{"vulnerability": "CVE-2024-41783", "sightings": [{"uuid": "632b0242-6e96-44cb-9f3b-b6b00bdb2b4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41783", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113855627790923402", "content": "", "creation_timestamp": "2025-01-19T15:03:28.528936Z"}, {"uuid": "e4e87be2-f80e-40f7-a15c-12ee615d5bae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41783", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lg44j6pr6u2j", "content": "", "creation_timestamp": "2025-01-19T15:15:47.726569Z"}, {"uuid": "291ef5bd-8760-4058-a067-6d214bb13366", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41783", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lg463srzt72e", "content": "", "creation_timestamp": "2025-01-19T15:44:07.739541Z"}, {"uuid": "b1829785-1cdd-4567-91f3-e2592b0b049b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41783", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lg463szjhw2g", "content": "", "creation_timestamp": "2025-01-19T15:44:08.796139Z"}, {"uuid": "ba3b3e4b-37f7-472e-8fe1-a15de1645597", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41783", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113855805881284829", "content": "", "creation_timestamp": "2025-01-19T15:48:46.863930Z"}, {"uuid": "eddeba05-d3c0-4cc8-aeaa-0df18485c225", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41783", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lg4snin6wt2w", "content": "", "creation_timestamp": "2025-01-19T21:51:55.789280Z"}, {"uuid": "b3bbcdc0-ca43-4bda-848b-275e7c3c27e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41783", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lg5ft2jk3k2x", "content": "", "creation_timestamp": "2025-01-20T03:35:03.234717Z"}, {"uuid": "5a0af312-5031-4134-a706-86fba4114a32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41783", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lg6i3m4a442w", "content": "", "creation_timestamp": "2025-01-20T13:48:17.864702Z"}, {"uuid": "b2c2b407-474b-44d6-af24-5c6ffb94f915", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41783", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2351", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41783\n\ud83d\udd39 Description: IBM Sterling Secure Proxy 6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, 6.1.0.0, and 6.2.0.0 could allow a privileged user to inject commands into the underlying operating system due to improper validation of a specified type of input.\n\ud83d\udccf Published: 2025-01-19T14:58:21.249Z\n\ud83d\udccf Modified: 2025-01-19T14:58:21.249Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7176189", "creation_timestamp": "2025-01-19T15:58:33.000000Z"}, {"uuid": "b7fbee0b-2a12-4489-880d-776fba4edda9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41783", "type": "seen", "source": "https://t.me/cvedetector/15867", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41783 - IBM Sterling Secure Proxy OS Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-41783 \nPublished : Jan. 19, 2025, 3:15 p.m. | 36\u00a0minutes ago \nDescription : IBM Sterling Secure Proxy 6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, 6.1.0.0, and 6.2.0.0 could allow a privileged user to inject commands into the underlying operating system due to improper validation of a specified type of input. \nSeverity: 9.1 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-19T17:19:35.000000Z"}]}