{"vulnerability": "CVE-2024-3303", "sightings": [{"uuid": "cec2b759-1ea4-4915-8b60-ef863d619b58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33036", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113582734642491600", "content": "", "creation_timestamp": "2024-12-02T10:23:09.594823Z"}, {"uuid": "c84bacf8-e050-4e16-8d48-5e81d08d9061", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33037", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113582734657973290", "content": "", "creation_timestamp": "2024-12-02T10:23:09.914611Z"}, {"uuid": "8c0d9ca5-2210-439f-b7f9-925fe5794de9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33039", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113582734671758966", "content": "", "creation_timestamp": "2024-12-02T10:23:10.170144Z"}, {"uuid": "66bcdc30-21f9-40b8-89d8-fd9072d2a892", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3303", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113995677190948647", "content": "", "creation_timestamp": "2025-02-13T08:39:52.894489Z"}, {"uuid": "207e8480-17c1-455b-951b-8a00756490a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3303", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li2e2crliq2h", "content": "", "creation_timestamp": "2025-02-13T09:15:42.737189Z"}, {"uuid": "015e50d3-4806-43d1-866a-d66d4fabd751", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3303", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li2i7ybtcc2p", "content": "", "creation_timestamp": "2025-02-13T10:30:31.780829Z"}, {"uuid": "c0aabe56-4262-413d-adc3-f7d854c54e15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3303", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:34.000000Z"}, {"uuid": "78f6d7db-af28-4228-8ef6-08b295d85182", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33031", "type": "seen", "source": "https://t.me/cvedetector/9716", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-33031 - \"Accio Asterisk Memory Corruptions\"\", \n  \"Content\": \"CVE ID : CVE-2024-33031 \nPublished : Nov. 4, 2024, 10:15 a.m. | 37\u00a0minutes ago \nDescription : Memory corruption while processing the update SIM PB records request. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-04T11:55:37.000000Z"}, {"uuid": "85e9823b-f04c-4143-b861-6bc4f4617ba8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3303", "type": "seen", "source": "https://t.me/cvedetector/17990", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-3303 - GitLab EE: Private Issue Exfiltration via Prompt Injection\", \n  \"Content\": \"CVE ID : CVE-2024-3303 \nPublished : Feb. 13, 2025, 9:15 a.m. | 2\u00a0hours, 15\u00a0minutes ago \nDescription : An issue was discovered in GitLab EE affecting all versions starting from 16.0 prior to 17.6.5, starting from 17.7 prior to 17.7.4, and starting from 17.8 prior to 17.8.2, which allows an attacker to exfiltrate contents of a private issue using prompt injection. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-13T12:58:56.000000Z"}, {"uuid": "899e6000-539b-470b-af87-272e99e2e1f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33032", "type": "seen", "source": "https://t.me/cvedetector/9717", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-33032 - Apache HTTPD Async Memory Corruption\", \n  \"Content\": \"CVE ID : CVE-2024-33032 \nPublished : Nov. 4, 2024, 10:15 a.m. | 37\u00a0minutes ago \nDescription : Memory corruption when the user application modifies the same shared memory asynchronously when kernel is accessing it. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-04T11:55:38.000000Z"}, {"uuid": "4db7b544-8c3b-4d35-8e32-1d1409859828", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33033", "type": "seen", "source": "https://t.me/cvedetector/9712", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-33033 - VMWare Device Foundation Heap Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-33033 \nPublished : Nov. 4, 2024, 10:15 a.m. | 37\u00a0minutes ago \nDescription : Memory corruption while processing IOCTL calls to unmap the buffers. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-04T11:55:31.000000Z"}, {"uuid": "6fea563c-bbf7-4c24-be99-f400f3563dc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3303", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4225", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-3303\n\ud83d\udd25 CVSS Score: 6.4 (CVSS_V3)\n\ud83d\udd39 Description: An issue was discovered in GitLab EE affecting all versions starting from 16.0 prior to 17.6.5, starting from 17.7 prior to 17.7.4, and starting from 17.8 prior to 17.8.2, which allows an attacker to exfiltrate contents of a private issue using prompt injection.