{"vulnerability": "CVE-2024-4177", "sightings": [{"uuid": "62d8d57e-550f-48c6-bed4-e5e1beb16b86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41775", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113590043664569625", "content": "", "creation_timestamp": "2024-12-03T17:21:56.575827Z"}, {"uuid": "81a9295f-e9bf-45f6-97a6-a1c91e3c757c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41776", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113590043697773291", "content": "", "creation_timestamp": "2024-12-03T17:21:56.799081Z"}, {"uuid": "01e025b3-4ea2-4b6e-bf0c-e64ce2e763f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41777", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113590043712641342", "content": "", "creation_timestamp": "2024-12-03T17:21:57.052566Z"}, {"uuid": "5f3a78bf-9956-4db3-967c-8229b3b9c5d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41779", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113526515572495284", "content": "", "creation_timestamp": "2024-11-22T12:05:54.615676Z"}, {"uuid": "fcbca0d9-1566-4c7f-b983-9d79b66c5a7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41779", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113531791115889914", "content": "", "creation_timestamp": "2024-11-23T10:27:32.985979Z"}, {"uuid": "f573a52a-30ac-41c7-bd0b-9c58ea42b442", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41779", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lfpil4vty725", "content": "", "creation_timestamp": "2025-01-14T14:47:01.534951Z"}, {"uuid": "40b4b491-1042-4a10-9fbd-f9e5bfd7143e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41779", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113804382326937214", "content": "", "creation_timestamp": "2025-01-10T13:51:05.930326Z"}, {"uuid": "9714f7da-d4b0-4c1b-b41d-da7bb6bebd99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41778", "type": "seen", "source": "MISP/1e8d1b5a-3537-4a30-907d-acb1720bbd18", "content": "", "creation_timestamp": "2025-08-19T18:29:28.000000Z"}, {"uuid": "8fd26eff-286c-4c87-8694-d0548235db9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41779", "type": "seen", "source": "https://t.me/CyberBulletin/1632", "content": "\u26a1\ufe0fCVE-2024-41779 (CVSS 9.8): IBM Rhapsody Model Manager Vulnerability Puts Systems at Risk.\n\n#CyberBulletin", "creation_timestamp": "2024-11-27T07:55:46.000000Z"}, {"uuid": "4fa235d1-6551-48c6-b8f1-7463453148f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41778", "type": "seen", "source": "Telegram/8-pJA-wH6QIq7DP1TY-QDwJ0QCRtOJEYmjE30pepVlVq3Y3A", "content": "", "creation_timestamp": "2025-03-02T11:46:59.000000Z"}, {"uuid": "78111302-c6a1-4c6e-a4cc-771a6e76bcdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41778", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6076", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41778\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: IBM Controller 11.0.0 through 11.0.1 and 11.1.0 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts.\n\ud83d\udccf Published: 2025-03-01T14:22:40.930Z\n\ud83d\udccf Modified: 2025-03-01T14:22:40.930Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7184423", "creation_timestamp": "2025-03-01T14:28:22.000000Z"}, {"uuid": "eaf8094d-4b1a-4c26-923d-2a220d0666d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41778", "type": "seen", "source": "https://t.me/cvedetector/19240", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41778 - IBM Controller Weak Password Policy Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41778 \nPublished : March 1, 2025, 3:15 p.m. | 1\u00a0hour, 40\u00a0minutes ago \nDescription : IBM Controller 11.0.0 through 11.0.1 and 11.1.0 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-01T18:07:12.000000Z"}, {"uuid": "09ab8adf-4f6d-445e-8523-ff41fa9921da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41771", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6405", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41771\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: IBM Engineering Requirements Management DOORS Next 7.0.2, 7.0.3, and 7.1 could allow a remote attacker to download temporary files which could expose application logic or other sensitive information.