{"vulnerability": "CVE-2024-1167", "sightings": [{"uuid": "740efdac-a1c2-41ff-b7ce-b2a580a9df74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11677", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113546696559074476", "content": "", "creation_timestamp": "2024-11-26T01:38:11.946944Z"}, {"uuid": "e633344a-06d2-4947-b864-8c1e99cf1280", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11678", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113546696575056565", "content": "", "creation_timestamp": "2024-11-26T01:38:12.142471Z"}, {"uuid": "9e51ab89-0fbc-4e40-86e3-4117f2d64d2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11670", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113544158796765601", "content": "", "creation_timestamp": "2024-11-25T14:52:48.887057Z"}, {"uuid": "c250dda1-1c74-40d5-9b9e-684603c35e11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11671", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113544158812056390", "content": "", "creation_timestamp": "2024-11-25T14:52:49.252005Z"}, {"uuid": "2d0db790-937c-490f-b149-12fc91b375a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11672", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113544158828460718", "content": "", "creation_timestamp": "2024-11-25T14:52:49.416783Z"}, {"uuid": "34dcba5c-b1e9-4bf8-ae02-c9f2bb85dd93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11673", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113546103667045357", "content": "", "creation_timestamp": "2024-11-25T23:07:25.256936Z"}, {"uuid": "cb475e3c-6535-4416-bd67-6740ae222d59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11674", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113546223243794169", "content": "", "creation_timestamp": "2024-11-25T23:37:49.746747Z"}, {"uuid": "1c94b6b4-85c1-4e9d-8e9a-df4cba4d82f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11675", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113546444654490907", "content": "", "creation_timestamp": "2024-11-26T00:34:08.408611Z"}, {"uuid": "4b9fe7b2-a417-4417-a278-73efd0d244d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11676", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113546444669116176", "content": "", "creation_timestamp": "2024-11-26T00:34:08.551496Z"}, {"uuid": "987a40a2-15f7-4ebd-a2a5-0dfefcacf538", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11679", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11488", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-11679\n\ud83d\udd25 CVSS Score: 6.7 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: An input validation weakness was reported in the TpmSetup module for some legacy System x server products that could allow a local attacker with elevated privileges to read the contents of memory.\n\ud83d\udccf Published: 2025-04-11T18:21:06.375Z\n\ud83d\udccf Modified: 2025-04-11T18:46:00.771Z\n\ud83d\udd17 References:\n1. https://support.lenovo.com/us/en/product_security/LEN-193044", "creation_timestamp": "2025-04-11T18:51:20.000000Z"}, {"uuid": "5b63eb45-3d60-45ab-ae08-682eb89f7514", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11679", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmkroro4kq2a", "content": "", "creation_timestamp": "2025-04-11T19:43:15.485982Z"}, {"uuid": "b815d90b-d142-41d4-ade0-64e1ccedd183", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1167", "type": "seen", "source": "https://t.me/ctinow/177752", "content": "https://ift.tt/H9uYrkx\nCVE-2024-1167", "creation_timestamp": "2024-02-01T19:21:40.000000Z"}, {"uuid": "e941e4c0-5dcf-4d2f-955c-70f8c847bc36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11679", "type": "seen", "source": "https://t.me/cvedetector/22782", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11679 - IBM System x Server Memory Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-11679 \nPublished : April 11, 2025, 7:15 p.m. | 49\u00a0minutes ago \nDescription : An input validation weakness was reported in the TpmSetup module for some legacy System x server products that could allow a local attacker with elevated privileges to read the contents of memory. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-11T22:18:49.000000Z"}, {"uuid": "7a7bfde5-ca27-44cb-9978-af67c9bf148a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1167", "type": "seen", "source": "https://t.me/ctinow/192539", "content": "https://ift.tt/KO5NHE2\nCVE-2024-1167 | SEW-EURODRIVE MOVITOOLS MotionStudio 6.5.0.2 xml external entity reference (icsa-24-016-01)", "creation_timestamp": "2024-02-24T11:16:55.000000Z"}]}