CVE-2024-4947

Google Chrome

15 May 2024
Published
15 May 2024
Updated

CVSS
Pending
EPSS
0.04%

  • 9 Posts
  • 30 Interactions

CVE Info

Type Confusion in V8 in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

Fediverse

Profile picture

Google fixes third actively exploited zero-day in a week

Geez, has pushed a fix for yet another zero-day exploited in the wild. Separate from the other two (tracked as CVE-2024-4947), it’s a type confusion weakness in the V8 JavaScript engine.

It affects all based browsers. Forks (Vivaldi, Brave, Edge) should be rolling out updates. Again… so, as usual, update ASAP.

bleepingcomputer.com/news/goog

  • 3
  • 1
  • 5 hours ago
Profile picture

Un altro 0day critico su Google Chrome. Scoperto da Kaspersky Lab

Google ha rilasciato aggiornamenti per correggere nove vulnerabilità nel browser Chrome inclusa una nuova vulnerabilità zero-day sfruttata attivamente dagli aggressori. La vulnerabilità è identificata come CVE-2024-4947 ed è associata a un errore di Type Confusion nel motore JavaScript V8 e WebAssembly. L’errore è stato scoperto dai ricercatori di Kaspersky Lab – Vasily Berdnikov e Boris Larin il 13 maggio 2024. Le vulnerabilità di Type Confusion […]

L'articolo Un altro 0day critico su Google Chrome. Scoperto da Kaspersky Lab proviene da il blog della sicurezza informatica.

redhotcyber.com/post/un-altro-
redhotcyber.com/feed

poliverso.org/display/0477a01e

  • 0
  • 0
  • 7 hours ago
Profile picture

Patch Tuesday, followed by Exploit Wednesday.

  • 5
  • 10
  • 23 hours ago
Profile picture

Google Chrome Zero-day Vulnerability (CVE-2024-4947)

Date: May 16, 2024

CVE: CVE-2024-4947

Vulnerability Type: Type Confusion

CWE: [[CWE-843]]

Sources: Cybersecurity News Chrome release Blog

Issue Summary

Google has released an emergency update for Chrome to address a high-severity zero-day vulnerability, CVE-2024-4947. Discovered by Kaspersky researchers, this flaw is being actively exploited in the wild and affects the V8 JavaScript engine. The vulnerability allows attackers to perform remote code execution by exploiting a type confusion bug.

Technical Key Findings

CVE-2024-4947 is a type confusion bug in the V8 JavaScript engine, leading to heap corruption. Attackers can craft malicious HTML pages to exploit this flaw, enabling arbitrary code execution on the victim’s system.

Vulnerable Products

  • Google Chrome versions before 125.0.6422.60 on Linux
  • Google Chrome versions before 125.0.6422.60/.61 on Windows and Mac

Impact Assessment

If exploited, this vulnerability can lead to remote code execution, allowing attackers to gain control of the affected system. This poses significant security risks, including potential data breaches and system compromise.

Patches or Workaround

Google has released patches for this vulnerability. Users are advised to update to Chrome version 125.0.6422.60 or later on Linux and 125.0.6422.60/.61 or later on Windows and Mac.

Tags

-2024-4947

  • 1
  • 1
  • 14 hours ago
Profile picture

Microsoft: Release notes for Microsoft Edge Security Updates
Microsoft doesn't mention the CVE by name, but they're talking about CVE-2024-4947:

May 15, 2024 Microsoft is aware of the recent exploits existing in the wild. We are actively working on releasing a security fix.

cc: @ligniform

  • 0
  • 2
  • 23 hours ago
Profile picture

@ligniform I agree in part, disagree in part. The exploited vulnerabilities in V8 JavaScript engine have only been documented in Chromium based browsers like Edge, Opera, Vivaldi, Brave, etc.

LibwebP was a rare case last year that Google incorrectly limited the vulnerability's scope to only identify Google Chrome when in reality it impacted plenty of downstream libraries and apps.

Expect to see a Microsoft Security Response Center (MSRC) security advisory probably tomorrow for CVE-2024-4947.

  • 0
  • 1
  • 23 hours ago
Profile picture

chromereleases.googleblog.com/

Google is aware that an exploit for CVE-2024-4947 exists in the wild.

What is this, 3 Chrome 0-days in like 2 weeks?

  • 0
  • 0
  • 14 hours ago
Profile picture

One more reason to not use Chrome!

Google fixes third actively exploited Chrome zero-day in a week

Google has released a new emergency Chrome security update to address the third zero-day vulnerability exploited in attacks within a week.

