{"vulnerability": "CVE-2024-8422", "sightings": [{"uuid": "ec89cc71-9f12-40b6-992f-de2541f6daff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8422", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-24-1415/", "content": "", "creation_timestamp": "2024-10-17T05:00:00.000000Z"}, {"uuid": "f2d39ff5-4ae7-40f8-bdfe-93488a36be25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8422", "type": "seen", "source": "https://t.me/cvedetector/7356", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8422 - Zelio Soft 2 Use After Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-8422 \nPublished : Oct. 8, 2024, 10:15 a.m. | 35\u00a0minutes ago \nDescription : CWE-416: Use After Free vulnerability exists that could cause arbitrary code execution, denial  \nof service and loss of confidentiality &amp; integrity when application user opens a malicious Zelio  \nSoft 2 project file. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-08T12:52:41.000000Z"}]}