{"vulnerability": "CVE-2024-3189", "sightings": [{"uuid": "994cf806-49e0-4755-a248-7602bf3a4e78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31896", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8735", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-31896\n\ud83d\udd25 CVSS Score: 5.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: IBM SPSS Statistics\u00a026.0, 27.0.1, 28.0.1, and 29.0.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.\n\ud83d\udccf Published: 2025-03-25T18:58:38.272Z\n\ud83d\udccf Modified: 2025-03-25T19:06:51.805Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7228971", "creation_timestamp": "2025-03-25T19:24:48.000000Z"}, {"uuid": "3344af52-29ad-43b0-9261-55ccd38169b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31891", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113651319061859524", "content": "", "creation_timestamp": "2024-12-14T13:05:04.977634Z"}, {"uuid": "487a2903-4ef4-420a-be44-2b959c504e69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31892", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113651319076835088", "content": "", "creation_timestamp": "2024-12-14T13:05:05.312171Z"}, {"uuid": "b96f2f59-174c-4827-817f-a0ff73f94407", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31891", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113651515652027586", "content": "", "creation_timestamp": "2024-12-14T13:55:04.383529Z"}, {"uuid": "14394251-955e-4576-81e4-3c56227e1d77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31896", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lla6dgfnem26", "content": "", "creation_timestamp": "2025-03-25T21:04:59.589312Z"}, {"uuid": "e1192ccd-24c6-429f-8bbe-ea7b2af5820b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31896", "type": "seen", "source": "https://t.me/cvedetector/21114", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-31896 - IBM SPSS Statistics Weak Cryptographic Algorithms\", \n  \"Content\": \"CVE ID : CVE-2024-31896 \nPublished : March 25, 2025, 7:15 p.m. | 56\u00a0minutes ago \nDescription : IBM SPSS Statistics\u00a026.0, 27.0.1, 28.0.1, and 29.0.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-25T22:00:06.000000Z"}, {"uuid": "7a07b6fc-c3e8-430d-a381-6f0932bcc1bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31891", "type": "seen", "source": "https://t.me/cvedetector/12946", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-31891 - IBM Storage Scale GUI Privilege Escalation vulnerabilty\", \n  \"Content\": \"CVE ID : CVE-2024-31891 \nPublished : Dec. 14, 2024, 1:15 p.m. | 35\u00a0minutes ago \nDescription : IBM Storage Scale GUI 5.1.9.0 through 5.1.9.6 and 5.2.0.0 through 5.2.1.1   \n  \ncontains a local privilege escalation vulnerability. A malicious actor with command line access to the 'scalemgmt' user can elevate privileges to gain root access to the host operating system. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-14T15:11:21.000000Z"}, {"uuid": "75c1fb73-c370-4570-a24f-02982f2ead9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31892", "type": "seen", "source": "https://t.me/cvedetector/12945", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-31892 - IBM Storage Scale GUI CSV Formula Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-31892 \nPublished : Dec. 14, 2024, 1:15 p.m. | 35\u00a0minutes ago \nDescription : IBM Storage Scale GUI 5.1.9.0 through 5.1.9.6 and 5.2.0.0 through 5.2.1.1 could allow a user to perform unauthorized actions after intercepting and modifying a csv file due to improper neutralization of formula elements. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-14T15:11:20.000000Z"}, {"uuid": "d1e85796-9b24-427d-a16e-c522a7f6a710", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31899", "type": "seen", "source": "https://t.me/cvedetector/6416", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-31899 - IBM Cognos Command Center Data Disclosure vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-31899 \nPublished : Sept. 26, 2024, 2:15 p.m. | 41\u00a0minutes ago \nDescription : IBM Cognos Command Center 10.2.4.1 and 10.2.5 could disclose highly sensitive user information to an authenticated user with physical access to the device. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-26T17:09:44.000000Z"}, {"uuid": "edc9b53f-bd82-46e4-a24e-230b1ca17936", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31897", "type": "seen", "source": "https://t.me/cvedetector/171", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-31897 - IBM Cloud Pak for Business Automation 18.0.0, 18.0\", \n  \"Content\": \"CVE ID : CVE-2024-31897 \nPublished : July 8, 2024, 3:15 a.m. | 48\u00a0minutes ago \nDescription : IBM Cloud Pak for Business Automation 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, 22.0.2, 23.0.1, and 23.0.2 vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.  IBM X-Force ID:  288178. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-08T06:08:13.000000Z"}]}