{"vulnerability": "CVE-2024-37355", "sightings": [{"uuid": "48a00be2-54c3-42da-bd1b-cd8c61bdd71a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37355", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhz7bqa35d2z", "content": "", "creation_timestamp": "2025-02-12T22:17:42.904028Z"}, {"uuid": "ac773e5e-dcbe-4fa9-9c14-065c5c91a7dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37355", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113993354931215500", "content": "", "creation_timestamp": "2025-02-12T22:49:19.022291Z"}, {"uuid": "74955761-fb0e-452c-b94d-f02a172b90c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37355", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113993567087200643", "content": "", "creation_timestamp": "2025-02-12T23:43:15.227754Z"}, {"uuid": "fa074caf-dbc3-41f0-bdeb-c60f95b1ce7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37355", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhzj6oxjzl26", "content": "", "creation_timestamp": "2025-02-13T01:14:58.750343Z"}, {"uuid": "b9638d10-0565-46d1-a8a8-c6930cd51cda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37355", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4197", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-37355\n\ud83d\udd25 CVSS Score: 9.4 (CVSS_V3)\n\ud83d\udd39 Description: Improper access control in some Intel(R) Graphics software may allow an authenticated user to potentially enable escalation of privilege via local access.\n\ud83d\udccf Published: 2025-02-13T00:33:06Z\n\ud83d\udccf Modified: 2025-02-13T00:33:06Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-37355\n2. https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01235.html", "creation_timestamp": "2025-02-13T01:10:48.000000Z"}, {"uuid": "0214ab9d-262a-4d0b-9c71-a8cd0d27a1a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37355", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5452", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-37355\n\ud83d\udd25 CVSS Score: 8.5 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Improper access control in some Intel(R) Graphics software may allow an authenticated user to potentially enable escalation of privilege via local access.\n\ud83d\udccf Published: 2025-02-12T21:18:47.198Z\n\ud83d\udccf Modified: 2025-02-26T04:55:34.979Z\n\ud83d\udd17 References:\n1. https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01235.html", "creation_timestamp": "2025-02-26T05:26:35.000000Z"}]}