{"vulnerability": "CVE-2024-41765", "sightings": [{"uuid": "d19d6196-55d7-4e0f-950a-a11c63cd9361", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41765", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113770603403534386", "content": "", "creation_timestamp": "2025-01-04T14:42:22.650560Z"}, {"uuid": "902d29d2-c559-4629-8fce-90beaa9ce0a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41765", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lewfitjb4o22", "content": "", "creation_timestamp": "2025-01-04T15:15:35.439696Z"}, {"uuid": "dc7473b1-1a30-4757-9f39-df0f4b15a057", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41765", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/83", "content": "\ud83d\udccc **CVE ID**: GHSA-87r4-wg36-7x2v\n\ud83d\udd17 **Aliases**: CVE-2024-41765\n\ud83d\udd39 **Details**: IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system.\n\ud83d\udd22 **Severity**: CVSS_V3: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\n\ud83d\uddd3\ufe0f **Modified**: 2025-01-04T15:30:45Z\n\ud83d\uddd3\ufe0f **Published**: 2025-01-04T15:30:45Z\n\ud83c\udff7\ufe0f **CWE IDs**: CWE-22\n\ud83d\udd17 **References**:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-4165\n2. https://www.ibm.com/support/pages/node/180201", "creation_timestamp": "2025-01-05T01:35:59.000000Z"}, {"uuid": "8d64f88f-9696-4099-88fe-6c23372fa72a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41765", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/105", "content": "\ud83d\udccc **CVE ID**: GHSA-87r4-wg36-7x2v\n\ud83d\udd17 **Aliases**: CVE-2024-41765\n\ud83d\udd39 **Details**: IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system.\n\ud83d\udd22 **Severity**: CVSS_V3: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\n\ud83d\uddd3\ufe0f **Modified**: 2025-01-04T15:30:45Z\n\ud83d\uddd3\ufe0f **Published**: 2025-01-04T15:30:45Z\n\ud83c\udff7\ufe0f **CWE IDs**: CWE-22\n\ud83d\udd17 **References**:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-4165\n2. https://www.ibm.com/support/pages/node/180201", "creation_timestamp": "2025-01-05T01:38:45.000000Z"}, {"uuid": "2a7c93dc-96e9-45e2-9664-f003be72f666", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41765", "type": "seen", "source": "https://t.me/cvedetector/14285", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41765 - IBM Engineering Lifecycle Optimization File Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41765 \nPublished : Jan. 4, 2025, 3:15 p.m. | 35\u00a0minutes ago \nDescription : IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-04T17:16:05.000000Z"}]}