{"vulnerability": "CVE-2024-49576", "sightings": [{"uuid": "6754ae32-a5db-4e58-878e-41fb9a61c9a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49576", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113674653393885665", "content": "", "creation_timestamp": "2024-12-18T15:59:18.318197Z"}, {"uuid": "1a287e79-694b-4e5d-9c42-0f04904fcf3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49576", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3ldq37hqcsv2b", "content": "", "creation_timestamp": "2024-12-20T09:30:08.584263Z"}, {"uuid": "86a14f41-c98b-4318-a1c9-5e47954ac604", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-49576", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3ldpon4kwqk24", "content": "", "creation_timestamp": "2024-12-20T05:45:07.635661Z"}, {"uuid": "1e2d026d-99a9-4c7b-86df-7a2205ddfa87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49576", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3ldpw7sx65222", "content": "", "creation_timestamp": "2024-12-20T08:00:56.684482Z"}, {"uuid": "d84ed1d0-7d6d-427c-ad2f-ae8427669cd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49576", "type": "seen", "source": "https://t.me/CyberBulletin/1792", "content": "\u26a1\ufe0fCVE-2024-49576 and CVE-2024-47810: Foxit Addresses Remote Code Execution Flaws.\n\n#CyberBulletin", "creation_timestamp": "2024-12-20T16:20:05.000000Z"}, {"uuid": "dfe71ef8-e571-453f-9e0a-f4332e524e55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49576", "type": "seen", "source": "https://t.me/cvedetector/13206", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49576 - Foxit Reader Use-after-Free Vulnerability (Arbitrary Code Execution)\", \n  \"Content\": \"CVE ID : CVE-2024-49576 \nPublished : Dec. 18, 2024, 4:15 p.m. | 36\u00a0minutes ago \nDescription : A use-after-free vulnerability exists in the way Foxit Reader 2024.3.0.26795 handles a checkbox CBF_Widget object. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-18T17:52:37.000000Z"}, {"uuid": "fea31d86-7472-4eb2-88a2-4af8db8d97b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49576", "type": "seen", "source": "https://t.me/CyberBulletin/26868", "content": "\u26a1\ufe0fCVE-2024-49576 and CVE-2024-47810: Foxit Addresses Remote Code Execution Flaws.\n\n#CyberBulletin", "creation_timestamp": "2024-12-20T16:20:05.000000Z"}]}