{"vulnerability": "CVE-2024-24722", "sightings": [{"uuid": "3dfa9b5e-1dd0-4706-bece-46df333cde74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24722", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3ll7pkco74e22", "content": "", "creation_timestamp": "2025-03-25T16:40:23.909372Z"}, {"uuid": "7090444a-e6e6-4c58-983d-7d99dcdbdb53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24722", "type": "seen", "source": "https://t.me/arpsyndicate/3557", "content": "#ExploitObserverAlert\n\nCVE-2024-24722\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-24722. An unquoted service path vulnerability in the 12d Synergy Server and File Replication Server components may allow an attacker to gain elevated privileges via the 12d Synergy Server and/or 12d Synergy File Replication Server executable service path. This is fixed in 4.3.10.192, 5.1.5.221, and 5.1.6.235.\n\nFIRST-EPSS: 0.000450000", "creation_timestamp": "2024-02-20T05:30:40.000000Z"}, {"uuid": "c362e772-2386-4293-aa47-bd1edd0924f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24722", "type": "seen", "source": "https://t.me/ctinow/187490", "content": "https://ift.tt/KzhpJG7\nCVE-2024-24722", "creation_timestamp": "2024-02-19T07:21:53.000000Z"}, {"uuid": "1ff47632-235c-4878-b6af-7574ef4fb026", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24722", "type": "seen", "source": "https://t.me/ctinow/187486", "content": "https://ift.tt/KzhpJG7\nCVE-2024-24722", "creation_timestamp": "2024-02-19T07:21:49.000000Z"}]}