{"vulnerability": "CVE-2024-4176", "sightings": [{"uuid": "a921448c-a08c-4621-846f-1fae86a4eec0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41762", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113611791212387550", "content": "", "creation_timestamp": "2024-12-07T13:32:37.612104Z"}, {"uuid": "92140190-2a83-4b1b-b9ee-e2c1ecda3b58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41761", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113529895129783579", "content": "", "creation_timestamp": "2024-11-23T02:25:22.512267Z"}, {"uuid": "ed6ff172-fd56-4733-a1f2-208f51a7fc50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41763", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113770603369270865", "content": "", "creation_timestamp": "2025-01-04T14:42:21.857398Z"}, {"uuid": "d19d6196-55d7-4e0f-950a-a11c63cd9361", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41765", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113770603403534386", "content": "", "creation_timestamp": "2025-01-04T14:42:22.650560Z"}, {"uuid": "c067b551-6cbe-4a01-ac27-8f8624f645c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41766", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113770603418295944", "content": "", "creation_timestamp": "2025-01-04T14:42:23.595434Z"}, {"uuid": "52d1d01f-0ed9-413a-8cf5-f0126edeaeec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41763", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lewfirehej2m", "content": "", "creation_timestamp": "2025-01-04T15:15:32.675346Z"}, {"uuid": "902d29d2-c559-4629-8fce-90beaa9ce0a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41765", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lewfitjb4o22", "content": "", "creation_timestamp": "2025-01-04T15:15:35.439696Z"}, {"uuid": "87f59d9d-a7b8-431f-acd8-1b9768e0258c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41766", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lewfivruet2f", "content": "", "creation_timestamp": "2025-01-04T15:15:39.222612Z"}, {"uuid": "159b31da-110f-400c-9571-ac6035ac3eb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41767", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lewfixwisa2c", "content": "", "creation_timestamp": "2025-01-04T15:15:41.504816Z"}, {"uuid": "2f8ed886-6207-4613-824a-c9eb32ecd935", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41768", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lewfj37luc2k", "content": "", "creation_timestamp": "2025-01-04T15:15:45.190413Z"}, {"uuid": "3aad6117-b224-4240-b714-1341d3c57042", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41767", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113771025764024151", "content": "", "creation_timestamp": "2025-01-04T16:30:24.161477Z"}, {"uuid": "51ac056a-0cc4-4758-a493-02b877edf308", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41760", "type": "seen", "source": "https://t.me/cvedetector/20026", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41760 - IBM Common Cryptographic Architecture RSA Timing Attack\", \n  \"Content\": \"CVE ID : CVE-2024-41760 \nPublished : March 11, 2025, 1:15 a.m. | 24\u00a0minutes ago \nDescription : IBM Common Cryptographic Architecture 7.0.0 through 7.5.51   \n  \ncould allow an attacker to obtain sensitive information due to a timing attack during certain RSA operations. \nSeverity: 3.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-11T03:24:49.000000Z"}, {"uuid": "9ee9a4c8-03aa-45c5-b359-d10b28c6ff79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41763", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/102", "content": "\ud83d\udccc **CVE ID**: GHSA-g5cm-fp5c-4jfp\n\ud83d\udd17 **Aliases**: CVE-2024-41763\n\ud83d\udd39 **Details**: IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3  uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.\n\ud83d\udd22 **Severity**: CVSS_V3: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\n\ud83d\uddd3\ufe0f **Modified**: 2025-01-04T15:30:45Z\n\ud83d\uddd3\ufe0f **Published**: 2025-01-04T15:30:45Z\n\ud83c\udff7\ufe0f **CWE IDs**: CWE-327\n\ud83d\udd17 **References**:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-4163\n2. https://www.ibm.com/support/pages/node/180204", "creation_timestamp": "2025-01-05T01:38:27.000000Z"}, {"uuid": "ff636071-c277-47b0-a7bd-6eaa834612c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41767", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/81", "content": "\ud83d\udccc **CVE ID**: GHSA-cw42-cp8c-qv2q\n\ud83d\udd17 **Aliases**: CVE-2024-41767\n\ud83d\udd39 **Details**: IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database.\n\ud83d\udd22 **Severity**: CVSS_V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\n\ud83d\uddd3\ufe0f **Modified**: 2025-01-04T15:30:45Z\n\ud83d\uddd3\ufe0f **Published**: 2025-01-04T15:30:45Z\n\ud83c\udff7\ufe0f **CWE IDs**: CWE-89\n\ud83d\udd17 **References**:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-416\n2. https://www.ibm.com/support/pages/node/180199", "creation_timestamp": "2025-01-05T01:35:47.000000Z"}, {"uuid": "3d9d896f-2cb7-4f61-98c5-037301210953", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41768", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/101", "content": "\ud83d\udccc **CVE ID**: GHSA-r5j8-58v3-g23g\n\ud83d\udd17 **Aliases**: CVE-2024-41768\n\ud83d\udd39 **Details**: IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3 could allow a remote attacker to cause an unhandled SSL exception which could leave the connection in an unexpected or insecure state.