{"vulnerability": "CVE-2024-5290", "sightings": [{"uuid": "ab67291a-9b64-4b73-bc2c-cd7ff2952938", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52901", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113640722362423179", "content": "", "creation_timestamp": "2024-12-12T16:10:11.986648Z"}, {"uuid": "68b97b2c-4c1b-43ae-b646-395e37b4c99e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52906", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113714038274745724", "content": "", "creation_timestamp": "2024-12-25T14:55:24.220900Z"}, {"uuid": "87a5578a-44d4-4962-979b-e8f48db79090", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52906", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3le5atrc4ce2i", "content": "", "creation_timestamp": "2024-12-25T15:15:34.832118Z"}, {"uuid": "407396f7-18b4-4f7c-9e55-02c08e3fe0a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52903", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo5q5chown2h", "content": "", "creation_timestamp": "2025-05-02T02:01:26.223732Z"}, {"uuid": "a15b23a9-a55a-45e4-8f23-7d16e9ef0d06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52902", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lik6ncixsp2m", "content": "", "creation_timestamp": "2025-02-19T16:21:33.101815Z"}, {"uuid": "c0fc79b4-3e10-46ae-8977-be37ad079e34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52902", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114031810136644375", "content": "", "creation_timestamp": "2025-02-19T17:49:02.459819Z"}, {"uuid": "99d8ef96-9641-4744-b539-9cba5c23f0fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52905", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lk2cvzvlzd2e", "content": "", "creation_timestamp": "2025-03-10T19:45:49.964521Z"}, {"uuid": "03d80ed2-049f-41e5-9e60-fd2a54aaaf22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52903", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14416", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52903\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: IBM Db2 for Linux, UNIX and Windows 12.1.0 and 12.1.1 is vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query.\n\ud83d\udccf Published: 2025-05-01T22:15:48.366Z\n\ud83d\udccf Modified: 2025-05-01T22:15:48.366Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7232336", "creation_timestamp": "2025-05-01T23:17:59.000000Z"}, {"uuid": "9dd9c4a1-703d-4d67-b7f9-e45f80097213", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52900", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsne2ph7g725", "content": "", "creation_timestamp": "2025-06-28T04:48:27.223896Z"}, {"uuid": "7689fbb4-eda5-42b7-b229-3e655fdfcb20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52902", "type": "seen", "source": "MISP/9ca82492-7deb-4197-a6f1-191e121eef96", "content": "", "creation_timestamp": "2025-08-25T13:32:05.000000Z"}, {"uuid": "1f72da3f-3352-4e42-8a85-fd826afaf0b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52902", "type": "seen", "source": "https://t.me/cvedetector/18445", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52902 - IBM Cognos Controller Hardcoded Database Password Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52902 \nPublished : Feb. 19, 2025, 3:15 p.m. | 1\u00a0hour, 14\u00a0minutes ago \nDescription : IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 client application contains hard coded database passwords in source code which could be used for unauthorized access to the system. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-19T17:54:23.000000Z"}, {"uuid": "5636657b-5421-45af-bb3b-822b06f4a36d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52905", "type": "seen", "source": "https://t.me/cvedetector/19967", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52905 - IBM Sterling B2B Integrator Privilege Escalation Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-52905 \nPublished : March 10, 2025, 4:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.3 could disclose sensitive database information to a privileged user. \nSeverity: 2.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T19:02:32.000000Z"}, {"uuid": "179b7f48-d074-4858-9c57-3a964c15e400", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52900", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19797", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52900\n\ud83d\udd25 CVSS Score: 6.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: IBM Cognos Analytics 11.2.0 through 12.2.4 Fix Pack 5 and 12.0.0 through 12.0.4 is vulnerable to stored cross-site scripting. This vulnerability allows authenticated users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.\n\ud83d\udccf Published: 2025-06-28T00:59:23.758Z\n\ud83d\udccf Modified: 2025-06-28T00:59:23.758Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7238163", "creation_timestamp": "2025-06-28T01:51:11.000000Z"}, {"uuid": "5306fab2-d61f-4022-a0c7-ebc1c51b3e69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52905", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7010", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-52905\n\ud83d\udd25 CVSS Score: 2.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.3 could disclose sensitive database information to a privileged user.\n\ud83d\udccf Published: 2025-03-10T16:05:13.550Z\n\ud83d\udccf Modified: 2025-03-10T16:31:09.992Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7185264", "creation_timestamp": "2025-03-10T16:38:03.000000Z"}, {"uuid": "914a1245-89d4-4efd-bf9b-b6ee8b72a009", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5290", "type": "published-proof-of-concept", "source": "Telegram/Emfos1B_ry778nZeLXZUQDUE4A45ZiVElYgXfAdoaC3h9SE", "content": "", "creation_timestamp": "2025-02-06T20:00:07.000000Z"}, {"uuid": "4519aea5-0b8d-4c33-9b7d-aaa6e641ee41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52906", "type": "seen", "source": "https://t.me/cvedetector/13627", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52906 - IBM AIX TCP/IP Kernel Extension DoS\", \n  \"Content\": \"CVE ID : CVE-2024-52906 \nPublished : Dec. 25, 2024, 3:15 p.m. | 41\u00a0minutes ago \nDescription : IBM AIX\u00a07.2, 7.3, VIOS 3.1, and 4.1  \n  \n  \n  \ncould allow a non-privileged local user to exploit a vulnerability in the TCP/IP kernel extension to cause a denial of service. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-25T17:09:26.000000Z"}, {"uuid": "b28d8de7-7758-46f3-99a1-e13b94a7b3b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5290", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/9240", "content": "\u200aCVE-2024-5290: Wi-Fi Flaw Leaves Millions Vulnerable to Root Takeover\n\nhttps://securityonline.info/cve-2024-5290-wi-fi-flaw-leaves-millions-vulnerable-to-root-takeover/", "creation_timestamp": "2024-08-10T21:41:30.000000Z"}, {"uuid": "9a35ea1e-ab58-407f-adbe-520b571a6a1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5290", "type": "published-proof-of-concept", "source": "Telegram/tROXu-VoDvIGOcLcpszl-EBZ8Ot5WUMl6WIZHqWkyLe8WA0", "content": "", "creation_timestamp": "2025-02-05T10:00:06.000000Z"}, {"uuid": "99b74fb8-b439-4828-8e57-c691da3b590f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52901", "type": "seen", "source": "https://t.me/cvedetector/12798", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52901 - IBM InfoSphere Information Server Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-52901 \nPublished : Dec. 12, 2024, 4:15 p.m. | 44\u00a0minutes ago \nDescription : IBM InfoSphere Information Server 11.7 could allow an authenticated user to GUI to not load or stop working due to improper input validation. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T18:01:13.000000Z"}, {"uuid": "54c49ba4-e239-4580-8fa9-6c1a649a73ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5290", "type": "seen", "source": "https://t.me/cvedetector/2676", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5290 - Ubuntu wpa_supplicant Shared Object Loading Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-5290 \nPublished : Aug. 7, 2024, 9:16 a.m. | 35\u00a0minutes ago \nDescription : An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root).  \n  \n  \n  \n  \nMembership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-07T11:57:12.000000Z"}, {"uuid": "86928197-42f7-4c22-887c-a6b73ab7afe6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-52903", "type": "seen", "source": "https://t.me/cvedetector/24293", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52903 - IBM Db2 Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-52903 \nPublished : May 1, 2025, 11:15 p.m. | 1\u00a0hour, 27\u00a0minutes ago \nDescription : IBM Db2 for Linux, UNIX and Windows 12.1.0 and 12.1.1 is vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-02T03:23:40.000000Z"}]}