\n\ud83d\udccf Published: 2025-02-13T09:31:26Z\n\ud83d\udccf Modified: 2025-02-13T09:31:26Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-3303\n2. https://hackerone.com/reports/2418620\n3. https://gitlab.com/gitlab-org/gitlab/-/issues/454460", "creation_timestamp": "2025-02-13T10:09:06.000000Z"}, {"uuid": "d4ff3e54-e2ed-4456-a72b-e2a8fb9a9305", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33036", "type": "seen", "source": "https://t.me/cvedetector/11765", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-33036 - Cisco Camera Driver Memory Corruption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-33036 \nPublished : Dec. 2, 2024, 11:15 a.m. | 35\u00a0minutes ago \nDescription : Memory corruption while parsing sensor packets in camera driver, user-space variable is used while allocating memory in kernel and parsing which can lead to huge allocation or invalid memory access. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-02T12:54:01.000000Z"}, {"uuid": "da56e100-ed02-4e9e-9620-2d501ba4dbb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33039", "type": "seen", "source": "https://t.me/cvedetector/11764", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-33039 - WebEx Bug Fixing Tool Memory Corruption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-33039 \nPublished : Dec. 2, 2024, 11:15 a.m. | 35\u00a0minutes ago \nDescription : Memory corruption when PAL client calls PAL service APIs by passing a random value as handle and the handle is not validated by the service. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-02T12:54:01.000000Z"}, {"uuid": "34dfbb93-3637-4e21-abcf-345094a6584e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33037", "type": "seen", "source": "https://t.me/cvedetector/11763", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-33037 - Xilinx Zynq NPU IPC Message Invalid Format Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-33037 \nPublished : Dec. 2, 2024, 11:15 a.m. | 35\u00a0minutes ago \nDescription : Information disclosure as NPU firmware can send invalid IPC message to NPU driver as the driver doesn`t validate the IPC message received from the firmware. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-02T12:54:00.000000Z"}, {"uuid": "0c99c3c4-8a3b-461d-99ec-d5926de70353", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33030", "type": "seen", "source": "https://t.me/cvedetector/9715", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-33030 - Microsoft Windows LPLH IPC Frequency Table Memory Corruption Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-33030 \nPublished : Nov. 4, 2024, 10:15 a.m. | 37\u00a0minutes ago \nDescription : Memory corruption while parsing IPC frequency table parameters for LPLH that has size greater than expected size. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-04T11:55:37.000000Z"}, {"uuid": "5449c3e5-1233-4717-98b8-192f24fbbdde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33038", "type": "seen", "source": "https://t.me/cvedetector/4620", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-33038 - \"Texas Instruments TMS320 Chip Memory Corruption Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-33038 \nPublished : Sept. 2, 2024, 12:15 p.m. | 25\u00a0minutes ago \nDescription : Memory corruption while passing untrusted/corrupted pointers from DSP to EVA. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-02T14:43:00.000000Z"}, {"uuid": "7dacc530-dbfe-4b25-bc71-ba99e8c96433", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33035", "type": "seen", "source": "https://t.me/cvedetector/4616", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-33035 - ARM Mali Graphics Frameworkteams.CORRUPT_MEMORY\", \n  \"Content\": \"CVE ID : CVE-2024-33035 \nPublished : Sept. 2, 2024, 12:15 p.m. | 25\u00a0minutes ago \nDescription : Memory corruption while calculating total metadata size when a very high reserved size is requested by gralloc clients. \nSeverity: 8.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-02T14:42:53.000000Z"}, {"uuid": "94d3dd8d-7ed8-4cbf-b2a9-feffae6a2974", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33034", "type": "seen", "source": "https://t.me/cvedetector/2452", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-33034 - NVIDIA GPU SMMU Memory Corruption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-33034 \nPublished : Aug. 5, 2024, 3:15 p.m. | 44\u00a0minutes ago \nDescription : Memory corruption can occur if VBOs hold outdated or invalid GPU SMMU mappings, especially when the binding and reclaiming of memory buffers are performed at the same time. \nSeverity: 8.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-05T18:05:15.000000Z"}, {"uuid": "a8d393e8-47bd-4dd8-a13b-c5504df43894", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3303", "type": "seen", "source": "Telegram/5oZPxUwCeSpxqTvn-RrJvSM2an_33_55C4Tx7JUga3eKCT6f", "content": "", "creation_timestamp": "2025-02-14T10:06:09.000000Z"}, {"uuid": "cdad9419-bee4-409b-ac9e-429886c3c5e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3303", "type": "seen", "source": "Telegram/Inj_2tVgJ-m67gP5WRu-nTEC9UHsztZPCacyc4i5mJMrd8TU", "content": "", "creation_timestamp": "2025-02-14T10:08:09.000000Z"}]}