"Google is aware that an exploit for CVE-2024-4947 exists in the wild," the search giant said in a security advisory published on Wednesday.

The high-severity zero-day vulnerability (CVE-2024-4947) is caused by a type confusion weakness in the Chrome V8 JavaScript engine reported by Kaspersky's Vasily Berdnikov and Boris Larin.

Although such flaws generally enable threat actors to trigger browser crashes by reading or writing memory out of buffer bounds, they can also exploit them for arbitrary code execution on targeted devices.

The other two actively exploited Chrome zero-days patched this week are CVE-2024-4671 (a use-after-free flaw in the Visuals component) and CVE-2024-4761 (an out-of-bounds write bug in the V8 JavaScript engine)

bleepingcomputer.com/news/goog

  • 1
  • 5
  • 4 hours ago

CVE-2024-32002

git

14 May 2024
Published
14 May 2024
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.04%

  • 1 Post
  • 35 Interactions

CVE Info

Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, repositories with submodules can be crafted in a way that exploits a bug in Git whereby it can be fooled into writing files not into the submodule's worktree but into a `.git/` directory. This allows writing a hook that will be executed while the clone operation is still running, giving the user no opportunity to inspect the code that is being executed. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. If symbolic link support is disabled in Git (e.g. via `git config --global core.symlinks false`), the described attack won't work. As always, it is best to avoid cloning repositories from untrusted sources.

Fediverse

CVE-2024-30051

KEV
Microsoft Windows 10 Version 1809

14 May 2024
Published
15 May 2024
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.14%

  • 1 Post
  • 4 Interactions

CVE Info

Windows DWM Core Library Elevation of Privilege Vulnerability

Fediverse

Profile picture

We managed to find this 0-day twice! First as a description of a vulnerability, then as a real exploit used by attackers. securelist.com/cve-2024-30051/

  • 1
  • 3
  • 4 hours ago

CVE-2024-3661

IETF DHCP

06 May 2024
Published
08 May 2024
Updated

CVSS v3.1
HIGH (7.6)
EPSS
0.05%

  • 1 Post
  • 2 Interactions

CVE Info

DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.

Fediverse

Profile picture

Palo Alto Networks security advisory: CVE-2024-3661 Impact of TunnelVision Vulnerability
Palo Alto Networks evaluated the TunnelVision vulnerability and determined that GlobalProtect app on Linux is affected (Palo Alto Networks plans to release a patch in an upcoming major release). For All versions of GlobalProtect app on Windows and macOS without Endpoint Traffic Policy Enforcement set to All Traffic are affected (Endpoint Traffic Policy Enforcement is disabled by default). All versions of GlobalProtect app on iOS without IncludeAllNetworks set to 1 are affected.

Interestingly, Palo Alto Networks uses CVSSv4.0 for CVE-2024-3661 and rates it 2.1 low severity.

  • 1
  • 1
  • 6 hours ago

CVE-2021-44228

KEV
Apache Software Foundation Log4j2

10 Dec 2021
Published
03 Apr 2023
Updated

CVSS
Pending
EPSS
97.56%

  • 1 Post

CVE Info

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.

Fediverse

Profile picture

Uptycs: New Threat Detected: Inside Our Discovery of the Log4j Campaign and Its XMRig Malware
Unknown financially-motivated threat actors have been exploiting Log4Shell CVE-2021-44228 (10.0 critical, disclosed 10 December 2021 by Apache as an exploited zero-day in Log4j 2) to deploy XMRig cryptominers since January 2024. Affected countries include China (top), followed by Hong Kong, Netherlands, Japan, United States, Germany, South Africa, and Sweden. Four distinct sets of servers establish communication with compromised IP and send shell scripts for XMRig deployment, or disseminating Mirai or Gafgyt malware. IOC provided.

  • 0
  • 0
  • 8 hours ago

CVE-2024-3400

KEV
Palo Alto Networks PAN-OS

12 Apr 2024
Published
19 Apr 2024
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
95.36%

  • 1 Post

CVE Info

A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.

