{"vulnerability": "CVE-2024-3718", "sightings": [{"uuid": "6056b383-6c46-46bf-9936-4a92a2ad6626", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37184", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpk7grpx32c", "content": "", "creation_timestamp": "2025-01-14T15:16:16.440735Z"}, {"uuid": "12a65803-e4d7-4564-9741-5cd5352e6b44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37186", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpk7kfuqn2f", "content": "", "creation_timestamp": "2025-01-14T15:16:20.255172Z"}, {"uuid": "fca115c3-f98e-41e2-8cd2-f3f859cc2e85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37181", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113839339708358437", "content": "", "creation_timestamp": "2025-01-16T18:01:12.067625Z"}, {"uuid": "b16fa2aa-125c-46be-a42e-094e90907de4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37181", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfuv65cevp2j", "content": "", "creation_timestamp": "2025-01-16T18:15:43.071650Z"}, {"uuid": "7e4d42d5-2c58-4a48-9ec2-7abc4d4359a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37181", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfuwqzyqck2r", "content": "", "creation_timestamp": "2025-01-16T18:44:12.592232Z"}, {"uuid": "1f3f0db6-8566-4a74-8dfc-28a33421ddff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37181", "type": "seen", "source": "https://t.me/cvedetector/15603", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37181 - Intel(R) Neural Compressor TOCTOU race condition Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-37181 \nPublished : Jan. 16, 2025, 6:15 p.m. | 43\u00a0minutes ago \nDescription : Time-of-check time-of-use race condition in some Intel(R) Neural Compressor software before version v3.0 may allow an authenticated user to potentially enable information disclosure via adjacent access. \nSeverity: 2.6 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-16T20:24:58.000000Z"}, {"uuid": "7bd24f2e-7d04-42a7-9b81-906b223597cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37187", "type": "seen", "source": "https://t.me/cvedetector/6575", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37187 - Advantech ADAM-5550 Weak Password Encryption\", \n  \"Content\": \"CVE ID : CVE-2024-37187 \nPublished : Sept. 27, 2024, 6:15 p.m. | 34\u00a0minutes ago \nDescription : Advantech ADAM-5550 share user credentials with a low level of encryption, consisting of base 64 encoding. \nSeverity: 5.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-27T20:55:29.000000Z"}, {"uuid": "c8f1453b-52e7-47e7-9629-c64afb058dc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37180", "type": "seen", "source": "https://t.me/cvedetector/243", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37180 - Under certain conditions SAP NetWeaver Application\", \n  \"Content\": \"CVE ID : CVE-2024-37180 \nPublished : July 9, 2024, 5:15 a.m. | 19\u00a0minutes ago \nDescription : Under certain conditions SAP NetWeaver  \nApplication Server for ABAP and ABAP Platform allows an attacker to access  \nremote-enabled function module with no further authorization which would  \notherwise be restricted, the function can be used to read non-sensitive  \ninformation with low impact on confidentiality of the application. \nSeverity: 4.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T07:38:27.000000Z"}, {"uuid": "da61cd96-2e68-49bf-953a-371c74f5c1f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3718", "type": "seen", "source": "Telegram/TPJoNAr3ObrK2XRul1_UjZFbB-gcwUkKA9OzDvKTkDspY8WH", "content": "", "creation_timestamp": "2025-02-06T02:40:18.000000Z"}]}