{"vulnerability": "CVE-2024-38668", "sightings": [{"uuid": "9be5e419-8c06-4382-80a4-6b36ef075b4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38668", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113478591387841203", "content": "", "creation_timestamp": "2024-11-14T00:58:09.574681Z"}, {"uuid": "a66109e4-4092-4ee0-99f1-b63cbe5665e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38668", "type": "seen", "source": "https://t.me/cvedetector/10892", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-38668 - Intel Quartus Prime Standard Edition Uncontrolled Search Path Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-38668 \nPublished : Nov. 13, 2024, 9:15 p.m. | 41\u00a0minutes ago \nDescription : Uncontrolled search path for some Intel(R) Quartus(R) Prime Standard Edition software for Windows before version 23.1.1 may allow an authenticated user to potentially enable escalation of privilege via local access. \nSeverity: 6.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T23:05:53.000000Z"}]}