Fediverse

Profile picture

Resumen de las últimas 24 horas en seguridad informática: Detectada explotación del CVE-2024-3400 en GlobalProtect de Palo Alto Networks y campaña de malvertising con ransomware. Además, Chrome 125 llega con mejoras, ataque de phishing a cuentas comerciales de Meta y FBI interviene BreachForums. Binario Go malicioso en PyPI alerta sobre amenazas. Descubre estos eventos y más en el listado de noticias sobre seguridad informática:

🗞️ ÚLTIMAS NOTICIAS EN SEGURIDAD INFORMÁTICA 🔒
====| 🔥 LO QUE DEBES SABER HOY 16/05/24 📆 |====

🔒 DETECTANDO LA COMPROMISIÓN DEL CVE-2024-3400 EN DISPOSITIVOS GLOBALPROTECT DE PALO ALTO NETWORKS

Volexity alerta sobre la explotación de día cero del CVE-2024-3400 en la función GlobalProtect de Palo Alto Networks PAN-OS. ¿Tu seguridad está en riesgo? Descúbrelo aquí ➡️ djar.co/5ENtS

🔒 NUEVA CAMPAÑA DE MALVERTISING CONDUCE A RANSOMWARE A TRAVÉS DE INSTALADORES TROJANIZADOS DE WINSCP Y PUTTY

¡Cuidado! Una peligrosa campaña de malvertising busca infectar a usuarios que descargan WinSCP y PuTTY. Protege tus datos ahora ➡️ djar.co/72HM

🔒 CANAL ESTABLE ACTUALIZADO PARA ESCRITORIO

¡Gran noticia! Chrome 125 llega al canal estable para Windows, Mac y Linux. Descubre las últimas novedades y mejoras aquí ➡️ djar.co/CGMQ5g

🔒 ATAQUE A LA CIBERSEGURIDAD QUE APUNTA A CUENTAS COMERCIALES DE META

Evita ser víctima de un sofisticado ataque de phishing dirigido a cuentas comerciales de Meta. ¡Protege tu información empresarial hoy mismo! ➡️ djar.co/B9C4q

🔒 FBI CONFISCA FORO DE HACKING BREACHFORUMS UTILIZADO PARA FILTRAR DATOS ROBADOS

El FBI toma acciones contra BreachForums, el foro utilizado para el comercio de datos corporativos robados. ¿Conoces la historia detrás de esta operación? Descúbrela aquí ➡️ djar.co/Bs2n

🔒 BINARIO GO MALICIOSO ENTREGADO A TRAVÉS DE ESTEGANOGRAFÍA EN PYPI

Phylum identifica un binario Go malicioso en PyPI oculto en una publicación sospechosa. ¡Mantente informado sobre las últimas amenazas informáticas! ➡️ djar.co/J9woRI

  • 0
  • 0
  • 10 hours ago

CVE-2024-4761

KEV
Google Chrome

14 May 2024
Published
14 May 2024
Updated

CVSS
Pending
EPSS
0.04%

  • 2 Posts
  • 9 Interactions

CVE Info

Out of bounds write in V8 in Google Chrome prior to 124.0.6367.207 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)

Fediverse

Profile picture

Hot off the press! CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog

  • CVE-2024-4761 (pending score) Google Chromium V8 Out-of-Bounds Memory Write Vulnerability
  • CVE-2021-40655 (7.5 high) D-Link DIR-605 Router Information Disclosure Vulnerability
  • CVE-2014-100005 (CVSS*v2* 6.8 medium) D-Link DIR-600 Router Cross-Site Request Forgery (CSRF) Vulnerability

Link is future-proofed so it should work when it becomes available

cc: @hrbrmstr @campuscodi

  • 2
  • 1
  • 8 hours ago
Profile picture

One more reason to not use Chrome!

Google fixes third actively exploited Chrome zero-day in a week

Google has released a new emergency Chrome security update to address the third zero-day vulnerability exploited in attacks within a week.

"Google is aware that an exploit for CVE-2024-4947 exists in the wild," the search giant said in a security advisory published on Wednesday.

The high-severity zero-day vulnerability (CVE-2024-4947) is caused by a type confusion weakness in the Chrome V8 JavaScript engine reported by Kaspersky's Vasily Berdnikov and Boris Larin.

Although such flaws generally enable threat actors to trigger browser crashes by reading or writing memory out of buffer bounds, they can also exploit them for arbitrary code execution on targeted devices.

The other two actively exploited Chrome zero-days patched this week are CVE-2024-4671 (a use-after-free flaw in the Visuals component) and CVE-2024-4761 (an out-of-bounds write bug in the V8 JavaScript engine)

bleepingcomputer.com/news/goog

  • 1
  • 5
  • 4 hours ago

CVE-2023-36033

KEV
Microsoft Windows 10 Version 1809

14 Nov 2023
Published
09 Jan 2024
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.04%

  • 1 Post
  • 3 Interactions

CVE Info

Windows DWM Core Library Elevation of Privilege Vulnerability

Fediverse

Profile picture

Foxit PDF Reader Users Targeted by Malicious PDF Exploit

Date: May 15, 2024
CVE: CVE-2023-36033
Vulnerability Type: Remote Code Execution (RCE)
CWE: [[CWE-20]], [[CWE-78]], [[CWE-94]]
Sources: GBHackers, Checkpoint Research

Issue Summary

Researchers have identified a critical vulnerability in Foxit PDF Reader that allows attackers to execute malicious code on users' systems by exploiting a design flaw in the application's security warnings. The flaw makes it easy for attackers to trick users into approving malicious actions, leading to unauthorized access and data theft.

