{"vulnerability": "CVE-2024-12799", "sightings": [{"uuid": "741ed445-1100-4ce2-9007-cdcf7a8b65bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12799", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ljttc42iuk2i", "content": "", "creation_timestamp": "2025-03-08T05:50:17.244617Z"}, {"uuid": "c99b231f-d2c8-475e-bfd8-8005e8991484", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12799", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3ljz3plydbk2l", "content": "", "creation_timestamp": "2025-03-10T08:04:20.542593Z"}, {"uuid": "d1f7bac0-3556-4fc5-aa9f-40670add1fd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-12799", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3ljytihhk3k2g", "content": "", "creation_timestamp": "2025-03-10T05:37:07.669875Z"}, {"uuid": "36087662-ed3f-4864-9cde-4636cecfc363", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12799", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljndxytswc2y", "content": "", "creation_timestamp": "2025-03-05T16:00:13.386323Z"}, {"uuid": "66dc953f-55bd-4522-8a75-8432701cfbc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12799", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6554", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12799\n\ud83d\udd25 CVSS Score: 10 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:P/AU:Y/R:U/V:C/RE:H/U:Red)\n\ud83d\udd39 Description: Insufficiently Protected Credentials\nvulnerability in OpenText Identity Manager Advanced Edition on Windows, Linux,\n64 bit allows Privilege Abuse. This vulnerability could allow an\nauthenticated user to obtain higher privileged user\u2019s sensitive information via\ncrafted payload.\n\nThis issue affects Identity Manager Advanced\nEdition: from 4.8.0.0 through 4.8.7.0102, 4.9.0.0.\n\ud83d\udccf Published: 2025-03-05T14:55:55.363Z\n\ud83d\udccf Modified: 2025-03-05T14:55:55.363Z\n\ud83d\udd17 References:\n1. https://portal.microfocus.com/s/article/KM000037455", "creation_timestamp": "2025-03-05T15:33:03.000000Z"}, {"uuid": "5bdb1055-f12b-4f35-9393-862f7af4a84c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12799", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3ljz7dmeooc2w", "content": "", "creation_timestamp": "2025-03-10T09:09:09.698961Z"}, {"uuid": "774f77a2-af0c-431c-9fd2-ae53d5613d8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12799", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lmidtvqplc2m", "content": "", "creation_timestamp": "2025-04-10T20:30:10.917270Z"}, {"uuid": "1b537108-f8d8-400f-a4b3-4eecaea86725", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12799", "type": "seen", "source": "https://t.me/cvedetector/19647", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12799 - OpenText Identity Manager Advanced Edition: Credential Exposure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-12799 \nPublished : March 5, 2025, 3:15 p.m. | 2\u00a0hours, 3\u00a0minutes ago \nDescription : Insufficiently Protected Credentials  \nvulnerability in OpenText Identity Manager Advanced Edition on Windows, Linux,  \n64 bit allows Privilege Abuse. This vulnerability could allow an  \nauthenticated user to obtain higher privileged user\u2019s sensitive information via  \ncrafted payload.  \n  \nThis issue affects Identity Manager Advanced  \nEdition: from 4.8.0.0 through 4.8.7.0102, 4.9.0.0. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-05T18:37:11.000000Z"}, {"uuid": "5589e23e-2cd0-4d3d-bc64-a96e52bd55dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12799", "type": "seen", "source": "https://t.me/CyberBulletin/2552", "content": "\u26a1CVE-2024-12799 (CVSS 10): OpenText Identity Manager Vulnerability Exposes Sensitive Information.\n\n#CyberBulletin", "creation_timestamp": "2025-03-10T14:44:35.000000Z"}]}