024_36412_using_filters_against_filters_unexpected_sql_injection\n\n3. CVE-2024-42327:\nZabbix Privilege Escalation -&gt; RCE\nhttps://github.com/godylockz/CVE-2024-42327", "creation_timestamp": "2025-02-20T05:23:47.000000Z"}, {"uuid": "8835c61f-6bcd-430e-915a-e10c4c9a91ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12426", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11819", "content": "#exploit\n1. CVE-2024-12425,\nCVE-2024-12426:\nLibreOffice Path Traversal\nhttps://codeanlabs.com/blog/general/exploiting-libreoffice-cve-2024-12425-and-cve-2024-12426\n\n2. CVE-2024-36412:\nUsing XSS filters against XSS filters - Unexpected SQLI/RCE\nhttps://secarius.fr/cves/cve_2024_36412_using_filters_against_filters_unexpected_sql_injection\n\n3. CVE-2024-42327:\nZabbix Privilege Escalation -&gt; RCE\nhttps://github.com/godylockz/CVE-2024-42327", "creation_timestamp": "2025-02-17T01:32:28.000000Z"}]}