Technical Key Findings

The vulnerability stems from Foxit Reader's handling of security warnings, which default to an "OK" option. This flaw enables attackers to craft malicious PDFs that, when opened, prompt the user to approve actions unknowingly. Once approved, these actions can download and execute malicious code from a remote server, bypassing standard security detections.

Vulnerable Products

  • Foxit Reader

Impact Assessment

Exploitation of this vulnerability can lead to severe consequences, including unauthorized access to sensitive data, remote control of the affected device, and the ability to deploy various malware such as VenomRAT, Agent-Tesla, and others. This can result in data breaches, espionage, and further propagation of malware.

Patches or Workarounds

Foxit has acknowledged the issue and that it would be resolved in version 2024 3.

Tags

-36033

  • 2
  • 1
  • 14 hours ago

CVE-2024-27804

Apple iOS and iPadOS

13 May 2024
Published
13 May 2024
Updated

CVSS
Pending
EPSS
0.04%

  • 1 Post

CVE Info

The issue was addressed with improved memory handling. This issue is fixed in iOS 17.5 and iPadOS 17.5, tvOS 17.5, watchOS 10.5, macOS Sonoma 14.5. An app may be able to execute arbitrary code with kernel privileges.

Fediverse

Profile picture

Apple walks back CVE-2024-27804, claims it’s non-exploitable & offers security researcher paltry $1,000 bounty idownloadblog.com/2024/05/15/a

  • 0
  • 0
  • 22 hours ago

CVE-2024-35300

JetBrains TeamCity

16 May 2024
Published
16 May 2024
Updated

CVSS v3.1
LOW (3.5)
EPSS
Pending

  • 1 Post
  • 7 Interactions

CVE Info

In JetBrains TeamCity between 2024.03 and 2024.03.1 several stored XSS in the available updates page were possible

Fediverse

Profile picture

Ya boy @screaminggoat staying on top of JetBrains--and their lack of security advisories. On 03 May 2024, JetBrains announced a new TeamCity version (see parent toot above). Today, those unidentified security fixes were assigned CVEs:

  • CVE-2024-35300 (CVSSv3: 3.5 low) In JetBrains TeamCity between 2024.03 and 2024.03.1 several stored XSS in the available updates page were possible
  • CVE-2024-35301 (5.5 medium) In JetBrains TeamCity before 2024.03.1 commit status publisher didn't check project scope of the GitHub App token
  • CVE-2024-35302 (5.4 medium) In JetBrains TeamCity before 2023.11 stored XSS during restore from backup was possible

cc: @campuscodi

  • 3
  • 4
  • 4 hours ago

CVE-2021-40655

KEV
Pending

24 Sept 2021
Published
24 Sept 2021
Updated

CVSS
Pending
EPSS
Pending

  • 1 Post
  • 3 Interactions

CVE Info

An informtion disclosure issue exists in D-LINK-DIR-605 B2 Firmware Version : 2.01MT. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page

Fediverse

Profile picture

Hot off the press! CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog

  • CVE-2024-4761 (pending score) Google Chromium V8 Out-of-Bounds Memory Write Vulnerability
  • CVE-2021-40655 (7.5 high) D-Link DIR-605 Router Information Disclosure Vulnerability
  • CVE-2014-100005 (CVSS*v2* 6.8 medium) D-Link DIR-600 Router Cross-Site Request Forgery (CSRF) Vulnerability

Link is future-proofed so it should work when it becomes available

cc: @hrbrmstr @campuscodi

  • 2
  • 1
  • 8 hours ago

CVE-2014-100005

KEV
Pending

13 Jan 2015
Published
07 Sept 2017
Updated

CVSS
Pending
EPSS
Pending

  • 1 Post
  • 3 Interactions

CVE Info

Multiple cross-site request forgery (CSRF) vulnerabilities in D-Link DIR-600 router (rev. Bx) with firmware before 2.17b02 allow remote attackers to hijack the authentication of administrators for requests that (1) create an administrator account or (2) enable remote management via a crafted configuration module to hedwig.cgi, (3) activate new configuration settings via a SETCFG,SAVE,ACTIVATE action to pigwidgeon.cgi, or (4) send a ping via a ping action to diagnostic.php.

