{"vulnerability": "CVE-2024-46464", "sightings": [{"uuid": "d20ba6d1-57d2-4107-8a9f-f2f7d864a8f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46464", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113800627825028525", "content": "", "creation_timestamp": "2025-01-09T21:56:15.524375Z"}, {"uuid": "33c569b1-be4c-4a1e-a0a1-156672e321de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46464", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfdpcujv2x2e", "content": "", "creation_timestamp": "2025-01-09T22:15:43.743029Z"}, {"uuid": "caf940a0-3d07-4786-8ae5-6b1ede834e9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46464", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfdqvd3nxf2e", "content": "", "creation_timestamp": "2025-01-09T22:43:58.000247Z"}, {"uuid": "ca309ba5-281d-4f13-a3f0-78d7a23bae47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46464", "type": "seen", "source": "MISP/3445a876-cced-4346-bf37-e276ba39cff4", "content": "", "creation_timestamp": "2025-09-02T18:30:14.000000Z"}, {"uuid": "05a6c2bc-a463-4de6-8575-3405b049ee65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46464", "type": "seen", "source": "https://t.me/cvedetector/14943", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46464 - PRIMX ZED Enterprise Local File Manipulation Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-46464 \nPublished : Jan. 9, 2025, 10:15 p.m. | 19\u00a0minutes ago \nDescription : In PRIMX ZED Enterprise up to 2024.3, technical files stored in local folders with common user access can be manipulated to render the host computer unavailable or to execute programs with an elevation of privilege. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T23:38:27.000000Z"}, {"uuid": "5d1e69e0-51cb-4f80-938a-4e3aa0a72e0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46464", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1097", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-46464\n\ud83d\udd39 Description: In PRIMX ZED Enterprise up to 2024.3, technical files stored in local folders with common user access can be manipulated to render the host computer unavailable or to execute programs with an elevation of privilege.\n\ud83d\udccf Published: 2025-01-09T00:00:00\n\ud83d\udccf Modified: 2025-01-09T21:51:41.329479\n\ud83d\udd17 References:\n1. https://www.primx.eu/en/bulletins/security-bulletin-24931935/", "creation_timestamp": "2025-01-09T22:15:39.000000Z"}]}