{"vulnerability": "CVE-2024-4244", "sightings": [{"uuid": "514025be-40c3-4a19-8b67-4867e54857fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42442", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113470679671943514", "content": "", "creation_timestamp": "2024-11-12T15:26:06.365986Z"}, {"uuid": "3bbf739c-b5ae-4faa-a0ef-8df7269185f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42449", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113592013388424843", "content": "", "creation_timestamp": "2024-12-04T01:42:52.005835Z"}, {"uuid": "184d2fe4-6b8d-461a-b9dd-b97caf73c91b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-42449", "type": "seen", "source": "https://infosec.exchange/users/edwardk/statuses/113591078514826699", "content": "", "creation_timestamp": "2024-12-03T21:45:08.442233Z"}, {"uuid": "8975748b-d068-4a9c-bb56-df0368938771", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42449", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113595261529555921", "content": "", "creation_timestamp": "2024-12-04T15:28:55.524661Z"}, {"uuid": "83d28ffb-d1b2-474b-9254-8fe0ce20035f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42448", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113595261529555921", "content": "", "creation_timestamp": "2024-12-04T15:28:55.460637Z"}, {"uuid": "ef971eba-fd8d-46a1-9d42-7e65f1364361", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-42448", "type": "seen", "source": "https://infosec.exchange/users/edwardk/statuses/113591078514826699", "content": "", "creation_timestamp": "2024-12-03T21:45:08.401822Z"}, {"uuid": "5ba9d372-463c-40c2-b4d7-e1241fd77a3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42448", "type": "seen", "source": "https://thehackernews.com/2024/12/veeam-issues-patch-for-critical-rce.html", "content": "", "creation_timestamp": "2024-12-04T04:34:00.000000Z"}, {"uuid": "a8722f1e-883f-47b6-93a7-46ffe9ba55ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42448", "type": "seen", "source": "MISP/f31cd416-27cc-4b12-a2d9-36f960582214", "content": "", "creation_timestamp": "2024-12-09T15:07:13.000000Z"}, {"uuid": "03602a55-a030-4233-b335-329c312add20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42449", "type": "seen", "source": "MISP/6147f6cf-59b8-4ea3-9fb2-eeffc33b62d8", "content": "", "creation_timestamp": "2024-12-09T15:07:13.000000Z"}, {"uuid": "6d1dc81c-dba0-4b7d-9a4c-48228fb98e66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42448", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113635719777126597", "content": "", "creation_timestamp": "2024-12-11T18:57:58.489776Z"}, {"uuid": "aec33c6b-f42e-4c59-a21c-2701fde129d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42448", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113635736561697232", "content": "", "creation_timestamp": "2024-12-11T19:02:15.870015Z"}, {"uuid": "d8cc4681-1143-46e5-85fc-8892cac6ab26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42444", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfpkevet5f2t", "content": "", "creation_timestamp": "2025-01-14T15:19:19.597433Z"}, {"uuid": "86806cca-3312-4687-bd74-da086f6d866f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42448", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lglsnpqnz32z", "content": "", "creation_timestamp": "2025-01-25T21:01:59.418937Z"}, {"uuid": "7534dfc3-7942-415c-b748-803b6df2d18a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42448", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9314", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-42448\nURL\uff1ahttps://github.com/zetraxz/CVE-2024-42448\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-12-04T20:51:57.000000Z"}, {"uuid": "5cadf9ea-7ecd-413e-a462-4c4ab7b62559", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42446", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114501097225784167", "content": "", "creation_timestamp": "2025-05-13T14:54:51.464657Z"}, {"uuid": "1f17035f-60de-442c-b1cc-76c3ff31c9dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42446", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lp2rmbxyeor2", "content": "", "creation_timestamp": "2025-05-13T15:31:29.720699Z"}, {"uuid": "a595fb9b-2eb3-4992-b025-035cba2bcf80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42449", "type": "seen", "source": "https://t.me/cvedetector/11931", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42449 - From the VSPC management agent machine, under cond\", \n  \"Content\": \"CVE ID : CVE-2024-42449 \nPublished : Dec. 4, 2024, 2:15 a.m. | 48\u00a0minutes ago \nDescription : From the VSPC management agent machine, under condition that the management agent is authorized on the server, it is possible to remove arbitrary files on the VSPC server machine. