{"vulnerability": "CVE-2024-2231", "sightings": [{"uuid": "580d6ab5-0d61-49ef-85e5-7d930cbf58c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22315", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgrvbu5z2m2e", "content": "", "creation_timestamp": "2025-01-28T07:05:04.805620Z"}, {"uuid": "93b580d4-c02b-4dcc-a258-1bd022e85c56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22316", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113901204918639470", "content": "", "creation_timestamp": "2025-01-27T16:14:20.383000Z"}, {"uuid": "b295f960-bc96-410d-9f15-9eaa8f3621ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22316", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgqdmic72f2b", "content": "", "creation_timestamp": "2025-01-27T16:16:09.592398Z"}, {"uuid": "19a5e6da-3203-4780-ab8b-51edf0d73392", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22315", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgrf57tqd72c", "content": "", "creation_timestamp": "2025-01-28T02:16:04.840712Z"}, {"uuid": "b66bbd59-c245-42cb-b822-ed2ebf830f08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22315", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113903503145067369", "content": "", "creation_timestamp": "2025-01-28T01:58:48.542432Z"}, {"uuid": "288f5ee6-18e0-4f6c-8337-1a478e8e59a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22315", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3212", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-22315\n\ud83d\udd25 CVSS Score: 4.0 (CVSS_V3)\n\ud83d\udd39 Description: IBM Fusion and IBM Fusion HCI 2.3.0 through 2.8.2 is vulnerable to insecure network connection by allowing an attacker who gains access to a Fusion container to establish an external network connection.\n\ud83d\udccf Published: 2025-01-28T03:31:14Z\n\ud83d\udccf Modified: 2025-01-28T03:31:14Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-22315\n2. https://www.ibm.com/support/pages/node/7179168", "creation_timestamp": "2025-01-28T04:09:11.000000Z"}, {"uuid": "a4cc89ba-0860-470c-8927-c904892b8a02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22319", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-26)", "content": "", "creation_timestamp": "2025-06-26T00:00:00.000000Z"}, {"uuid": "e136a78e-ba9b-4d6c-8420-beac161741ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22319", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-24)", "content": "", "creation_timestamp": "2025-07-24T00:00:00.000000Z"}, {"uuid": "e3c0237e-3db7-44d9-85a3-190a1b7e0fc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22319", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-27)", "content": "", "creation_timestamp": "2025-07-27T00:00:00.000000Z"}, {"uuid": "2908328b-3bfb-458e-a7de-2158dd5c9088", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22315", "type": "seen", "source": "MISP/d0bda5d9-8cbc-4c6c-8803-a5e3150f9ec2", "content": "", "creation_timestamp": "2025-09-01T19:03:02.000000Z"}, {"uuid": "30d4c513-e101-4ad3-ae7e-4e0862106712", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22312", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17929", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-22312\n\ud83d\udd25 CVSS Score: 4.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: IBM Storage Defender - Resiliency Service 2.0 stores user credentials in plain clear text which can be read by a local user.  IBM X-Force ID:  278748.\n\ud83d\udccf Published: 2024-02-10T15:41:46.345Z\n\ud83d\udccf Modified: 2025-06-10T16:17:34.356Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7115261\n2. https://exchange.xforce.ibmcloud.com/vulnerabilities/278748", "creation_timestamp": "2025-06-10T16:31:57.000000Z"}, {"uuid": "3d64ec65-28c1-48b0-8f07-3ee19299e7d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22315", "type": "seen", "source": "https://t.me/cvedetector/16561", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-22315 - IBM Fusion Remote Network Connection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-22315 \nPublished : Jan. 28, 2025, 2:15 a.m. | 53\u00a0minutes ago \nDescription : IBM Fusion and IBM Fusion HCI 2.3.0 through 2.8.2 is vulnerable to insecure network connection by allowing an attacker who gains access to a Fusion container to establish an external network connection. \nSeverity: 4.