{"vulnerability": "CVE-2024-25447", "sightings": [{"uuid": "10c7fd40-64e9-495c-a4db-f0950cc5f97d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25447", "type": "seen", "source": "https://t.me/ctinow/185318", "content": "https://ift.tt/o4ONm0W\nCVE-2024-25447 Exploit", "creation_timestamp": "2024-02-15T08:16:56.000000Z"}, {"uuid": "a304b172-b6e9-4624-9409-2ae6f0f74aa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25447", "type": "seen", "source": "https://t.me/arpsyndicate/3422", "content": "#ExploitObserverAlert\n\nCVE-2024-25447\n\nDESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-25447. An issue in the imlib_load_image_with_error_return function of imlib2 v1.9.1 allows attackers to cause a heap buffer overflow via parsing a crafted image.\n\nFIRST-EPSS: 0.000430000", "creation_timestamp": "2024-02-11T15:31:25.000000Z"}, {"uuid": "e9eec137-1757-4e19-951b-17b147b08eb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25447", "type": "seen", "source": "https://t.me/ctinow/198603", "content": "https://ift.tt/oFsaELK\nCVE-2024-25447 | imlib2 1.9.1 Image imlib_load_image_with_error_return heap-based overflow (Issue 20)", "creation_timestamp": "2024-03-03T08:41:44.000000Z"}, {"uuid": "9b6bd050-4425-49bd-abc0-044a2fd5c390", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25447", "type": "seen", "source": "https://t.me/ctinow/182121", "content": "https://ift.tt/18OEFPW\nCVE-2024-25447", "creation_timestamp": "2024-02-09T16:27:15.000000Z"}]}