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-04T04:12:24.000000Z"}, {"uuid": "76afbb48-a909-4571-920e-74b6fd060658", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42446", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16141", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42446\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: APTIOV contains a vulnerability in BIOS where an attacker may cause a Time-of-check Time-of-use (TOCTOU) Race Condition by local means. Successful exploitation of this vulnerability may lead to arbitrary code execution.\n\ud83d\udccf Published: 2025-05-13T14:02:10.628Z\n\ud83d\udccf Modified: 2025-05-13T15:16:25.056Z\n\ud83d\udd17 References:\n1. https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025004.pdf", "creation_timestamp": "2025-05-13T15:31:15.000000Z"}, {"uuid": "7a0119c5-1c11-406c-ae69-6f162b12fc77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42446", "type": "seen", "source": "https://t.me/cvedetector/25197", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42446 - APTIOV BIOS TOCTOU Race Condition Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42446 \nPublished : May 13, 2025, 2:15 p.m. | 54\u00a0minutes ago \nDescription : APTIOV contains a vulnerability in BIOS where an attacker may cause a Time-of-check Time-of-use (TOCTOU) Race Condition by local means. Successful exploitation of this vulnerability may lead to arbitrary code execution. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T17:13:07.000000Z"}, {"uuid": "60765b3d-fbeb-4d7d-b5d4-5bf451e1b87f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42444", "type": "seen", "source": "https://t.me/cvedetector/15270", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42444 - \"APTIOV BIOS TOCTOU Race Condition Code Execution Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-42444 \nPublished : Jan. 14, 2025, 3:15 p.m. | 45\u00a0minutes ago \nDescription : APTIOV contains a vulnerability in BIOS where an attacker may cause a TOCTOU Race Condition by local means. Successful exploitation of this vulnerability may lead to execution of arbitrary code on the target device. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T17:20:17.000000Z"}, {"uuid": "ba448c72-aefe-4acf-a344-07ae3577e732", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42444", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1488", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-42444\n\ud83d\udd39 Description: APTIOV contains a vulnerability in BIOS where an attacker may cause a TOCTOU Race Condition by local means. Successful exploitation of this vulnerability may lead to execution of arbitrary code on the target device.\n\ud83d\udccf Published: 2025-01-14T15:00:42.112Z\n\ud83d\udccf Modified: 2025-01-14T15:00:42.112Z\n\ud83d\udd17 References:\n1. https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025001.pdf", "creation_timestamp": "2025-01-14T15:11:11.000000Z"}, {"uuid": "fa437e78-4280-4fc3-b8bf-d79a30c34443", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42442", "type": "seen", "source": "https://t.me/cvedetector/10626", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42442 - APTOV BIOS Buffer Overflow Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-42442 \nPublished : Nov. 12, 2024, 3:15 p.m. | 42\u00a0minutes ago \nDescription : APTIOV contains a vulnerability in the BIOS where a user or attacker may cause an improper restriction of operations within the bounds of a memory buffer over the network. A successful exploitation of this vulnerability may lead to code execution outside of the intended System Management Mode. