{"vulnerability": "CVE-2024-1291", "sightings": [{"uuid": "b8359b97-6e13-44a7-855b-8dad781c1de8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12919", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfp37oam242e", "content": "", "creation_timestamp": "2025-01-14T10:47:58.444034Z"}, {"uuid": "e5060c31-7dde-47b6-a304-5db6921592e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12919", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfp37oor2n2w", "content": "", "creation_timestamp": "2025-01-14T10:48:00.381337Z"}, {"uuid": "9433732e-6935-4e7c-8e6d-9fc08e1ff931", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12919", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113826312846621124", "content": "", "creation_timestamp": "2025-01-14T10:48:18.215774Z"}, {"uuid": "2c07c895-a5f6-42a4-9274-39edbffc50ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12912", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-6360c159-b674e73894b2931a", "content": "", "creation_timestamp": "2025-01-07T10:37:14.906354Z"}, {"uuid": "fc903bef-58e3-4237-aa66-95e82f0f2642", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12912", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113757976140653968", "content": "", "creation_timestamp": "2025-01-02T09:09:22.656474Z"}, {"uuid": "e8a9107b-f9ba-4212-adf3-41026dd06701", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12912", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3leqqhle2652k", "content": "", "creation_timestamp": "2025-01-02T09:15:40.771299Z"}, {"uuid": "e2ebbb50-1bd8-476e-8a18-dcc72ec9b0bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12912", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3leqrokztu32h", "content": "", "creation_timestamp": "2025-01-02T09:37:29.315813Z"}, {"uuid": "0465cc18-6f5a-43e3-8416-86a157ef9088", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12912", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lespfct4fc27", "content": "", "creation_timestamp": "2025-01-03T04:01:50.037046Z"}, {"uuid": "dded988f-f168-495b-9d0e-e5176cd7876a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12912", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3less57l3n22w", "content": "", "creation_timestamp": "2025-01-03T04:51:01.211372Z"}, {"uuid": "4d47378f-a3b8-48ac-8ff4-8f8deff3b27f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-12912", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3leswxtg7dk2j", "content": "", "creation_timestamp": "2025-01-03T06:17:27.857028Z"}, {"uuid": "236aa933-cb98-4fb2-a5bc-73dc8375afed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12912", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3letf3uq72y2q", "content": "", "creation_timestamp": "2025-01-03T10:30:15.860662Z"}, {"uuid": "8e93a2ac-9842-44a6-8c27-5371ef192e3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12912", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3letozqo5u42j", "content": "", "creation_timestamp": "2025-01-03T13:28:02.135815Z"}, {"uuid": "46233b74-f4ec-4536-930e-f0f9d3622715", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12918", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lix3n5adv62t", "content": "", "creation_timestamp": "2025-02-24T19:32:23.722401Z"}, {"uuid": "4958ff75-0cb2-4a74-8cbc-fc8e848e11a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12917", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lix3n5ikug2s", "content": "", "creation_timestamp": "2025-02-24T19:32:25.030764Z"}, {"uuid": "ae4e3e5b-c464-4593-9981-2a082363bbe4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12916", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lix3n5stib2q", "content": "", "creation_timestamp": "2025-02-24T19:32:26.337302Z"}, {"uuid": "0f524b97-6f03-458f-bd9f-cbb43a3cd7a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12915", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lstntpqz5r2q", "content": "", "creation_timestamp": "2025-06-30T16:59:28.387338Z"}, {"uuid": "754f9f98-70a6-44da-afd2-f1f99cf2a10c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12916", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114060119642533027", "content": "", "creation_timestamp": "2025-02-24T17:48:26.723860Z"}, {"uuid": "024f67c0-98b6-470f-bb77-532f9216add7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12917", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114060119701091927", "content": "", "creation_timestamp": "2025-02-24T17:48:27.990150Z"}, {"uuid": "2c3053f4-d524-42b8-b6ad-c270945372d