{"vulnerability": "CVE-2024-42405", "sightings": [{"uuid": "ff6fbae7-bf23-402a-9355-1917ac785c48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42405", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4167", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42405\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-12T22:15:38.477\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01231.html", "creation_timestamp": "2025-02-12T23:12:00.000000Z"}, {"uuid": "163df6e9-fde8-4eaf-afd1-73e0ab500ac5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42405", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhz7dfgmod2g", "content": "", "creation_timestamp": "2025-02-12T22:18:38.689352Z"}, {"uuid": "d55c8c54-5d7c-41b7-b4dc-e7427e0f6a49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42405", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113993862329029015", "content": "", "creation_timestamp": "2025-02-13T00:58:20.198305Z"}, {"uuid": "8469fa38-7f6a-4714-9f61-ccb2f568b1c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42405", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4186", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42405\n\ud83d\udd25 CVSS Score: 6.6 (CVSS_V3)\n\ud83d\udd39 Description: Uncontrolled search path for some Intel(R) Quartus(R) Prime Software before version 23.1.1 Patch 1.01std may allow an authenticated user to potentially enable escalation of privilege via local access.\n\ud83d\udccf Published: 2025-02-13T00:33:07Z\n\ud83d\udccf Modified: 2025-02-13T00:33:07Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-42405\n2. https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01231.html", "creation_timestamp": "2025-02-13T01:09:53.000000Z"}]}