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-12T17:12:48.000000Z"}, {"uuid": "a32e670c-f998-4896-a941-0d088e0d2bc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42441", "type": "seen", "source": "https://t.me/cvedetector/3181", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42441 - Zoom Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42441 \nPublished : Aug. 14, 2024, 5:15 p.m. | 29\u00a0minutes ago \nDescription : Improper privilege management in the installer for Zoom Workplace Desktop App for macOS, Zoom Meeting SDK for macOS and Zoom Rooms Client for macOS before 6.1.5 may allow a privileged user to conduct an escalation of privilege via local access. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-14T19:54:10.000000Z"}, {"uuid": "abb9d872-9371-4106-83b5-e55ddc186f84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42447", "type": "seen", "source": "https://t.me/cvedetector/2439", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42447 - Apache Airflow Providers FAB: Session Expiration Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42447 \nPublished : Aug. 5, 2024, 8:15 a.m. | 39\u00a0minutes ago \nDescription : Insufficient Session Expiration vulnerability in Apache Airflow Providers FAB.  \n  \nThis issue affects Apache Airflow Providers FAB: 1.2.1 (when used with Apache Airflow 2.9.3) and FAB 1.2.0 for all Airflow versions. The FAB provider prevented the user from logging out.\u00a0\u00a0  \n  \n* FAB provider 1.2.1 only affected Airflow 2.9.3 (earlier and later versions of Airflow are not affected)  \n  \n* FAB provider 1.2.0 affected all versions of Airflow.  \n  \nUsers who run Apache Airflow 2.9.3 are recommended to upgrade to Apache Airflow Providers FAB version 1.2.2 which fixes the issue.  \n  \nUsers who run Any Apache Airflow version and have FAB provider 1.2.0 are recommended to upgrade to Apache Airflow Providers FAB version 1.2.2 which fixes the issue.  \n  \nAlso upgrading Apache Airflow to latest version available is recommended.  \n  \nNote: Early version of Airflow reference container images of Airflow 2.9.3 and constraint files contained FAB provider 1.2.1 version, but this is fixed in updated versions of the images.\u00a0  \n  \nUsers are advised to pull the latest Airflow images or reinstall FAB provider according to the current constraints. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-05T11:23:52.000000Z"}, {"uuid": "a298891c-d6c2-4b93-be59-99e496936fa9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42440", "type": "seen", "source": "https://t.me/cvedetector/3179", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42440 - \"Zoom Privilege Escalation Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-42440 \nPublished : Aug. 14, 2024, 5:15 p.m. | 29\u00a0minutes ago \nDescription : Improper privilege management in the installer for Zoom Workplace Desktop App for macOS, Zoom Meeting SDK for macOS and Zoom Rooms Client for macOS before 6.1.5 may allow a privileged user to conduct an escalation of privilege via local access. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-14T19:54:05.000000Z"}, {"uuid": "6d543d33-a11b-4540-91dc-309c94d10b70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42449", "type": "seen", "source": "Telegram/_R_nt1joyE0ZrLG6uiKqUI7O3OIySf6sQ57Zj3d07P9uaVI", "content": "", "creation_timestamp": "2024-12-05T13:48:15.000000Z"}, {"uuid": "67ccfdc2-00e9-4524-8d24-1f61504272af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42448", "type": "seen", "source": "Telegram/VPxrHOXZV8rU-aynOHccr8sGIev6-2KnLkMoMsppU0QCkA", "content": "", "creation_timestamp": "2024-12-04T06:58:13.000000Z"}, {"uuid": "1e885f0e-9129-41fb-870c-4eda0981ef11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42448", "type": "seen", "source": "Telegram/_R_nt1joyE0ZrLG6uiKqUI7O3OIySf6sQ57Zj3d07P9uaVI", "content": "", "creation_timestamp": "2024-12-05T13:48:15.000000Z"}, {"uuid": "710b8f60-0b71-430f-b3cd-7219097a605e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42448", "type": "published-proof-of-concept", "source": "https://t.me/cybersecs/3343", "content": "Veeam Service Provider Console Vulnerabilities\n(CVE-2024-42448 | CVE-2024-42449) \n\nFrom the VSPC management agent machine, under the condition that the management agent is authorized on the server, it is possible to perform Remote Code Execution (RCE) on the VSPC server machine.