{"vulnerability": "CVE-2023-2497", "sightings": [{"uuid": "4c7467e8-a8cf-4fad-81ec-f3bdf841911a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24971", "type": "seen", "source": "https://t.me/cibsecurity/67430", "content": "\u203c CVE-2023-24971 \u203c\n\nIBM B2B Advanced Communications 1.0.0.0 and IBM Multi-Enterprise Integration Gateway 1.0.0.1 could allow a user to cause a denial of service due to the deserializing of untrusted serialized Java objects. IBM X-Force ID: 246976.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-31T07:37:29.000000Z"}, {"uuid": "883148bf-8da6-499a-be08-e7d4c95995f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24977", "type": "published-proof-of-concept", "source": "https://t.me/cibsecurity/57266", "content": "\u203c CVE-2023-24977 \u203c\n\nOut-of-bounds Read vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.1.0 through 1.5.0. Users are advised to upgrade to Apache InLong's latest version or cherry-pick https://github.com/apache/inlong/pull/7214 https://github.com/apache/inlong/pull/7214 to solve it.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-01T12:14:09.000000Z"}, {"uuid": "90b679fd-2b2b-402a-b639-bba7c3b1acba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24979", "type": "seen", "source": "https://t.me/cibsecurity/58083", "content": "\u203c CVE-2023-24979 \u203c\n\nA vulnerability has been identified in Tecnomatix Plant Simulation (All versions &lt; V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19789)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-14T14:35:55.000000Z"}]}