{"vulnerability": "CVE-2024-41767", "sightings": [{"uuid": "159b31da-110f-400c-9571-ac6035ac3eb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41767", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lewfixwisa2c", "content": "", "creation_timestamp": "2025-01-04T15:15:41.504816Z"}, {"uuid": "3aad6117-b224-4240-b714-1341d3c57042", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41767", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113771025764024151", "content": "", "creation_timestamp": "2025-01-04T16:30:24.161477Z"}, {"uuid": "779600c2-88bb-414f-b9c2-475a434ca041", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41767", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/103", "content": "\ud83d\udccc **CVE ID**: GHSA-cw42-cp8c-qv2q\n\ud83d\udd17 **Aliases**: CVE-2024-41767\n\ud83d\udd39 **Details**: IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database.\n\ud83d\udd22 **Severity**: CVSS_V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\n\ud83d\uddd3\ufe0f **Modified**: 2025-01-04T15:30:45Z\n\ud83d\uddd3\ufe0f **Published**: 2025-01-04T15:30:45Z\n\ud83c\udff7\ufe0f **CWE IDs**: CWE-89\n\ud83d\udd17 **References**:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-416\n2. https://www.ibm.com/support/pages/node/180199", "creation_timestamp": "2025-01-05T01:38:34.000000Z"}, {"uuid": "ff636071-c277-47b0-a7bd-6eaa834612c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41767", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/81", "content": "\ud83d\udccc **CVE ID**: GHSA-cw42-cp8c-qv2q\n\ud83d\udd17 **Aliases**: CVE-2024-41767\n\ud83d\udd39 **Details**: IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database.\n\ud83d\udd22 **Severity**: CVSS_V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\n\ud83d\uddd3\ufe0f **Modified**: 2025-01-04T15:30:45Z\n\ud83d\uddd3\ufe0f **Published**: 2025-01-04T15:30:45Z\n\ud83c\udff7\ufe0f **CWE IDs**: CWE-89\n\ud83d\udd17 **References**:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-416\n2. https://www.ibm.com/support/pages/node/180199", "creation_timestamp": "2025-01-05T01:35:47.000000Z"}, {"uuid": "9a48c3e7-8196-4d78-bbe8-97876a209025", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41767", "type": "seen", "source": "https://t.me/cvedetector/14287", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41767 - IBM Engineering Lifecycle Optimization SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41767 \nPublished : Jan. 4, 2025, 3:15 p.m. | 35\u00a0minutes ago \nDescription : IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.0.3 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-04T17:16:10.000000Z"}]}