{"vulnerability": "CVE-2024-4178", "sightings": [{"uuid": "0f51a793-7720-45c9-9d04-1032197fd9ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41785", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113487518002577801", "content": "", "creation_timestamp": "2024-11-15T14:48:18.847891Z"}, {"uuid": "fa4e1ec7-c09f-4b29-aef6-29283f6c498f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41781", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113526515589251944", "content": "", "creation_timestamp": "2024-11-22T12:05:54.851472Z"}, {"uuid": "337280ab-2a89-49ae-aafc-2c02fff2fff6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41787", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lfpil4vty725", "content": "", "creation_timestamp": "2025-01-14T14:47:01.583123Z"}, {"uuid": "9567e05a-8f2b-4683-8125-a37fe4a8598a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41787", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113804382326937214", "content": "", "creation_timestamp": "2025-01-10T13:51:05.869507Z"}, {"uuid": "4b143c13-d372-4773-acbe-8213f5cbf0a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41787", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lffexntjaa27", "content": "", "creation_timestamp": "2025-01-10T14:15:49.700308Z"}, {"uuid": "ef93fad0-4e07-4a1b-90f9-077c94d16868", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41787", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lffgjv4lyf2q", "content": "", "creation_timestamp": "2025-01-10T14:43:54.742573Z"}, {"uuid": "9c1641cb-3854-422d-8030-bf9b51009316", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41787", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113804607407967048", "content": "", "creation_timestamp": "2025-01-10T14:48:25.556531Z"}, {"uuid": "402cbbcf-3707-497f-a187-1e3cb836b41e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41787", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lfog2vy3u22n", "content": "", "creation_timestamp": "2025-01-14T04:29:33.983538Z"}, {"uuid": "c5383f7b-7bb2-410a-9033-1c00fa4fa368", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41780", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113764946096800836", "content": "", "creation_timestamp": "2025-01-03T14:41:55.755749Z"}, {"uuid": "d01232d1-3803-4c37-a6f6-ddf2db4f3e0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41780", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3letuztmdua2a", "content": "", "creation_timestamp": "2025-01-03T15:15:27.190383Z"}, {"uuid": "a9b1c440-f3a3-4de5-9181-c99493a439a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41780", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3letx3qfudq2q", "content": "", "creation_timestamp": "2025-01-03T15:52:54.308019Z"}, {"uuid": "91c791ef-e1c4-410a-84de-53545a9d497c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41787", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113805204077994733", "content": "", "creation_timestamp": "2025-01-10T17:20:03.592390Z"}, {"uuid": "2d6426ac-67b5-4c0d-bf52-c8eeca65d1eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41787", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lg2rq4bpw62a", "content": "", "creation_timestamp": "2025-01-19T02:30:09.807601Z"}, {"uuid": "632b0242-6e96-44cb-9f3b-b6b00bdb2b4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41783", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113855627790923402", "content": "", "creation_timestamp": "2025-01-19T15:03:28.528936Z"}, {"uuid": "e4e87be2-f80e-40f7-a15c-12ee615d5bae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41783", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lg44j6pr6u2j", "content": "", "creation_timestamp": "2025-01-19T15:15:47.726569Z"}, {"uuid": "291ef5bd-8760-4058-a067-6d214bb13366", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41783", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lg463srzt72e", "content": "", "creation_timestamp": "2025-01-19T15:44:07.739541Z"}, {"uuid": "b1829785-1cdd-4567-91f3-e2592b0b049b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41783", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lg463szjhw2g", "content": "", "creation_timestamp": "2025-01-19T15:44:08.796139Z"}, {"uuid": "ba3b3e4b-37f7-472e-8fe1-a15de1645597", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41783", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113855805881284829", "content": "", "creation_timestamp": "2025-01-19T15:48:46.863930Z"}, {"uuid": "eddeba05-d3c0-4cc8-aeaa-0df18485c225", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41783", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lg4snin6wt2w", "content": "", "creation_timestamp": "2025-01-19T21:51:55.789280Z"}, {"uuid": "b3bbcdc0-ca43-4bda-848b-275e7c3c27e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41783", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lg5ft2jk3k2x", "content": "", "creation_timestamp": "2025-01-20T03:35:03.234717Z"}, {"uuid": "5a0af312-5031-4134-a706-86fba4114a32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41783", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lg6i3m4a442w", "content": "", "creation_timestamp": "2025-01-20T13:48:17.864702Z"}, {"uuid": "d0d11240-3166-4fba-a54b-e81285017a10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41788", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114302182887957656", "content": "", "creation_timestamp": "2025-04-08T11:48:18.727838Z"}, {"uuid": "0606402e-4db1-40f5-8cc1-44d054cd376e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41789", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114302182917304100", "content": "", "creation_timestamp": "2025-04-08T11:48:19.365615Z"}, {"uuid": "0ba643aa-446e-49d6-9cdd-7a59c90b004a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41789", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmcgsna4ty2c", "content": "", "creation_timestamp": "2025-04-08T12:07:10.546587Z"}, {"uuid": "026854c7-4c21-4634-a72f-24f29c626561", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41788", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmcgsnjiva2b", "content": "", "creation_timestamp": "2025-04-08T12:07:11.196761Z"}, {"uuid": "58db9a83-7cfc-498c-8d5f-cc6669661928", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41788", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10889", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41788\n\ud83d\udd25 CVSS Score: 9.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices does not sanitize the input parameters in specific GET requests. This could allow an authenticated remote attacker to execute arbitrary code with root privileges.