{"vulnerability": "CVE-2024-2998", "sightings": [{"uuid": "6f40513e-e93e-4c39-a89e-3e1cc59ae9df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29988", "type": "seen", "source": "https://www.thezdi.com/blog/2024/8/14/cve-2024-38213-copy2pwn-exploit-evades-windows-web-protections", "content": "", "creation_timestamp": "2024-08-15T15:41:52.000000Z"}, {"uuid": "e703f602-e1db-4da8-a087-a85409fb7e67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29988", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-04-30T21:10:02.000000Z"}, {"uuid": "cf2845ed-7773-4f86-b40e-b7f898eaf981", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29980", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfppeahaqp2r", "content": "", "creation_timestamp": "2025-01-14T16:48:26.428823Z"}, {"uuid": "605de4ac-0758-4b83-8f17-26dfd3951b02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29988", "type": "seen", "source": "https://www.thezdi.com/blog/2025/1/8/zdi-threat-hunting-2024-highlights-trends-amp-challenges", "content": "", "creation_timestamp": "2025-01-08T16:07:59.000000Z"}, {"uuid": "ac1fe5ea-a896-40bd-93d3-02b2d3a33d52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29988", "type": "seen", "source": "https://bsky.app/profile/gothburz.bsky.social/post/3lfaqqb4ci62o", "content": "", "creation_timestamp": "2025-01-08T18:03:07.950292Z"}, {"uuid": "71be87fa-9067-48fd-ada6-12fb78f85786", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29980", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpnk6foyv2e", "content": "", "creation_timestamp": "2025-01-14T16:15:58.051221Z"}, {"uuid": "3a2c059b-6fc7-4d8a-9c70-104ac8b1a50f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-29988", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/2f4f3b6f-f8d4-40fa-8108-7b2261c96b33", "content": "", "creation_timestamp": "2026-02-02T12:26:37.507986Z"}, {"uuid": "a64afd89-2306-4298-8123-5581574191f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29988", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:54.000000Z"}, {"uuid": "2af091ab-a7f3-4301-bb51-925e376f1d62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-29988", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1267", "content": "", "creation_timestamp": "2024-04-10T04:00:00.000000Z"}, {"uuid": "bff0dd5d-db73-4ff6-aaff-de035a1ddcd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29980", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1505", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-29980\n\ud83d\udd39 Description: Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore\u2122 for Intel Kaby Lake, Phoenix SecureCore\u2122 for Intel Coffee Lake, Phoenix SecureCore\u2122 for Intel Comet Lake, Phoenix SecureCore\u2122 for Intel Ice Lake allows Input Data Manipulation.This issue affects SecureCore\u2122 for Intel Kaby Lake: before 4.0.1.1012; SecureCore\u2122 for Intel Coffee Lake: before 4.1.0.568; SecureCore\u2122 for Intel Comet Lake: before 4.2.1.292; SecureCore\u2122 for Intel Ice Lake: before 4.2.0.334.\n\ud83d\udccf Published: 2025-01-14T16:00:15.300Z\n\ud83d\udccf Modified: 2025-01-14T16:02:13.985Z\n\ud83d\udd17 References:\n1. https://www.phoenix.com/phoenix-security-notifications/cve-2024-29980/", "creation_timestamp": "2025-01-14T17:34:11.000000Z"}, {"uuid": "15f24813-a9cb-4f0f-97c0-e2978b08817c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29988", "type": "seen", "source": "https://t.me/kasperskyb2b/1221", "content": "\ud83d\udcbb \u0410\u043f\u0440\u0435\u043b\u044c\u0441\u043a\u0438\u0439 \u0432\u0442\u043e\u0440\u043d\u0438\u043a \u043f\u0430\u0442\u0447\u0435\u0439: \u0434\u0432\u0430 0-day \u0438 \u043a\u0430\u0448\u0430 \u0432 \u0420\u0435\u0434\u043c\u043e\u043d\u0434\u0435\n\nMicrosoft \u0437\u0430\u043a\u0440\u044b\u043b\u0430 \u0432 \u0430\u043f\u0440\u0435\u043b\u044c\u0441\u043a\u043e\u043c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0438 150 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0441\u0440\u0435\u0434\u0438 \u043a\u043e\u0442\u043e\u0440\u044b\u0445  \u0432\u0441\u0435\u0433\u043e \u0442\u0440\u0438 \u0438\u043c\u0435\u044e\u0442 \u0440\u0435\u0439\u0442\u0438\u043d\u0433 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 (\u0432\u0441\u0435 \u2014 \u0432 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0435 Defender for IoT). \u0418\u0437\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0437\u0430\u044f\u0432\u043b\u044f\u043b\u0430, \u0447\u0442\u043e \u043d\u0438 \u043e\u0434\u043d\u0430 \u0434\u044b\u0440\u0430 \u043d\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432\u0436\u0438\u0432\u0443\u044e, \u043d\u043e \u0441\u043f\u0443\u0441\u0442\u044f \u0432\u0441\u0435\u0433\u043e \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0447\u0430\u0441\u043e\u0432 \u043d\u0430\u0447\u0430\u043b\u0430 \u0432\u044b\u043f\u0443\u0441\u043a\u0430\u0442\u044c \u043a\u043e\u0440\u0440\u0435\u043a\u0446\u0438\u0438 \u0432 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0438. CVE-2024-26234 \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0441\u044f \u043a \u043f\u043e\u0434\u0434\u0435\u043b\u044c\u043d\u043e\u043c\u0443 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0443 \u043f\u0440\u043e\u043a\u0441\u0438-\u0441\u0435\u0440\u0432\u0435\u0440\u0430, \u0430 CVE-2024-29988 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043e\u0431\u0445\u043e\u0434\u0438\u0442\u044c WIndows SmartScreen. \u041e\u043d \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0432\u0442\u043e\u0440\u043e\u0439 \u0447\u0430\u0441\u0442\u044c\u044e \u0446\u0435\u043f\u043e\u0447\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432, \u043f\u0435\u0440\u0432\u0443\u044e \u043f\u043e\u043b\u043e\u0432\u0438\u043d\u0443 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0437\u0430\u043a\u0440\u044b\u043b\u0438 \u0432 \u0444\u0435\u0432\u0440\u0430\u043b\u0435 (CVE-2024-21412). \u0420\u0430\u043d\u0435\u0435 \u043f\u043e\u0434\u043e\u0431\u043d\u044b\u043c \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430\u0440\u0438\u0435\u043c \u0443\u0441\u043f\u0435\u0448\u043d\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438 ransomware. \n\n\u041f\u043e\u0447\u0442\u0438 \u0432\u0441\u0435 \u043e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u0435 \u0434\u044b\u0440\u044b \u0438\u043c\u0435\u044e\u0442 \u0440\u0435\u0439\u0442\u0438\u043d\u0433 important. \u0410\u0436 67 \u0448\u0442\u0443\u043a \u043e\u0442\u043d\u043e\u0441\u044f\u0442\u0441\u044f \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430, 31 \u2014 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439, 27 \u2014 \u043e\u0431\u0445\u043e\u0434\u0443 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, 12 \u2014 \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0435\u043d\u0438\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438 7 DoS. \u041f\u0440\u0438\u043c\u0435\u0447\u0430\u0442\u0435\u043b\u044c\u043d\u043e, \u0447\u0442\u043e Microsoft \u043d\u0430\u0447\u0430\u043b\u0430 \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u0442\u044c \u0442\u0438\u043f \u0434\u0435\u0444\u0435\u043a\u0442\u0430 (CWE) \u0432 \u043a\u0430\u0440\u0442\u043e\u0447\u043a\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u044f.\n\n\u0421\u0440\u0435\u0434\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0438\u043c\u0435\u044e\u0449\u0438\u0445 \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u0443\u044e \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e\u0441\u0442\u044c \u0431\u0443\u0434\u0443\u0449\u0435\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438, \u043e\u0442\u043c\u0435\u0447\u0430\u044e\u0442 RCE \u0432 RPC (CVE-2024-20678) \u0438 \u0432 Excel (CVE-2024-26257).