{"vulnerability": "CVE-2024-2878", "sightings": [{"uuid": "9da0f0f6-b842-49cf-8a81-78adb0ec4820", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2878", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhgyrvecs52z", "content": "", "creation_timestamp": "2025-02-05T16:33:34.435144Z"}, {"uuid": "7bb8cd82-7bf8-4336-9866-e8b685bdb09a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2878", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113951254331919251", "content": "", "creation_timestamp": "2025-02-05T12:22:33.895386Z"}, {"uuid": "f4c8012c-517c-440c-bbf5-3ff31320df01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2878", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhgnprciwr2j", "content": "", "creation_timestamp": "2025-02-05T13:15:31.882053Z"}, {"uuid": "f7863c52-098b-461b-aa0d-15c7604ffbf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28786", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113902970781080807", "content": "", "creation_timestamp": "2025-01-27T23:43:25.279406Z"}, {"uuid": "0e58965b-cff3-4b77-abab-be8946735fa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28786", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgr6gud6go2n", "content": "", "creation_timestamp": "2025-01-28T00:16:12.193511Z"}, {"uuid": "2b73bf75-1bc9-4720-ba5d-d0f8d6e4b47a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28784", "type": "seen", "source": "Telegram/oWpb4jya65hQq-GL1d2da5rx2DKzuNEoGIwCMxSdz3g_DzRr", "content": "", "creation_timestamp": "2025-03-06T02:17:23.000000Z"}, {"uuid": "319018b9-78a0-40b3-b2e9-ef667a280a54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28780", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3likej6sqlq2c", "content": "", "creation_timestamp": "2025-02-19T18:06:37.876987Z"}, {"uuid": "b3d28fa0-3bf4-4066-903a-6ff63609d1dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28780", "type": "seen", "source": "MISP/9ca82492-7deb-4197-a6f1-191e121eef96", "content": "", "creation_timestamp": "2025-08-25T13:32:05.000000Z"}, {"uuid": "55983d27-924b-461a-bb00-561e1a49db15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28780", "type": "seen", "source": "https://t.me/cvedetector/18466", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-28780 - IBM Cognos Controller Weak Cryptographic Algorithm Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-28780 \nPublished : Feb. 19, 2025, 4:15 p.m. | 2\u00a0hours, 23\u00a0minutes ago \nDescription : IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 Rich Client\u00a0  \n  \n  \n  \n  \n  \nuses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-19T20:25:12.000000Z"}, {"uuid": "2a7ed502-547c-4141-9577-1bcb8be83ce4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2878", "type": "seen", "source": "https://t.me/cvedetector/17289", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-2878 - GitLab Branch Name Search Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-2878 \nPublished : Feb. 5, 2025, 1:15 p.m. | 38\u00a0minutes ago \nDescription : An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.7 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2. It was possible for an attacker to cause a denial of service by crafting unusual search terms for branch names. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T14:58:14.000000Z"}, {"uuid": "b7dc9c1c-d417-4330-93f5-1bfe08f67d52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28786", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3194", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-28786\n\ud83d\udd25 CVSS Score: 6.4 (CVSS_V3)\n\ud83d\udd39 Description: IBM QRadar SIEM 7.5 transmits sensitive or security-critical data in cleartext in a communication channel that could be obtained by an unauthorized actor using man in the middle techniques.\n\ud83d\udccf Published: 2025-01-28T00:32:15Z\n\ud83d\udccf Modified: 2025-01-28T00:32:15Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-28786\n2. https://www.ibm.com/support/pages/node/7173420", "creation_timestamp": "2025-01-28T01:08:22.000000Z"}, {"uuid": "102f7e5c-ff4a-4a3c-94fb-1c947774f575", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28786", "type": "seen", "source": "https://t.me/cvedetector/16546", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-28786 - IBM QRadar SIEM Cleartext Data Transmission Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-28786 \nPublished : Jan. 28, 2025, 12:15 a.m. | 45\u00a0minutes ago \nDescription : IBM QRadar SIEM 7.5 transmits sensitive or security-critical data in cleartext in a communication channel that could be obtained by an unauthorized actor using man in the middle techniques. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T02:04:03.000000Z"}, {"uuid": "36e85055-c8c4-4123-83e4-f19258ce8597", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28782", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5777", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-28782\n\ud83d\udd25 CVSS Score: 6.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: IBM QRadar Suite Software 1.10.12.0 through 1.10.18.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 stores user credentials in plain clear text which can be read by an authenticated user.  IBM X-Force ID:  285698.\n\ud83d\udccf Published: 2024-04-03T12:00:55.863Z\n\ud83d\udccf Modified: 2025-02-27T20:12:46.906Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7145683\n2. https://exchange.xforce.ibmcloud.com/vulnerabilities/285698", "creation_timestamp": "2025-02-27T20:25:38.000000Z"}, {"uuid": "24bfabf8-e2bc-4fb9-b955-e2f119923386", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28784", "type": "published-proof-of-concept", "source": "Telegram/w8Kvb_316mnceq-PgxfOBHIYlaxR1eAKja-0YMXummS2jdY", "content": "", "creation_timestamp": "2025-06-03T09:00:05.000000Z"}, {"uuid": "e7ad84f6-9b63-4443-86c0-defe77023ff4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28784", "type": "published-proof-of-concept", "source": "Telegram/E3WuV1FRvKx0RtmYjxyKjZypMIbodp5CT0vIAo1Cpm5Yxr8", "content": "", "creation_timestamp": "2025-06-03T03:00:05.000000Z"}, {"uuid": "407c6280-29aa-4eab-870b-7c72d0509dce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28786", "type": "seen", "source": "Telegram/_wkXDFGdNgfcoe88fz4LiBKAEtXx-TrIl_q0gpOu3oLpVD-N", "content": "", "creation_timestamp": "2025-01-28T03:22:55.000000Z"}, {"uuid": "4163c796-ac20-44db-b7a6-ac5c52b58850", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2878", "type": "seen", "source": "Telegram/mp26FTihoqoZQdTJZncNQWrWZt_eXhJMydkVcTNB5e219hGr", "content": "", "creation_timestamp": "2025-02-06T02:43:28.000000Z"}]}