Fediverse

Profile picture

Hot off the press! CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog

  • CVE-2024-4761 (pending score) Google Chromium V8 Out-of-Bounds Memory Write Vulnerability
  • CVE-2021-40655 (7.5 high) D-Link DIR-605 Router Information Disclosure Vulnerability
  • CVE-2014-100005 (CVSS*v2* 6.8 medium) D-Link DIR-600 Router Cross-Site Request Forgery (CSRF) Vulnerability

Link is future-proofed so it should work when it becomes available

cc: @hrbrmstr @campuscodi

  • 2
  • 1
  • 8 hours ago

CVE-2024-4671

KEV
Google Chrome

09 May 2024
Published
13 May 2024
Updated

CVSS
Pending
EPSS
1.97%

  • 1 Post
  • 6 Interactions

CVE Info

Use after free in Visuals in Google Chrome prior to 124.0.6367.201 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

Fediverse

Profile picture

One more reason to not use Chrome!

Google fixes third actively exploited Chrome zero-day in a week

Google has released a new emergency Chrome security update to address the third zero-day vulnerability exploited in attacks within a week.

"Google is aware that an exploit for CVE-2024-4947 exists in the wild," the search giant said in a security advisory published on Wednesday.

The high-severity zero-day vulnerability (CVE-2024-4947) is caused by a type confusion weakness in the Chrome V8 JavaScript engine reported by Kaspersky's Vasily Berdnikov and Boris Larin.

Although such flaws generally enable threat actors to trigger browser crashes by reading or writing memory out of buffer bounds, they can also exploit them for arbitrary code execution on targeted devices.

The other two actively exploited Chrome zero-days patched this week are CVE-2024-4671 (a use-after-free flaw in the Visuals component) and CVE-2024-4761 (an out-of-bounds write bug in the V8 JavaScript engine)

bleepingcomputer.com/news/goog

  • 1
  • 5
  • 4 hours ago

CVE-2024-22269

N/A VMware Workstation

14 May 2024
Published
14 May 2024
Updated

CVSS v3.1
HIGH (7.1)
EPSS
0.04%

  • 1 Post
  • 2 Interactions

CVE Info

VMware Workstation and Fusion contain an information disclosure vulnerability in the vbluetooth device. A malicious actor with local administrative privileges on a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine.

Fediverse

Profile picture

Update your and ASAP: Multiple vulnerabilities in the bluetooth support allow malicious VM guests to gain code execution on the host system and/or read the hypervisor memory. support.broadcom.com/web/ecx/s

  • 0
  • 2
  • 13 hours ago

CVE-2024-22268

N/A VMware Workstation

14 May 2024
Published
14 May 2024
Updated

CVSS v3.1
HIGH (7.1)
EPSS
0.04%

  • 1 Post
  • 2 Interactions

CVE Info

VMware Workstation and Fusion contain a heap buffer-overflow vulnerability in the Shader functionality. A malicious actor with non-administrative access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to create a denial of service condition.

Fediverse

Profile picture

Update your and ASAP: Multiple vulnerabilities in the bluetooth support allow malicious VM guests to gain code execution on the host system and/or read the hypervisor memory. support.broadcom.com/web/ecx/s

  • 0
  • 2
  • 13 hours ago

CVE-2024-22267

NA VMware Workstation

14 May 2024
Published
14 May 2024
Updated

CVSS v3.1
CRITICAL (9.3)
EPSS
0.04%

  • 1 Post
  • 2 Interactions

CVE Info

VMware Workstation and Fusion contain a use-after-free vulnerability in the vbluetooth device. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.

Fediverse

Profile picture

Update your and ASAP: Multiple vulnerabilities in the bluetooth support allow malicious VM guests to gain code execution on the host system and/or read the hypervisor memory. support.broadcom.com/web/ecx/s

  • 0
  • 2
  • 13 hours ago

CVE-2024-22270

N/A VMware Workstation

14 May 2024
Published
14 May 2024
Updated

CVSS v3.1
HIGH (7.1)
EPSS
0.04%

  • 1 Post
  • 2 Interactions

CVE Info

VMware Workstation and Fusion contain an information disclosure vulnerability in the Host Guest File Sharing (HGFS) functionality. A malicious actor with local administrative privileges on a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine.

Fediverse

Profile picture

Update your and ASAP: Multiple vulnerabilities in the bluetooth support allow malicious VM guests to gain code execution on the host system and/or read the hypervisor memory. support.broadcom.com/web/ecx/s

  • 0
  • 2
  • 13 hours ago