\n\ud83d\udccf Published: 2025-03-03T15:29:14.503Z\n\ud83d\udccf Modified: 2025-03-04T19:01:10.858Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7184663", "creation_timestamp": "2025-03-04T19:33:51.000000Z"}, {"uuid": "0bacd262-7346-4b0e-b2d6-e61802863959", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41770", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6403", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41770\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: IBM Engineering Requirements Management DOORS Next 7.0.2, 7.0.3, and 7.1 could allow a remote attacker to download temporary files which could expose application logic or other sensitive information.\n\ud83d\udccf Published: 2025-03-03T15:28:57.065Z\n\ud83d\udccf Modified: 2025-03-04T19:05:46.401Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7184663", "creation_timestamp": "2025-03-04T19:33:46.000000Z"}, {"uuid": "e6f7386e-868d-48c1-bd99-f5c13da99a2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41776", "type": "seen", "source": "https://t.me/cvedetector/11896", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41776 - IBM Cognos Controller 11.0.0 and 11.0.1\", \n  \"Content\": \"CVE ID : CVE-2024-41776 \nPublished : Dec. 3, 2024, 6:15 p.m. | 1\u00a0hour ago \nDescription : IBM Cognos Controller 11.0.0 and 11.0.1   \n  \n  \n  \n  \n  \n  \n  \n  \n  \n  \n  \nis vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-03T20:40:41.000000Z"}, {"uuid": "0d619c5f-516b-4753-8dcd-df85161fa1ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41775", "type": "seen", "source": "https://t.me/cvedetector/11899", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41775 - IBM Cognos Controller 11.0.0 and 11.0.1\u00a0uses weake\", \n  \"Content\": \"CVE ID : CVE-2024-41775 \nPublished : Dec. 3, 2024, 6:15 p.m. | 1\u00a0hour ago \nDescription : IBM Cognos Controller 11.0.0 and 11.0.1\u00a0uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-03T20:40:44.000000Z"}, {"uuid": "c198ba64-7854-40d8-8441-3e8356779568", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41773", "type": "seen", "source": "https://t.me/cvedetector/3683", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41773 - IBM Global Configuration Management Archive Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41773 \nPublished : Aug. 20, 2024, 8:15 p.m. | 43\u00a0minutes ago \nDescription : IBM Global Configuration Management 7.0.2 and 7.0.3 could allow an authenticated user to archive a global baseline due to improper access controls. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-20T22:59:28.000000Z"}, {"uuid": "9e6ea0a5-0b27-4065-bf2c-da85d2a04565", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41777", "type": "seen", "source": "https://t.me/cvedetector/11897", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41777 - IBM Cognos Controller 11.0.0 and 11.0.1\", \n  \"Content\": \"CVE ID : CVE-2024-41777 \nPublished : Dec. 3, 2024, 6:15 p.m. | 1\u00a0hour ago \nDescription : IBM Cognos Controller 11.0.0 and 11.0.1   \n  \n  \n  \n  \n  \n  \n  \n  \n  \ncontains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-03T20:40:42.000000Z"}, {"uuid": "c49a0c4a-05c5-4763-be9d-8c97a662fdfd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41779", "type": "seen", "source": "https://t.me/CyberBulletin/26635", "content": "\u26a1\ufe0fCVE-2024-41779 (CVSS 9.8): IBM Rhapsody Model Manager Vulnerability Puts Systems at Risk.\n\n#CyberBulletin", "creation_timestamp": "2024-11-27T07:55:46.000000Z"}, {"uuid": "ce7a807b-351c-4854-9731-4d1d0d1f21a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41774", "type": "seen", "source": "https://t.me/cvedetector/2994", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41774 - IBM Common Licensing Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-41774 \nPublished : Aug. 13, 2024, 11:15 a.m. | 26\u00a0minutes ago \nDescription : IBM Common Licensing 9.0 is vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.  IBM X-Force ID:  350348. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-13T13:45:56.000000Z"}, {"uuid": "630d19fa-faaf-4df7-a8c3-c67a5227706b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4177", "type": "seen", "source": "https://t.me/HackingInsights/2034", "content": "\u200aCVE-2024-4177: SSRF Vulnerability Patched in Bitdefender GravityZone Console On-Premise\n\nhttps://securityonline.info/cve-2024-4177-ssrf-vulnerability-patched-in-bitdefender-gravityzone-console-on-premise/", "creation_timestamp": "2024-06-09T21:00:45.000000Z"}]}