\n\nhttps://www.veeam.com/kb4679", "creation_timestamp": "2024-12-06T11:53:56.000000Z"}, {"uuid": "17d2cc4e-7d5c-4b75-bb03-04b9ca43a377", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42449", "type": "published-proof-of-concept", "source": "https://t.me/cybersecs/3343", "content": "Veeam Service Provider Console Vulnerabilities\n(CVE-2024-42448 | CVE-2024-42449) \n\nFrom the VSPC management agent machine, under the condition that the management agent is authorized on the server, it is possible to perform Remote Code Execution (RCE) on the VSPC server machine.\n\nhttps://www.veeam.com/kb4679", "creation_timestamp": "2024-12-06T11:53:56.000000Z"}, {"uuid": "bfd94daa-ec2a-4f81-8666-8a1469d97efd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42449", "type": "exploited", "source": "https://t.me/true_secator/6503", "content": "Veeam \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u0431\u043e\u043b\u044c\u0448\u043e\u0433\u043e \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u0432 Service Provider Console (VSPC).\n\nVSPC \u043e\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u043c\u0430\u044f \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430 BaaS (Backend as a Service) \u0438 DRaaS (Disaster Recovery as a Service) \u0434\u043b\u044f \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433\u0430 \u0440\u0430\u0431\u043e\u0442\u043e\u0441\u043f\u043e\u0441\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0440\u0435\u0437\u0435\u0440\u0432\u043d\u044b\u0445 \u043a\u043e\u043f\u0438\u0439, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0434\u043b\u044f \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u044b\u043c\u0438 Veeam \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u043c\u0438 \u0430\u043a\u0442\u0438\u0432\u0430\u043c\u0438.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a CVE-2024-42448 \u0438 \u0438\u043c\u0435\u0435\u0442 \u043e\u0446\u0435\u043d\u043a\u0443 CVSS 9,9 \u0438\u0437 \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u044b\u0445 10,0. \u041e\u043d\u0430 \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0432 \u0445\u043e\u0434\u0435 \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0435\u0433\u043e \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f.\n\n\u041e\u0448\u0438\u0431\u043a\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0440\u0435\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u0442\u044c RCE \u043d\u0430 \u043c\u0430\u0448\u0438\u043d\u0435 \u0441\u0435\u0440\u0432\u0435\u0440\u0430 VSPC \u0441 \u043c\u0430\u0448\u0438\u043d\u044b \u0430\u0433\u0435\u043d\u0442\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f.\n\nVeeam \u0442\u0430\u043a\u0436\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 (CVE-2024-42449), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043a\u0440\u0430\u0441\u0442\u044c NTLM-\u0445\u044d\u0448 \u0443\u0447\u0435\u0442\u043d\u043e\u0439 \u0437\u0430\u043f\u0438\u0441\u0438 \u0441\u043b\u0443\u0436\u0431\u044b \u0441\u0435\u0440\u0432\u0435\u0440\u0430 VSPC \u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u0434\u043b\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u044f \u0444\u0430\u0439\u043b\u043e\u0432 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435.\n\n\u041e\u0434\u043d\u0430\u043a\u043e, \u043a\u0430\u043a \u043f\u043e\u044f\u0441\u043d\u0438\u043b\u0430 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f, \u043e\u0431\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u0443\u0441\u043f\u0435\u0448\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u044b \u0442\u043e\u043b\u044c\u043a\u043e \u0432 \u0442\u043e\u043c \u0441\u043b\u0443\u0447\u0430\u0435, \u0435\u0441\u043b\u0438 \u0430\u0433\u0435\u043d\u0442 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d \u043d\u0430 \u0446\u0435\u043b\u0435\u0432\u043e\u043c \u0441\u0435\u0440\u0432\u0435\u0440\u0435.