{"vulnerability": "CVE-2024-4175", "sightings": [{"uuid": "759f8393-6628-445b-b84f-1b11b692d361", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41752", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113674730832011077", "content": "", "creation_timestamp": "2024-12-18T16:19:00.834300Z"}, {"uuid": "981dc920-6213-4b4b-856f-20ee5dfb4f03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41757", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113883999492620504", "content": "", "creation_timestamp": "2025-01-24T15:18:46.384074Z"}, {"uuid": "b804a4e0-9744-4c65-b3e7-613f488c34ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41753", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lobwjllg7v2h", "content": "", "creation_timestamp": "2025-05-03T18:06:11.520506Z"}, {"uuid": "ec55b46c-907a-441c-9149-7dfbbd3a4501", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41753", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lobutsrtsws2", "content": "", "creation_timestamp": "2025-05-03T19:37:36.500094Z"}, {"uuid": "fa029f68-b5bd-45fe-8cf5-adc84eb43f2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41750", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lund44ro732d", "content": "", "creation_timestamp": "2025-07-23T15:21:44.378508Z"}, {"uuid": "43b87528-f028-469e-94db-6ebe56d611d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41757", "type": "seen", "source": "https://t.me/cvedetector/16301", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41757 - IBM Concert Software Insecure SSL/TLS Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-41757 \nPublished : Jan. 24, 2025, 4:15 p.m. | 22\u00a0minutes ago \nDescription : IBM Concert Software 1.0.0 and 1.0.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T17:45:19.000000Z"}, {"uuid": "452abbbf-f3e4-4645-a6ab-e8db9d4e6e78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41752", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-15T13:28:32.000000Z"}, {"uuid": "c0116399-a2c8-4527-9714-97702f1b7f08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41752", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-16T03:45:05.000000Z"}, {"uuid": "97ab23a3-a8d9-4db0-8d8a-137b778250a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41750", "type": "seen", "source": "MISP/2bceffac-02c3-4c54-a709-6e253b38ec76", "content": "", "creation_timestamp": "2025-09-09T20:56:42.000000Z"}, {"uuid": "6f8abbe5-b4f3-43d9-857a-1189c481ec5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41753", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14697", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41753\n\ud83d\udd25 CVSS Score: 6.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: IBM Cloud Pak for Business Automation 24.0.0 through 24.0.0 IF004 and 24.0.1 through 24.0.1 IF001 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.\n\ud83d\udccf Published: 2025-05-03T16:06:18.716Z\n\ud83d\udccf Modified: 2025-05-03T16:07:32.201Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7232197", "creation_timestamp": "2025-05-03T16:19:08.000000Z"}, {"uuid": "dafe4a99-6123-406b-b74b-9f6a148988c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41752", "type": "seen", "source": "https://t.me/cvedetector/13216", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41752 - IBM Cognos Analytics HTML Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41752 \nPublished : Dec. 18, 2024, 5:15 p.m. | 25\u00a0minutes ago \nDescription : IBM Cognos Analytics\u00a011.2.0 through 11.2.4 and 12.0.0 through 12.0.3 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-18T18:42:49.000000Z"}, {"uuid": "c09fe056-84fc-460d-9d56-24b7e2c95127", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41753", "type": "seen", "source": "https://t.me/cvedetector/24404", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41753 - IBM Cloud Pak for Business Automation Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41753 \nPublished : May 3, 2025, 4:15 p.m. | 1\u00a0hour, 47\u00a0minutes ago \nDescription : IBM Cloud Pak for Business Automation 24.0.0 through 24.0.0 IF004 and 24.0.1 through 24.0.1 IF001 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-03T20:23:18.000000Z"}]}