{"vulnerability": "CVE-2024-12740", "sightings": [{"uuid": "4c38a7cf-823b-48d9-9bb4-3a0e292c56bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12740", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-077/", "content": "", "creation_timestamp": "2025-02-03T05:00:00.000000Z"}, {"uuid": "2e16623a-84c7-42ae-9554-3838b3fe3b2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12740", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-080/", "content": "", "creation_timestamp": "2025-02-03T05:00:00.000000Z"}, {"uuid": "e98aac8f-2e99-4e30-b7ef-0adeeffafcfb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12740", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-079/", "content": "", "creation_timestamp": "2025-02-03T05:00:00.000000Z"}, {"uuid": "ce118e9f-c7d6-4602-b8eb-db1b619fe845", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12740", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-078/", "content": "", "creation_timestamp": "2025-02-03T05:00:00.000000Z"}, {"uuid": "d6de9bf0-3e9f-402b-bb10-296069f20e35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12740", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgqkcdgfah27", "content": "", "creation_timestamp": "2025-01-27T18:15:45.127729Z"}, {"uuid": "3428c2c8-ca11-4fee-a756-a83b4ecefdc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12740", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113901463537711437", "content": "", "creation_timestamp": "2025-01-27T17:20:06.498077Z"}, {"uuid": "d6938ac4-04ef-407d-97a8-ebd50607e491", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12740", "type": "seen", "source": "https://t.me/cvedetector/16496", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12740 - NI Vision Arbitrary Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-12740 \nPublished : Jan. 27, 2025, 6:15 p.m. | 22\u00a0minutes ago \nDescription : Vision related software from NI used a third-party library for image processing that exposes several vulnerabilities.  These vulnerabilities may result in arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-27T20:11:30.000000Z"}]}