{"vulnerability": "CVE-2024-41792", "sightings": [{"uuid": "49fc85ad-22f4-414f-b0c9-4cfabfd60a6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41792", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114308206326034766", "content": "", "creation_timestamp": "2025-04-09T13:20:09.469027Z"}, {"uuid": "bbd2b956-09fc-4113-8732-9c5ac22ec54c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41792", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114302183018844167", "content": "", "creation_timestamp": "2025-04-08T11:48:21.553621Z"}, {"uuid": "065afd0d-2bff-4ff7-b29c-9e9b636235c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41792", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmcgsofoyl24", "content": "", "creation_timestamp": "2025-04-08T12:07:14.189917Z"}, {"uuid": "bf39548f-fb46-4c59-b04e-14e7ed1cd195", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41792", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-06", "content": "", "creation_timestamp": "2025-04-10T10:00:00.000000Z"}, {"uuid": "d6b9c743-449f-4e39-841d-35e61a663080", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41792", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10884", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41792\n\ud83d\udd25 CVSS Score: 8.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices contains a path traversal vulnerability. This could allow an unauthenticated attacker it to access arbitrary files on the device with root privileges.\n\ud83d\udccf Published: 2025-04-08T08:22:08.546Z\n\ud83d\udccf Modified: 2025-04-08T08:22:08.546Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-187636.html", "creation_timestamp": "2025-04-08T08:46:49.000000Z"}]}