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0442 VPSC 8.1.0.21377 \u0438 \u0432\u0441\u0435 \u0431\u043e\u043b\u0435\u0435 \u0440\u0430\u043d\u043d\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0441\u0431\u043e\u0440\u043a\u0438 8 \u0438 7, \u043d\u043e \u043f\u0440\u0438 \u044d\u0442\u043e\u043c \u043d\u044b\u043d\u0435 \u043d\u0435\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430, \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0442\u0430\u043a\u0436\u0435 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0432\u043b\u0438\u044f\u043d\u0438\u044e \u0438 \u0434\u043e\u043b\u0436\u043d\u044b \u0441\u0447\u0438\u0442\u0430\u0442\u044c\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u043c\u0438, \u0434\u0430\u0436\u0435 \u0435\u0441\u043b\u0438 \u043e\u043d\u0438 \u043d\u0435 \u0431\u044b\u043b\u0438 \u043f\u0440\u043e\u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u044b.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u043f\u0440\u0438\u0437\u044b\u0432\u0430\u0435\u0442 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432 \u0443\u0441\u043b\u0443\u0433, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0445 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Veeam Service Provider Console (\u0432\u0435\u0440\u0441\u0438\u0438 7 \u0438 8), \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0434\u043e \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0430\u043a\u0435\u0442\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439, \u0430 \u0432 \u0441\u043b\u0443\u0447\u0430\u0435 \u0441 \u043d\u0435\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u043c\u0438 \u0432\u0435\u0440\u0441\u0438\u044f\u043c\u0438 - \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0434\u043e \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0439 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0439.\n\n\u041d\u0435\u0434\u0430\u0432\u043d\u044f\u044f \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u043d\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 Veeam \u043f\u043e\u043a\u0430\u0437\u0430\u043b\u0430, \u0447\u0442\u043e \u043c\u0435\u0434\u043b\u0438\u0442\u044c \u0432 \u044d\u0442\u043e\u043c \u0432\u043e\u043f\u0440\u043e\u0441\u0435 \u043d\u0435\u043b\u044c\u0437\u044f. Akira, Frag \u0438 Fog \u043d\u0435 \u0434\u0430\u0434\u0443\u0442 \u0441\u043e\u0432\u0440\u0430\u0442\u044c.", "creation_timestamp": "2024-12-04T12:55:12.000000Z"}, {"uuid": "31e6542f-5c56-48d6-9660-de4ff74259d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42448", "type": "exploited", "source": "https://t.me/true_secator/6503", "content": "Veeam \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u0431\u043e\u043b\u044c\u0448\u043e\u0433\u043e \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u0432 Service Provider Console (VSPC).\n\nVSPC \u043e\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u043c\u0430\u044f \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430 BaaS (Backend as a Service) \u0438 DRaaS (Disaster Recovery as a Service) \u0434\u043b\u044f \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433\u0430 \u0440\u0430\u0431\u043e\u0442\u043e\u0441\u043f\u043e\u0441\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0440\u0435\u0437\u0435\u0440\u0432\u043d\u044b\u0445 \u043a\u043e\u043f\u0438\u0439, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0434\u043b\u044f \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u044b\u043c\u0438 Veeam \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u043c\u0438 \u0430\u043a\u0442\u0438\u0432\u0430\u043c\u0438.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a CVE-2024-42448 \u0438 \u0438\u043c\u0435\u0435\u0442 \u043e\u0446\u0435\u043d\u043a\u0443 CVSS 9,9 \u0438\u0437 \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u044b\u0445 10,0. \u041e\u043d\u0430 \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0432 \u0445\u043e\u0434\u0435 \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0435\u0433\u043e \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f.\n\n\u041e\u0448\u0438\u0431\u043a\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0440\u0435\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u0442\u044c RCE \u043d\u0430 \u043c\u0430\u0448\u0438\u043d\u0435 \u0441\u0435\u0440\u0432\u0435\u0440\u0430 VSPC \u0441 \u043c\u0430\u0448\u0438\u043d\u044b \u0430\u0433\u0435\u043d\u0442\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f.