{"vulnerability": "CVE-2024-26630", "sightings": [{"uuid": "8f04b8f3-89a9-4779-b1da-cf564d406279", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26630", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10284", "content": "#exploit\n1. Biotime Directory Traversal, RCE\nhttps://blog.appsecco.com/backdooring-amis-for-fun-and-profit-e5a02f256983\n]-&gt; https://github.com/omair2084/biotime-rce-8.5.5\n\n2. CVE-2024-26630:\nLinux 6.5 Kernel Pointer Leak\nhttps://packetstormsecurity.com/files/177943/Linux-6.5-Kernel-Pointer-Leak.html", "creation_timestamp": "2024-04-06T18:41:09.000000Z"}, {"uuid": "dec2562d-cece-479f-a732-8fecae33c5ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26630", "type": "seen", "source": "https://t.me/ctinow/207263", "content": "https://ift.tt/3kL7zsO\nCVE-2024-26630", "creation_timestamp": "2024-03-13T22:56:21.000000Z"}, {"uuid": "5995cae1-956a-417a-95de-7ad78334de77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26630", "type": "published-proof-of-concept", "source": "https://t.me/LearnExploit/6462", "content": "CVE-2024-26630\n\nLinux 6.5 Kernel Pointer Leak \u2757\ufe0f\n\nLink\n\n#Cve #linux #Exploit\n \u2014\u2014\u2014\u2014\u2014\u2014\u200c\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2024-04-07T09:23:39.000000Z"}]}