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12918", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114060119765999360", "content": "", "creation_timestamp": "2025-02-24T17:48:28.565469Z"}, {"uuid": "edb452f3-4a9e-4a65-bb3a-23022d0fa014", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12910", "type": "seen", "source": "MISP/3e4b778d-5810-4171-a915-f1d106684af4", "content": "", "creation_timestamp": "2025-08-11T18:27:49.000000Z"}, {"uuid": "fe63e9dc-940b-4d86-8f31-d5306111d7ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12912", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115578606002979278", "content": "", "creation_timestamp": "2025-11-19T21:59:30.006195Z"}, {"uuid": "231d430e-578d-4e42-9ba3-d84437edc0fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12912", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115578608301178805", "content": "", "creation_timestamp": "2025-11-19T22:00:06.429732Z"}, {"uuid": "cd8b5aac-2d50-4c65-929b-e61f75e3583b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12912", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ln6cgc3cp225", "content": "", "creation_timestamp": "2025-04-19T14:03:14.837496Z"}, {"uuid": "1727f4b8-2daf-4f3b-a20d-7f9462631512", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12911", "type": "seen", "source": "MISP/3e4b778d-5810-4171-a915-f1d106684af4", "content": "", "creation_timestamp": "2025-08-11T18:27:49.000000Z"}, {"uuid": "3eb624c0-e2ee-450a-9c26-48e16e0ba3b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12913", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lyxhidt5ff2c", "content": "", "creation_timestamp": "2025-09-16T13:47:32.968019Z"}, {"uuid": "1dcaa670-285d-463d-aeeb-5d7d321aab29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12912", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3m62ct3oues2h", "content": "", "creation_timestamp": "2025-11-20T08:08:06.177163Z"}, {"uuid": "8a2bf674-a0ea-435c-a8e8-20542ee1e874", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12912", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3m62ct64ze22h", "content": "", "creation_timestamp": "2025-11-20T08:08:06.988997Z"}, {"uuid": "3674cafa-4c6d-4ac9-bc4f-7291e9dc781f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12912", "type": "seen", "source": "MISP/3445a876-cced-4346-bf37-e276ba39cff4", "content": "", "creation_timestamp": "2025-09-02T18:30:14.000000Z"}, {"uuid": "35ded92c-5eb5-47bf-9c1a-9cceaef8a0bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12912", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m63o4d6hwc23", "content": "", "creation_timestamp": "2025-11-20T21:02:48.621902Z"}, {"uuid": "39300a87-a524-4e69-9a42-1b4d3464ccae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12916", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5139", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12916\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Agito Computer Life4All allows SQL Injection.This issue affects Life4All: before 10.01.2025.\n\ud83d\udccf Published: 2025-02-24T14:06:29.227Z\n\ud83d\udccf Modified: 2025-02-24T14:06:29.227Z\n\ud83d\udd17 References:\n1. https://www.usom.gov.tr/bildirim/tr-25-0042", "creation_timestamp": "2025-02-24T14:22:07.000000Z"}, {"uuid": "d5db6f66-a318-40b2-a2cd-9237c106d12a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12912", "type": "seen", "source": "https://t.me/cybersecplayground/13", "content": "CVE-2024-12912&amp;CVE-2024-13062 \n:Injection and execution vulnerabilities in certain ASUS router firmware series.\n\ud83d\udcca 1.2m+ Services are found on hunter.how yearly.\n\ud83d\udd17Hunter Link: hunter.how/list?searchVal\u2026\n\ud83d\udc47Query\nHUNTER :/product.name=\"ASUS AiCloud\"\nFOFA : product=\"ASUS-AiCloud\"\nSHODAN : product:\"ASUS AiCloud\"\n\ud83d\udcf0Refer:securityonline.info/cve-2024-12912\u2026\nasus.com/content/asus-p\u2026\n#ASUS #hunterhow #infosec #infosecurity #OSINT #Vulnerability", "creation_timestamp": "2025-07-19T19:48:50.000000Z"}, {"uuid": "8472820e-41fa-440a-b8dd-cf08b2e41c1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12917", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5186", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12917\n\ud83d\udd25 CVSS Score: 8.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L)\n\ud83d\udd39 Description: Files or Directories Accessible to External Parties vulnerability in Agito Computer Health4All allows Exploiting Incorrectly Configured Access Control Security Levels, Authentication Abuse.This issue affects Health4All: before 10.01.2025.