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T04:34:36.000000Z"}, {"uuid": "b78bc9f9-f4bd-4b6c-ae07-a7d330a53758", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22314", "type": "seen", "source": "https://t.me/cvedetector/23142", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-22314 - IBM Storage Defender Resiliency Service Weak Cryptographic Algorithm Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-22314 \nPublished : April 16, 2025, 5:15 p.m. | 28\u00a0minutes ago \nDescription : IBM Storage Defender - Resiliency Service 2.0.0 through 2.0.12 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T20:14:35.000000Z"}, {"uuid": "5254e5ca-573a-4ed8-a9f8-2345193054b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22318", "type": "seen", "source": "https://t.me/arpsyndicate/3350", "content": "#ExploitObserverAlert\n\nCVE-2024-22318\n\nDESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-22318. IBM i Access Client Solutions (ACS) 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.4 is vulnerable to NT LAN Manager (NTLM) hash disclosure by an attacker modifying UNC capable paths within ACS configuration files to point to a hostile server. If NTLM is enabled, the Windows operating system will try to authenticate using the current user's session. The hostile server could capture the NTLM hash information to obtain the user's credentials.  IBM X-Force ID:  279091.\n\nFIRST-EPSS: 0.000450000", "creation_timestamp": "2024-02-11T11:58:48.000000Z"}, {"uuid": "9c434844-2c42-4e08-baa0-7e2390d09473", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22316", "type": "seen", "source": "https://t.me/cvedetector/16467", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-22316 - IBM Sterling File Gateway Unauthorized Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-22316 \nPublished : Jan. 27, 2025, 4:15 p.m. | 17\u00a0minutes ago \nDescription : IBM Sterling File Gateway 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.1 could allow an authenticated user to perform unauthorized actions to another user's data due to improper access controls. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-27T17:40:20.000000Z"}, {"uuid": "cef7d52f-648e-4bdb-8e16-3c3b136e5b4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22319", "type": "seen", "source": "https://t.me/ctinow/192554", "content": "https://ift.tt/XRVtBE9\nCVE-2024-22319 | IBM Operational Decision Manager up to 8.12.0.1 Request ldap injection (XFDB-279145)", "creation_timestamp": "2024-02-24T12:41:34.000000Z"}, {"uuid": "b2b12af3-1bf8-4864-826e-8ac4f4e181b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22312", "type": "seen", "source": "https://t.me/ctinow/198726", "content": "https://ift.tt/XnDoI9m\nCVE-2024-22312 | IBM Storage Defender 2.0 Resiliency Service credentials storage (XFDB-278748)", "creation_timestamp": "2024-03-03T13:47:00.000000Z"}, {"uuid": "1db30025-bf7a-4aac-a438-82e6cdbbf83f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22318", "type": "seen", "source": "https://t.me/ctinow/198386", "content": "https://ift.tt/ITgnf4W\nCVE-2024-22318 | IBM i Access Client Solutions up to 1.1.4/1.1.9.4 ACS Configuration File information disclosure (ID 177069 / XFDB-279091)", "creation_timestamp": "2024-03-02T15:16:45.000000Z"}, {"uuid": "2d84a61f-3e56-4a2b-b85f-17367b74c210", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22313", "type": "seen", "source": "https://t.me/ctinow/198724", "content": "https://ift.tt/MYS8usQ\nCVE-2024-22313 | IBM Storage Defender 2.0 Resiliency