\n\n\u0426\u0435\u043b\u044b\u0445 41 CVE \u043e\u0442\u043d\u043e\u0441\u044f\u0442\u0441\u044f \u043a \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u043c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430\u043c ODBC (Open Database Connectivity), \u0432\u0438\u0434\u0438\u043c\u043e \u0432 \u043d\u0438\u0445 \u0432\u0441\u0435\u0445 \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0438 \u043e\u0434\u0438\u043d\u0430\u043a\u043e\u0432\u044b\u0439 \u0434\u0435\u0444\u0435\u043a\u0442, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043f\u043e\u0442\u044f\u043d\u0443\u043b \u043d\u0430 CVSS 8.8. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0441\u043b\u043e\u0436\u043d\u043e\u0432\u0430\u0442\u0430 \u2014 \u043d\u0430\u0434\u043e \u0443\u0431\u0435\u0434\u0438\u0442\u044c \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0438\u0442\u044c\u0441\u044f \u043a \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u043c\u0443 SQL-\u0441\u0435\u0440\u0432\u0435\u0440\u0443. \n\n\u0415\u0449\u0451 24 CVE \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0442 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u043e\u0431\u0445\u043e\u0434\u0430 secure boot. \u041a\u0430\u043a \u043e\u0431\u044b\u0447\u043d\u043e \u0441 secure boot, \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0441\u043e\u043f\u0440\u044f\u0436\u0435\u043d\u0430 \u0441 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u044b\u043c\u0438 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u044f\u043c\u0438 \u0438 \u0440\u0443\u0447\u043d\u043e\u0439 \u0430\u043a\u0442\u0438\u0432\u0430\u0446\u0438\u0435\u0439 \u0437\u0430\u0449\u0438\u0442\u044b \u043f\u043e\u0441\u043b\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f DBX.\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 @\u041f2\u0422", "creation_timestamp": "2024-04-10T09:11:17.000000Z"}, {"uuid": "1c105f3a-4700-4f0e-bebd-8074ca35c07a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29980", "type": "seen", "source": "https://t.me/cvedetector/15296", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-29980 - Phoenix SecureCore for Intel CPU: Unvalidated Input Manipulation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-29980 \nPublished : Jan. 14, 2025, 4:15 p.m. | 36\u00a0minutes ago \nDescription : Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore\u2122 for Intel Kaby Lake, Phoenix SecureCore\u2122 for Intel Coffee Lake, Phoenix SecureCore\u2122 for Intel Comet Lake, Phoenix SecureCore\u2122 for Intel Ice Lake allows Input Data Manipulation.This issue affects SecureCore\u2122 for Intel Kaby Lake: before 4.0.1.1012; SecureCore\u2122 for Intel Coffee Lake: before 4.1.0.568; SecureCore\u2122 for Intel Comet Lake: before 4.2.1.292; SecureCore\u2122 for Intel Ice Lake: before 4.2.0.334. \nSeverity: 2.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T18:11:00.000000Z"}, {"uuid": "0117f5b9-3606-44fb-a699-6408a4c33009", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29988", "type": "seen", "source": "https://t.me/arpsyndicate/4449", "content": "#ExploitObserverAlert\n\nCVE-2024-29988\n\nDESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-29988. SmartScreen Prompt Security Feature Bypass Vulnerability\n\nFIRST-EPSS: 0.000430000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2024-04-11T06:01:07.000000Z"}, {"uuid": "0d075d90-486b-47d6-bf1b-cd72a2afde87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29988", "type": "exploited", "source": "https://t.me/ctinow/214580", "content": "https://ift.tt/0SPjY3y\nMicrosoft patches actively exploited security feature