\n\ud83d\udccf Published: 2025-02-24T14:14:55.690Z\n\ud83d\udccf Modified: 2025-02-24T16:58:24.511Z\n\ud83d\udd17 References:\n1. https://www.usom.gov.tr/bildirim/tr-25-0042", "creation_timestamp": "2025-02-24T17:21:54.000000Z"}, {"uuid": "71ad0332-cdee-4a61-a803-ba9d54046a43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12918", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5189", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12918\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Agito Computer Health4All allows SQL Injection.This issue affects Health4All: before 10.01.2025.\n\ud83d\udccf Published: 2025-02-24T14:18:17.909Z\n\ud83d\udccf Modified: 2025-02-24T16:56:38.810Z\n\ud83d\udd17 References:\n1. https://www.usom.gov.tr/bildirim/tr-25-0042", "creation_timestamp": "2025-02-24T17:21:56.000000Z"}, {"uuid": "6db511b9-988a-4bf4-9848-28b97f524b8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12915", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19937", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12915\n\ud83d\udd25 CVSS Score: 4.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Devinim Software Library Software allows Reflected XSS.This issue affects Library Software: before 24.11.02.\n\ud83d\udccf Published: 2025-06-30T15:43:59.956Z\n\ud83d\udccf Modified: 2025-06-30T16:00:17.912Z\n\ud83d\udd17 References:\n1. https://www.usom.gov.tr/bildirim/tr-25-0144", "creation_timestamp": "2025-06-30T16:07:10.000000Z"}, {"uuid": "87a3ede6-4caf-4668-82a8-72fa691749ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12912", "type": "seen", "source": "https://t.me/CyberBulletin/1930", "content": "\u26a1\ufe0fCVE-2024-12912 &amp; CVE-2024-13062: ASUS Routers at Risk.\n\n#CyberBulletin", "creation_timestamp": "2025-01-03T06:34:25.000000Z"}, {"uuid": "96d29d2f-41a5-4c5c-93fe-d6404487e385", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12919", "type": "seen", "source": "https://t.me/cvedetector/15240", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12919 - \"Easy Memberships authentication bypass in WordPress Paid Membership Subscriptions\"\", \n  \"Content\": \"CVE ID : CVE-2024-12919 \nPublished : Jan. 14, 2025, 10:15 a.m. | 39\u00a0minutes ago \nDescription : The Paid Membership Subscriptions \u2013 Effortless Memberships, Recurring Payments &amp; Content Restriction plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 2.13.7. This is due to the pms_pb_payment_redirect_link function using the user-controlled value supplied via the 'pms_payment_id' parameter to authenticate users without any further identity validation. This makes it possible for unauthenticated attackers with knowledge of a valid payment ID to log in as any user who has made a purchase on the targeted site. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T12:18:58.000000Z"}, {"uuid": "15abc8ed-6f33-4dc7-bccf-288945ea17a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12912", "type": "seen", "source": "Telegram/bFbvvsWFrdQ5h-XjTeMTF5qtVAXiD5xqM9z_pQQSq8_xqlI", "content": "", "creation_timestamp": "2025-01-07T21:30:05.000000Z"}, {"uuid": "f6d77fb8-a11f-4ca3-94b5-68673bd1fcdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12912", "type": "seen", "source": "https://t.me/GrayHatsHack/9343", "content": "\u26a1\ufe0fCVE-2024-12912 &amp; CVE-2024-13062: ASUS Routers at Risk.\n\n#CyberBulletin", "creation_timestamp": "2025-01-06T06:33:13.000000Z"}, {"uuid": "ee94faf2-6ade-4ab6-9c6c-e28df6de716c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12912", "type": "seen", "source": "https://t.me/cvedetector/14099", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12912 - ASUS Router AiCloud Arbitrary Command Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12912 \nPublished : Jan. 2, 2025, 9:15 a.m. | 33\u00a0minutes ago \nDescription : An improper input insertion vulnerability in AiCloud on certain router models may lead to arbitrary command execution.  \nRefer to the '01/02/2025 ASUS Router AiCloud vulnerability' section on the ASUS Security Advisory for more information. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T10:54:01.000000Z"}, {"uuid": "4ba13427-88b1-407e-9ad3-9fa080436f53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12912", "type": "seen", "source": "https://t.me/CyberBulletin/27034", "content": "\u26a1\ufe0fCVE-2024-12912 &amp; CVE-2024-13062: ASUS Routers at Risk.\n\n#CyberBulletin", "creation_timestamp": "2025-01-03T06:34:25.000000Z"}]}