{"vulnerability": "CVE-2024-4240", "sightings": [{"uuid": "e0951a27-dc43-4488-950a-a6899011d0a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42407", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113637367425393013", "content": "", "creation_timestamp": "2024-12-12T01:56:59.686610Z"}, {"uuid": "ff6fbae7-bf23-402a-9355-1917ac785c48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42405", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4167", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42405\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-12T22:15:38.477\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01231.html", "creation_timestamp": "2025-02-12T23:12:00.000000Z"}, {"uuid": "163df6e9-fde8-4eaf-afd1-73e0ab500ac5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42405", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhz7dfgmod2g", "content": "", "creation_timestamp": "2025-02-12T22:18:38.689352Z"}, {"uuid": "d55c8c54-5d7c-41b7-b4dc-e7427e0f6a49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42405", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113993862329029015", "content": "", "creation_timestamp": "2025-02-13T00:58:20.198305Z"}, {"uuid": "8469fa38-7f6a-4714-9f61-ccb2f568b1c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42405", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4186", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42405\n\ud83d\udd25 CVSS Score: 6.6 (CVSS_V3)\n\ud83d\udd39 Description: Uncontrolled search path for some Intel(R) Quartus(R) Prime Software before version 23.1.1 Patch 1.01std may allow an authenticated user to potentially enable escalation of privilege via local access.\n\ud83d\udccf Published: 2025-02-13T00:33:07Z\n\ud83d\udccf Modified: 2025-02-13T00:33:07Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-42405\n2. https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01231.html", "creation_timestamp": "2025-02-13T01:09:53.000000Z"}, {"uuid": "5ff45706-f587-4ca8-ad34-1d587d824e67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42408", "type": "seen", "source": "https://t.me/cvedetector/2811", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42408 - InfoScan Proxy File Exposure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42408 \nPublished : Aug. 8, 2024, 6:15 p.m. | 16\u00a0minutes ago \nDescription : The InfoScan client download page can be intercepted with a proxy, to   \nexpose filenames located on the system, which could lead to additional   \ninformation exposure. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-08T20:35:08.000000Z"}, {"uuid": "83733607-3c73-4250-8aa2-7f50f0c1432c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42404", "type": "seen", "source": "https://t.me/cvedetector/5901", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42404 - Welcart e-Commerce SQL Injection Craftiness\", \n  \"Content\": \"CVE ID : CVE-2024-42404 \nPublished : Sept. 18, 2024, 6:15 a.m. | 38\u00a0minutes ago \nDescription : SQL injection vulnerability in Welcart e-Commerce prior to 2.11.2 allows an attacker who can login to the product to obtain or alter the information stored in the database. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-18T09:11:06.000000Z"}, {"uuid": "ccbc0453-de19-4668-a36d-dec668d0f04d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42406", "type": "seen", "source": "https://t.me/cvedetector/6392", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42406 - Mattermost Unauthenticated Archive Channel Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-42406 \nPublished : Sept. 26, 2024, 8:15 a.m. | 36\u00a0minutes ago \nDescription : Mattermost versions 9.11.x &lt;=&lt;=&lt;=&lt;=\nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-26T11:17:03.000000Z"}, {"uuid": "2358c7a1-cac3-47f9-9cda-bc258dc8e9e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42400", "type": "seen", "source": "https://t.me/cvedetector/2634", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42400 - Soft AP Denial-of-Service Vulnerabilities\", \n  \"Content\": \"CVE ID : CVE-2024-42400 \nPublished : Aug. 6, 2024, 8:15 p.m. | 39\u00a0minutes ago \nDescription : Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-06T23:23:29.000000Z"}]}