\n\ud83d\udd22 **Severity**: CVSS_V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L\n\ud83d\uddd3\ufe0f **Modified**: 2025-01-04T15:30:45Z\n\ud83d\uddd3\ufe0f **Published**: 2025-01-04T15:30:45Z\n\ud83c\udff7\ufe0f **CWE IDs**: CWE-544\n\ud83d\udd17 **References**:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-4168\n2. https://www.ibm.com/support/pages/node/180202", "creation_timestamp": "2025-01-05T01:38:22.000000Z"}, {"uuid": "8d64f88f-9696-4099-88fe-6c23372fa72a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41765", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/105", "content": "\ud83d\udccc **CVE ID**: GHSA-87r4-wg36-7x2v\n\ud83d\udd17 **Aliases**: CVE-2024-41765\n\ud83d\udd39 **Details**: IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system.\n\ud83d\udd22 **Severity**: CVSS_V3: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\n\ud83d\uddd3\ufe0f **Modified**: 2025-01-04T15:30:45Z\n\ud83d\uddd3\ufe0f **Published**: 2025-01-04T15:30:45Z\n\ud83c\udff7\ufe0f **CWE IDs**: CWE-22\n\ud83d\udd17 **References**:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-4165\n2. https://www.ibm.com/support/pages/node/180201", "creation_timestamp": "2025-01-05T01:38:45.000000Z"}, {"uuid": "9a48c3e7-8196-4d78-bbe8-97876a209025", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41767", "type": "seen", "source": "https://t.me/cvedetector/14287", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41767 - IBM Engineering Lifecycle Optimization SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41767 \nPublished : Jan. 4, 2025, 3:15 p.m. | 35\u00a0minutes ago \nDescription : IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-04T17:16:10.000000Z"}, {"uuid": "002fc55c-ae44-4ce7-a680-58d1ef59af39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41766", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/77", "content": "\ud83d\udccc **CVE ID**: GHSA-vp3x-9qpg-q385\n\ud83d\udd17 **Aliases**: CVE-2024-41766\n\ud83d\udd39 **Details**: IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3  could allow a remote attacker to cause a denial of service using a complex regular expression.\n\ud83d\udd22 **Severity**: CVSS_V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\n\ud83d\uddd3\ufe0f **Modified**: 2025-01-04T15:30:45Z\n\ud83d\uddd3\ufe0f **Published**: 2025-01-04T15:30:45Z\n\ud83c\udff7\ufe0f **CWE IDs**: CWE-1333\n\ud83d\udd17 **References**:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-4166\n2. https://www.ibm.com/support/pages/node/180203", "creation_timestamp": "2025-01-05T01:35:24.000000Z"}, {"uuid": "7863109b-fbe9-47e1-afd7-9ba0783929b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41766", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/99", "content": "\ud83d\udccc **CVE ID**: GHSA-vp3x-9qpg-q385\n\ud83d\udd17 **Aliases**: CVE-2024-41766\n\ud83d\udd39 **Details**: IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3  could allow a remote attacker to cause a denial of service using a complex regular expression.\n\ud83d\udd22 **Severity**: CVSS_V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\n\ud83d\uddd3\ufe0f **Modified**: 2025-01-04T15:30:45Z\n\ud83d\uddd3\ufe0f **Published**: 2025-01-04T15:30:45Z\n\ud83c\udff7\ufe0f **CWE IDs**: CWE-1333\n\ud83d\udd17 **References**:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-4166\n2. https://www.ibm.com/support/pages/node/180203", "creation_timestamp": "2025-01-05T01:38:11.000000Z"}, {"uuid": "779600c2-88bb-414f-b9c2-475a434ca041", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41767", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/103", "content": "\ud83d\udccc **CVE ID**: GHSA-cw42-cp8c-qv2q\n\ud83d\udd17 **Aliases**: CVE-2024-41767\n\ud83d\udd39 **Details**: IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database.\n\ud83d\udd22 **Severity**: CVSS_V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\n\ud83d\uddd3\ufe0f **Modified**: 2025-01-04T15:30:45Z\n\ud83d\uddd3\ufe0f **Published**: 2025-01-04T15:30:45Z\n\ud83c\udff7\ufe0f **CWE IDs**: CWE-89\n\ud83d\udd17 **References**:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-416\n2. https://www.ibm.com/support/pages/node/180199", "creation_timestamp": "2025-01-05T01:38:34.000000Z"}, {"uuid": "20f72ea7-06f1-4d50-8ef1-fc1ae68e33be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41768", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/79", "content": "\ud83d\udccc **CVE ID**: GHSA-r5j8-58v3-g23g\n\ud83d\udd17 **Aliases**: CVE-2024-41768\n\ud83d\udd39 **Details**: IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3 could allow a remote attacker to cause an unhandled SSL exception which could leave the connection in an unexpected or insecure state.