Service hard-coded credentials (XFDB-278749)", "creation_timestamp": "2024-03-03T13:46:58.000000Z"}, {"uuid": "2de5af30-7fb3-40b3-950c-21f4713d562b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22318", "type": "seen", "source": "https://t.me/ctinow/184383", "content": "https://ift.tt/PUAMQ1i\nIBM i Access Client Solutions / Remote Credential Theft / CVE-2024-22318", "creation_timestamp": "2024-02-14T03:40:14.000000Z"}, {"uuid": "d47c559a-2cac-4aa1-8d84-1878b667cd1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22317", "type": "seen", "source": "https://t.me/ctinow/183029", "content": "https://ift.tt/LEVWSgG\nCVE-2024-22317 | IBM App Connect Enterprise up to 11.0.0.24/12.0.11.0 excessive authentication (XFDB-279143)", "creation_timestamp": "2024-02-12T11:07:21.000000Z"}, {"uuid": "78e665c6-10d6-41c3-a0d0-ea7b1f8277d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22310", "type": "seen", "source": "https://t.me/ctinow/190977", "content": "https://ift.tt/zkJADHj\nCVE-2024-22310 | Formzu WP Plugin up to 1.6.7 on WordPress cross site scripting", "creation_timestamp": "2024-02-22T17:52:30.000000Z"}, {"uuid": "b1dcd2bd-6c62-4bdc-984b-e9bf10feb6ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22313", "type": "seen", "source": "https://t.me/ctinow/182614", "content": "https://ift.tt/3GLreI8\nCVE-2024-22313", "creation_timestamp": "2024-02-10T17:26:23.000000Z"}, {"uuid": "c4e59df8-a13e-4637-a370-ccfbc11c6d05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22312", "type": "seen", "source": "https://t.me/ctinow/182613", "content": "https://ift.tt/iqlpUNH\nCVE-2024-22312", "creation_timestamp": "2024-02-10T17:26:22.000000Z"}, {"uuid": "e26dbbea-2a8f-4952-8b6f-376eda76712d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22310", "type": "seen", "source": "https://t.me/ctinow/176961", "content": "https://ift.tt/HUivCFX\nCVE-2024-22310", "creation_timestamp": "2024-01-31T18:22:19.000000Z"}, {"uuid": "7ec1a15a-98c6-4518-b115-fc540c88b57a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22319", "type": "seen", "source": "https://t.me/ctinow/177910", "content": "https://ift.tt/irTeA0j\nCVE-2024-22319", "creation_timestamp": "2024-02-02T04:21:45.000000Z"}, {"uuid": "ab856123-23e5-4151-827e-78e1fb0c1dec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22318", "type": "seen", "source": "https://t.me/ctinow/181768", "content": "https://ift.tt/N6iXSCe\nCVE-2024-22318", "creation_timestamp": "2024-02-09T02:26:26.000000Z"}, {"uuid": "3bd4318d-c266-4d58-8fc4-582963589dfb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22318", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9966", "content": "#exploit\n1. CVE-2024-22318:\nIBM i Access Client Solutions Remote Credential Theft\nhttps://hyp3rlinx.altervista.org/advisories/IBMI_ACCESS_CLIENT_REMOTE_CREDENTIAL_THEFT_CVE-2024-22318.txt\n\n2. Exploit Against Unnamed BYTEVALUE Router Vulnerablity Included in Mirai\nhttps://isc.sans.edu/diary/Exploit+against+Unnamed+Bytevalue+router+vulnerability+included+in+Mirai+Bot/30642", "creation_timestamp": "2024-03-28T05:11:05.000000Z"}, {"uuid": "99b230b3-8f9b-4148-971a-a623d4004511", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22317", "type": "seen", "source": "https://t.me/ctinow/169773", "content": "https://ift.tt/LbKG3nd\nCVE-2024-22317", "creation_timestamp": "2024-01-18T15:21:35.000000Z"}, {"uuid": "77517fa3-0048-4658-a5ef-504708afd1e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-22319", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10025", "content": "#exploit\n1. XAMPP Buffer Overflow (Unicode+SEH)\nhttps://www.exploit-db.com/exploits/51800\n\n2. CVE-2024-22532:\nXnSoft XnView 2.51.5 and NConvert 7.163 - Heap-based Buffer Overflow\nhttps://github.com/pwndorei/CVE-2024-22532\n\n3. CVE-2024-22319:\nIBM ODM RCE\nhttps://labs.watchtowr.com/double-k-o-rce-in-ibm-operation-decision-manager", "creation_timestamp": "2024-02-23T12:23:01.000000Z"}]}