bypass vulnerability (CVE-2024-29988) - Help Net Security", "creation_timestamp": "2024-04-10T00:21:48.000000Z"}, {"uuid": "a7002d2f-cb97-4fd3-9687-edeb7eb301db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29988", "type": "seen", "source": "https://t.me/CyberSecurityIL/42459", "content": "\u05d0\u05e4\u05e8\u05d5\u05e4\u05d5 \u05d7\u05d5\u05dc\u05e9\u05d5\u05ea, \u05de\u05e6\u05e8\u05e3 \u05dc\u05db\u05dd \u05de\u05d9\u05d3\u05e2 \u05e2\u05dc \u05db\u05de\u05d4 \u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05e9\u05e4\u05d5\u05e8\u05e1\u05de\u05d5 \u05dc\u05d0\u05d7\u05e8\u05d5\u05e0\u05d4 \u05d1\u05de\u05d5\u05e6\u05e8\u05d9\u05dd \u05e9\u05d5\u05e0\u05d9\u05dd:\n\n- \u05db\u05d7\u05dc\u05e7 \u05de\u05e2\u05d3\u05db\u05d5\u05e0\u05d9 \u05d4\u05d0\u05d1\u05d8\u05d7\u05d4 \u05d4\u05d7\u05d5\u05d3\u05e9\u05d9\u05d9\u05dd \u05e9\u05dc \u05d0\u05e4\u05e8\u05d9\u05dc 2024,  \u05de\u05d9\u05d9\u05e7\u05e8\u05d5\u05e1\u05d5\u05e4\u05d8 \u05de\u05e4\u05d9\u05e6\u05d4 \u05e2\u05d3\u05db\u05d5\u05df \u05d4\u05e1\u05d5\u05d2\u05e8 2 \u05d7\u05d5\u05dc\u05e9\u05d5\u05ea Zero Day \u05d4\u05de\u05e0\u05d5\u05e6\u05dc\u05d5\u05ea \u05d1\u05e4\u05d5\u05e2\u05dc \u05e2\u05dc \u05d9\u05d3\u05d9 \u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05de\u05e1\u05d1\u05d9\u05d1 \u05dc\u05e2\u05d5\u05dc\u05dd -  CVE-2024-26234 \u05d5- CVE-2024-29988\n\n- \u05d7\u05d5\u05dc\u05e9\u05d4 \u05e7\u05e8\u05d9\u05d8\u05d9\u05ea \u05d1\u05e1\u05e4\u05e8\u05d9\u05d4 Rust \u05de\u05d0\u05e4\u05e9\u05e8\u05ea \u05dc\u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05dc\u05d4\u05e8\u05d9\u05e5 \u05e7\u05d5\u05d3 \u05de\u05e8\u05d7\u05d5\u05e7 (\u05ea\u05e7\u05e3 \u05e8\u05e7 \u05dc\u05de\u05e2\u05e8\u05db\u05d5\u05ea Windows) -  CVE-2024-24576.\n\u05e9\u05d9\u05de\u05d5 \u05dc\u05d1 \u05de\u05d3\u05d5\u05d1\u05e8 \u05d1\u05d7\u05d5\u05dc\u05e9\u05d4 \u05d4\u05de\u05d3\u05d5\u05e8\u05d2\u05ea 10/10 \u05db\u05e9\u05d4\u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05d7\u05dc\u05d4 \u05e2\u05dc Rust standard library \u05dc\u05e4\u05e0\u05d9 \u05d2\u05e8\u05e1\u05d4 1.77.2.\n\n- \u05d7\u05d5\u05e7\u05e8\u05d9\u05dd \u05d7\u05e9\u05e4\u05d5 \u05d0\u05e8\u05d1\u05e2 \u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05d1\u05d8\u05dc\u05d5\u05d5\u05d9\u05d6\u05d9\u05d5\u05ea \u05d4\u05d7\u05db\u05de\u05d5\u05ea \u05e9\u05dc LG - \u05e4\u05e8\u05d8\u05d9\u05dd \u05e0\u05d5\u05e1\u05e4\u05d9\u05dd \u05e2\u05dc \u05db\u05dc \u05d4\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea - \u05db\u05d0\u05df\n\nhttps://t.me/CyberSecurityIL/4978\n\n#\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea", "creation_timestamp": "2024-04-10T13:01:14.000000Z"}, {"uuid": "81a723a4-4f75-42d2-ad4f-c0ab9aea2611", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29988", "type": "exploited", "source": "https://t.me/ctinow/214562", "content": "https://ift.tt/0SPjY3y\nMicrosoft patches actively exploited security feature bypass vulnerability (CVE-2024-29988)", "creation_timestamp": "2024-04-09T21:41:41.000000Z"}, {"uuid": "f19290df-9f12-400b-81c2-5a276ff5b24a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-29988", "type": "exploited", "source": "https://t.me/information_security_channel/51923", "content": "Microsoft Patches Two Zero-Days Exploited for Malware Delivery\nhttps://www.securityweek.com/microsoft-patches-two-zero-days-exploited-for-malware-delivery/\n\nMicrosoft patches CVE-2024-29988 and CVE-2024-26234, two zero-day vulnerabilities exploited by threat actors to deliver malware.\nThe post Microsoft Patches Two Zero-Days Exploited for Malware Delivery (https://www.securityweek.com/microsoft-patches-two-zero-days-exploited-for-malware-delivery/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2024-04-10T14:03:19.000000Z"}]}