\n\ud83d\udd22 **Severity**: CVSS_V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L\n\ud83d\uddd3\ufe0f **Modified**: 2025-01-04T15:30:45Z\n\ud83d\uddd3\ufe0f **Published**: 2025-01-04T15:30:45Z\n\ud83c\udff7\ufe0f **CWE IDs**: CWE-544\n\ud83d\udd17 **References**:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-4168\n2. https://www.ibm.com/support/pages/node/180202", "creation_timestamp": "2025-01-05T01:35:35.000000Z"}, {"uuid": "dc7473b1-1a30-4757-9f39-df0f4b15a057", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41765", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/83", "content": "\ud83d\udccc **CVE ID**: GHSA-87r4-wg36-7x2v\n\ud83d\udd17 **Aliases**: CVE-2024-41765\n\ud83d\udd39 **Details**: IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system.\n\ud83d\udd22 **Severity**: CVSS_V3: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\n\ud83d\uddd3\ufe0f **Modified**: 2025-01-04T15:30:45Z\n\ud83d\uddd3\ufe0f **Published**: 2025-01-04T15:30:45Z\n\ud83c\udff7\ufe0f **CWE IDs**: CWE-22\n\ud83d\udd17 **References**:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-4165\n2. https://www.ibm.com/support/pages/node/180201", "creation_timestamp": "2025-01-05T01:35:59.000000Z"}, {"uuid": "d067ca62-44b0-4238-ac86-61030a36ee6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41760", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7078", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41760\n\ud83d\udd25 CVSS Score: 3.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: IBM Common Cryptographic Architecture 7.0.0 through 7.5.51 \n\ncould allow an attacker to obtain sensitive information due to a timing attack during certain RSA operations.\n\ud83d\udccf Published: 2025-03-11T00:49:35.514Z\n\ud83d\udccf Modified: 2025-03-11T00:49:35.514Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7185282", "creation_timestamp": "2025-03-11T01:41:14.000000Z"}, {"uuid": "57a68cc5-c9b7-411f-8c44-099e02a3d0e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41766", "type": "seen", "source": "https://t.me/cvedetector/14286", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41766 - IBM Engineering Lifecycle Optimization RE DoS\", \n  \"Content\": \"CVE ID : CVE-2024-41766 \nPublished : Jan. 4, 2025, 3:15 p.m. | 35\u00a0minutes ago \nDescription : IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3  could allow a remote attacker to cause a denial of service using a complex regular expression. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-04T17:16:06.000000Z"}, {"uuid": "2a7c93dc-96e9-45e2-9664-f003be72f666", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41765", "type": "seen", "source": "https://t.me/cvedetector/14285", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41765 - IBM Engineering Lifecycle Optimization File Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41765 \nPublished : Jan. 4, 2025, 3:15 p.m. | 35\u00a0minutes ago \nDescription : IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-04T17:16:05.000000Z"}, {"uuid": "68bac368-ffd0-4d2f-b063-4d815c129bf3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41763", "type": "seen", "source": "https://t.me/cvedetector/14284", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41763 - IBM Engineering Lifecycle Optimization Weak Cryptographic Algorithms\", \n  \"Content\": \"CVE ID : CVE-2024-41763 \nPublished : Jan. 4, 2025, 3:15 p.m. | 35\u00a0minutes ago \nDescription : IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3  uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-04T17:16:05.000000Z"}, {"uuid": "a629e85a-1474-49be-9619-d408dcb9f0d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41768", "type": "seen", "source": "https://t.me/cvedetector/14282", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41768 - IBM Engineering Lifecycle Optimization SSL Exception Vulnerability (Remote)\", \n  \"Content\": \"CVE ID : CVE-2024-41768 \nPublished : Jan. 4, 2025, 3:15 p.m. | 35\u00a0minutes ago \nDescription : IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3 could allow a remote attacker to cause an unhandled SSL exception which could leave the connection in an unexpected or insecure state. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-04T17:16:03.000000Z"}, {"uuid": "8c8310b0-2899-402f-81a4-082c3e51765f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41762", "type": "seen", "source": "https://t.me/cvedetector/12327", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41762 - IBM Db2 denial of Service Crash Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41762 \nPublished : Dec. 7, 2024, 2:15 p.m. | 31\u00a0minutes ago \nDescription : IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-07T15:52:51.000000Z"}, {"uuid": "790d4ef3-e0bd-4b4e-bb81-7f20aeb9e7f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41760", "type": "seen", "source": "Telegram/v-tjdYAH790eutBlsDxDQ65-bBvrd3TF-RBHfFDYw3i9iHVD", "content": "", "creation_timestamp": "2025-03-11T04:41:14.000000Z"}]}