{"vulnerability": "CVE-2024-4149", "sightings": [{"uuid": "9bc7c278-b1b7-4a40-8d99-d7327bd3109e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-41498", "type": "seen", "source": "https://bsky.app/profile/xdx666.bsky.social/post/3ltstdgerfk2m", "content": "", "creation_timestamp": "2025-07-13T02:30:20.687734Z"}, {"uuid": "421ff66a-c5fd-4d65-a548-ece2c9da87e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41492", "type": "seen", "source": "https://t.me/cvedetector/1221", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41492 - Tenda AX1806 Denial of Service (DoS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41492 \nPublished : July 19, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : A stack overflow in Tenda AX1806 v1.0.0.1 allows attackers to cause a Denial of Service (DoS) via a crafted input. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-19T20:23:26.000000Z"}, {"uuid": "64fe5d43-1698-423f-a2d2-2129480f6a9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41498", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/296", "content": "#Kernel_Security\nPhysMem(e): When Kernel Drivers Peek into Memory (CVE-2024-41498)\nhttps://blog.reveng.ai/physmem-e-when-kernel-drivers-peek-into-memory", "creation_timestamp": "2024-09-08T15:15:13.000000Z"}, {"uuid": "7f205ff6-f28e-4940-b496-fd9ef2fe6088", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41498", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/11100", "content": "#Kernel_Security\nPhysMem(e): When Kernel Drivers Peek into Memory (CVE-2024-41498)\nhttps://blog.reveng.ai/physmem-e-when-kernel-drivers-peek-into-memory", "creation_timestamp": "2024-09-08T17:32:54.000000Z"}, {"uuid": "99b74b04-cc6b-488d-a1e5-c2e08a8dd6d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41498", "type": "seen", "source": "https://t.me/Rootsec_2/4371", "content": "#Kernel_Security\nPhysMem(e): When Kernel Drivers Peek into Memory (CVE-2024-41498)\nhttps://blog.reveng.ai/physmem-e-when-kernel-drivers-peek-into-memory", "creation_timestamp": "2024-09-09T09:56:25.000000Z"}]}