\n\nVeeam \u0442\u0430\u043a\u0436\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 (CVE-2024-42449), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043a\u0440\u0430\u0441\u0442\u044c NTLM-\u0445\u044d\u0448 \u0443\u0447\u0435\u0442\u043d\u043e\u0439 \u0437\u0430\u043f\u0438\u0441\u0438 \u0441\u043b\u0443\u0436\u0431\u044b \u0441\u0435\u0440\u0432\u0435\u0440\u0430 VSPC \u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u0434\u043b\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u044f \u0444\u0430\u0439\u043b\u043e\u0432 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435.\n\n\u041e\u0434\u043d\u0430\u043a\u043e, \u043a\u0430\u043a \u043f\u043e\u044f\u0441\u043d\u0438\u043b\u0430 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f, \u043e\u0431\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u0443\u0441\u043f\u0435\u0448\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u044b \u0442\u043e\u043b\u044c\u043a\u043e \u0432 \u0442\u043e\u043c \u0441\u043b\u0443\u0447\u0430\u0435, \u0435\u0441\u043b\u0438 \u0430\u0433\u0435\u043d\u0442 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d \u043d\u0430 \u0446\u0435\u043b\u0435\u0432\u043e\u043c \u0441\u0435\u0440\u0432\u0435\u0440\u0435.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0442 VPSC 8.1.0.21377 \u0438 \u0432\u0441\u0435 \u0431\u043e\u043b\u0435\u0435 \u0440\u0430\u043d\u043d\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0441\u0431\u043e\u0440\u043a\u0438 8 \u0438 7, \u043d\u043e \u043f\u0440\u0438 \u044d\u0442\u043e\u043c \u043d\u044b\u043d\u0435 \u043d\u0435\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430, \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0442\u0430\u043a\u0436\u0435 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0432\u043b\u0438\u044f\u043d\u0438\u044e \u0438 \u0434\u043e\u043b\u0436\u043d\u044b \u0441\u0447\u0438\u0442\u0430\u0442\u044c\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u043c\u0438, \u0434\u0430\u0436\u0435 \u0435\u0441\u043b\u0438 \u043e\u043d\u0438 \u043d\u0435 \u0431\u044b\u043b\u0438 \u043f\u0440\u043e\u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u044b.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u043f\u0440\u0438\u0437\u044b\u0432\u0430\u0435\u0442 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432 \u0443\u0441\u043b\u0443\u0433, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0445 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Veeam Service Provider Console (\u0432\u0435\u0440\u0441\u0438\u0438 7 \u0438 8), \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0434\u043e \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0430\u043a\u0435\u0442\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439, \u0430 \u0432 \u0441\u043b\u0443\u0447\u0430\u0435 \u0441 \u043d\u0435\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u043c\u0438 \u0432\u0435\u0440\u0441\u0438\u044f\u043c\u0438 - \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0434\u043e \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0439 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0439.\n\n\u041d\u0435\u0434\u0430\u0432\u043d\u044f\u044f \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u043d\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 Veeam \u043f\u043e\u043a\u0430\u0437\u0430\u043b\u0430, \u0447\u0442\u043e \u043c\u0435\u0434\u043b\u0438\u0442\u044c \u0432 \u044d\u0442\u043e\u043c \u0432\u043e\u043f\u0440\u043e\u0441\u0435 \u043d\u0435\u043b\u044c\u0437\u044f. Akira, Frag \u0438 Fog \u043d\u0435 \u0434\u0430\u0434\u0443\u0442 \u0441\u043e\u0432\u0440\u0430\u0442\u044c.", "creation_timestamp": "2024-12-04T12:55:12.000000Z"}, {"uuid": "5a8cb4c7-2adf-4f20-8a93-cfa22879048e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42448", "type": "seen", "source": "https://t.me/thehackernews/5983", "content": "\ud83d\udee1\ufe0f Veeam users, take note! A critical flaw in the Service Provider Console (CVE-2024-42448) could allow remote code execution (RCE). \n \nCVSS score: 9.9/10\u2014this is as serious as it gets. \n \n\ud83d\udd17 Don't wait, secure your systems today \u2014 https://thehackernews.com/2024/12/veeam-issues-patch-for-critical-rce.html", "creation_timestamp": "2024-12-04T06:37:00.000000Z"}]}