\n\ud83d\udccf Published: 2025-04-08T08:22:00.872Z\n\ud83d\udccf Modified: 2025-04-08T08:22:00.872Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-187636.html", "creation_timestamp": "2025-04-08T08:46:57.000000Z"}, {"uuid": "d60e0605-73fa-422f-b08d-5bb9496a5b42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41788", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lmc6m5lfpw2w", "content": "", "creation_timestamp": "2025-04-08T09:40:22.952306Z"}, {"uuid": "8befb4a6-5ced-45f8-919e-416fca088992", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41789", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lmc6m6o7jz2h", "content": "", "creation_timestamp": "2025-04-08T09:40:24.229093Z"}, {"uuid": "3b92748f-f59d-4f8e-b9a6-64fe1b8b2da6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41788", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-06", "content": "", "creation_timestamp": "2025-04-10T10:00:00.000000Z"}, {"uuid": "623ed39f-6132-4c07-90d6-2c14709c451a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41789", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-06", "content": "", "creation_timestamp": "2025-04-10T10:00:00.000000Z"}, {"uuid": "eb9c9cb1-1b13-4cde-8786-1839ea1c3d9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41787", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1132", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41787\n\ud83d\udd39 Description: IBM Engineering Requirements Management DOORS Next 7.0.2 and 7.0.3 could allow a remote attacker to bypass security restrictions, caused by a race condition. By sending a specially crafted request, an attacker could exploit this vulnerability to remotely execute code.\n\ud83d\udccf Published: 2025-01-10T13:18:51.866Z\n\ud83d\udccf Modified: 2025-01-10T13:18:51.866Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7180636", "creation_timestamp": "2025-01-10T14:05:35.000000Z"}, {"uuid": "b2c2b407-474b-44d6-af24-5c6ffb94f915", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41783", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2351", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41783\n\ud83d\udd39 Description: IBM Sterling Secure Proxy 6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, 6.1.0.0, and 6.2.0.0 could allow a privileged user to inject commands into the underlying operating system due to improper validation of a specified type of input.\n\ud83d\udccf Published: 2025-01-19T14:58:21.249Z\n\ud83d\udccf Modified: 2025-01-19T14:58:21.249Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7176189", "creation_timestamp": "2025-01-19T15:58:33.000000Z"}, {"uuid": "6496c048-b6f6-495d-937d-d429ca737f30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41788", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114308206326034766", "content": "", "creation_timestamp": "2025-04-09T13:20:09.154746Z"}, {"uuid": "dcf60252-da06-48cd-a688-21a9727793d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41789", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114308206326034766", "content": "", "creation_timestamp": "2025-04-09T13:20:09.238578Z"}, {"uuid": "faef8b32-b58c-49c8-ae1f-1f397895c89b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41789", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10888", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41789\n\ud83d\udd25 CVSS Score: 9.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices does not sanitize the language parameter in specific POST requests. This could allow an authenticated remote attacker to execute arbitrary code with root privileges.\n\ud83d\udccf Published: 2025-04-08T08:22:02.733Z\n\ud83d\udccf Modified: 2025-04-08T08:22:02.733Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-187636.html", "creation_timestamp": "2025-04-08T08:46:53.000000Z"}, {"uuid": "b7fbee0b-2a12-4489-880d-776fba4edda9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41783", "type": "seen", "source": "https://t.me/cvedetector/15867", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41783 - IBM Sterling Secure Proxy OS Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41783 \nPublished : Jan. 19, 2025, 3:15 p.m. | 36\u00a0minutes ago \nDescription : IBM Sterling Secure Proxy 6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, 6.1.0.0, and 6.2.0.0 could allow a privileged user to inject commands into the underlying operating system due to improper validation of a specified type of input. \nSeverity: 9.1 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-19T17:19:35.000000Z"}, {"uuid": "685d4657-b0ad-4420-b280-6e6319a2446e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41787", "type": "seen", "source": "https://t.me/CyberBulletin/2070", "content": "\u26a1\ufe0fCVE-2024-41787 (CVSS 9.8): Critical IBM DOORS Next Flaw Enables Remote Code Execution.\n\n#CyberBulletin", "creation_timestamp": "2025-01-14T12:39:13.000000Z"}, {"uuid": "cce8ed3c-4d9d-4bca-92f5-92b134c805b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41780", "type": "seen", "source": "https://t.me/cvedetector/14218", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41780 - IBM Jazz Foundation Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41780 \nPublished : Jan. 3, 2025, 3:15 p.m. | 36\u00a0minutes ago \nDescription : IBM Jazz Foundation 7.0.2, 7.0.3, and 7.1.0 could   \n  \ncould allow a physical user to obtain sensitive information due to not masking passwords during entry. \nSeverity: 4.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-03T17:01:16.000000Z"}, {"uuid": "713a3c2d-6c1b-4e71-8eab-4a604bc188f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41787", "type": "seen", "source": "https://t.me/cvedetector/14958", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41787 - IBM Engineering Requirements Management DOORS Next Remote Code Execution (RCE)\", \n  \"Content\": \"CVE ID : CVE-2024-41787 \nPublished : Jan. 10, 2025, 2:15 p.m. | 35\u00a0minutes ago \nDescription : IBM Engineering Requirements Management DOORS Next 7.0.2 and 7.0.3 could allow a remote attacker to bypass security restrictions, caused by a race condition. By sending a specially crafted request, an attacker could exploit this vulnerability to remotely execute code. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-10T16:20:26.000000Z"}, {"uuid": "d658ce0f-fa2d-4767-8486-2d28a2260232", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41785", "type": "seen", "source": "https://t.me/cvedetector/11079", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41785 - IBM Concert Software Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41785 \nPublished : Nov. 15, 2024, 3:15 p.m. | 21\u00a0minutes ago \nDescription : IBM Concert Software 1.0.0 through 1.0.1 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-15T16:36:37.000000Z"}]}