{"vulnerability": "cve-2024-2876", "sightings": [{"uuid": "fe547a32-3fd4-4396-94c6-15be401ba4d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28767", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldql6f2qpi2t", "content": "", "creation_timestamp": "2024-12-20T14:15:51.932610Z"}, {"uuid": "aea0a376-973e-4fed-bdd9-617e7b5df811", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28766", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgp5aps4642b", "content": "", "creation_timestamp": "2025-01-27T04:49:34.010367Z"}, {"uuid": "5307492d-1f82-4a75-9e93-bc2c429a8568", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2876", "type": "published-proof-of-concept", "source": "Telegram/qkfgcHQOSUZXCdQ6LAgeSRS2mThTB4H-IpnfrNce9Xg3rFi-", "content": "", "creation_timestamp": "2025-08-10T09:13:30.000000Z"}, {"uuid": "8d6ddf17-0090-4801-9d0d-53c09a60120d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2876", "type": "published-proof-of-concept", "source": "Telegram/cAqJKbTYSmKI7YlHduoJ3o2zB8v7c8VqMqTnDXV4VgmaFDJf", "content": "", "creation_timestamp": "2025-08-10T09:08:03.000000Z"}, {"uuid": "3d53055d-4778-4325-85aa-9f6af6f8c327", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2876", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7166", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aBlind SQLi exploit for CVE-2024-2876. a vulnerability effecting the Icegram express - Email subscribers plugin for wordpress.\nURL\uff1ahttps://github.com/c0d3zilla/CVE-2024-2876\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-25T06:28:44.000000Z"}, {"uuid": "39bf1a01-7b31-4d93-a5ed-883e757612a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28761", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7444", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-28761\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: IBM App Connect Enterprise 11.0.0.1 through 11.0.0.25 and 12.0.1.0 through 12.0.12.0 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site.  IBM X-Force ID:  285245.\n\ud83d\udccf Published: 2024-05-11T12:57:59.134Z\n\ud83d\udccf Modified: 2025-03-13T17:33:41.765Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7150847\n2. https://exchange.xforce.ibmcloud.com/vulnerabilities/285245", "creation_timestamp": "2025-03-13T17:44:58.000000Z"}, {"uuid": "54588e43-f723-41e4-9faf-4da807d16000", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2876", "type": "published-proof-of-concept", "source": "Telegram/JMUd3FPMs2TPsU5EXwFovQomDT77XgngoIxNMPCZzCk0Ds-s", "content": "", "creation_timestamp": "2025-08-10T09:13:29.000000Z"}, {"uuid": "ad269faa-f640-4b07-a66e-0cfdc5b612b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2876", "type": "published-proof-of-concept", "source": "Telegram/W2nN9Sn0YqrNWXQIe6lQpaEOz_VbvCiqt0m8ku6TuDqC7iBw", "content": "", "creation_timestamp": "2025-08-10T09:08:01.000000Z"}, {"uuid": "2f7ababf-b8ba-44dd-ac61-1e9ae8f63613", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28766", "type": "seen", "source": "https://t.me/cvedetector/16426", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-28766 - IBM Security Directory Integrator Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-28766 \nPublished : Jan. 27, 2025, 2:15 a.m. | 2\u00a0hours, 7\u00a0minutes ago \nDescription : IBM Security Directory Integrator 7.2.0 and IBM Security Verify Directory Integrator 10.0.0 could disclose sensitive information about directory contents that could aid in further attacks against the system. \nSeverity: 2.4 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-27T05:57:17.000000Z"}, {"uuid": "7b718eb5-cb2c-4fba-8db4-a64c545ce3b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2876", "type": "published-proof-of-concept", "source": "Telegram/B-OuGM5cX9PQuFIdOZSbW1wOCJgotvT7LCuLGfsVtbeCVZJZ", "content": "", "creation_timestamp": "2025-08-10T14:31:00.000000Z"}, {"uuid": "28acac93-46d9-4030-81a6-35b6ac44bab3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2876", "type": "published-proof-of-concept", "source": "Telegram/WjqaIa9FS-ovq43wqLVi2t6w1wgntrCORhbCdky7crVkSMbA", "content": "", "creation_timestamp": "2025-08-10T14:34:10.000000Z"}, {"uuid": "388de936-8830-41e2-b0da-18ad25206b36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2876", "type": "published-proof-of-concept", "source": "Telegram/vEi0qhhsBkAUjIiZxu8dnkoehKJYiZBFEe8uTWMFxGz90ugf", "content": "", "creation_timestamp": "2025-08-10T14:30:57.000000Z"}, {"uuid": "8d5dc9b6-e339-4036-95e4-b3e00ca34262", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28767", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113685486358339675", "content": "", "creation_timestamp": "2024-12-20T13:54:16.258064Z"}, {"uuid": "f14dff97-1c32-4a9d-b79b-e9e19925c326", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28766", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113897724767564233", "content": "", "creation_timestamp": "2025-01-27T01:29:17.539846Z"}, {"uuid": "e0f73a3f-d027-455b-a866-95c970f23820", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2876", "type": "seen", "source": "https://t.me/GithubRedTeam/9046", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aWP-SQL-Injection CVE-2024-2876 AND 2024-CVE-2024-3495\nURL\uff1ahttps://github.com/issamiso/CVE-2024-2876\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-11-16T01:22:54.000000Z"}, {"uuid": "09a4226a-ccd6-4745-8d9a-bb5c5245238f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2876", "type": "published-proof-of-concept", "source": "Telegram/0QQldjiQ-cFDcG3zSyGZWxnyy0QQ1txsKbeGg3olaxKMW5wh", "content": "", "creation_timestamp": "2025-08-10T09:13:29.000000Z"}, {"uuid": "5cb5736a-32c2-4bbc-8793-bec0287e54ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2876", "type": "published-proof-of-concept", "source": "Telegram/t2k4qjNB58j3JG00UJ_1jx2NiNf0gAJ9IbFbgUFexFNlVcbz", "content": "", "creation_timestamp": "2025-08-10T09:08:01.000000Z"}, {"uuid": "ef908c06-369e-428b-98f9-305d699a4e9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2876", "type": "published-proof-of-concept", "source": "Telegram/wTcX0KRLbxT41oZ6dec0L2a8d384XjS--YfyyQ_7mszrPKBa", "content": "", "creation_timestamp": "2025-08-10T14:34:11.000000Z"}, {"uuid": "0c6eaf3e-33ce-4299-8645-12765c55b6f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2876", "type": "published-proof-of-concept", "source": "Telegram/Q8uuswP70QlMlMFU0tweC0uwluI0meJF3bsuMFRoK_-KqTJ6", "content": "", "creation_timestamp": "2025-08-10T14:30:58.000000Z"}, {"uuid": "6cdc756e-d93f-4126-bbbe-01a083eb07c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2876", "type": "published-proof-of-concept", "source": "Telegram/Buw0Fvngmyj0zcrbSkhC22OmgiemTTj-jfRazE8aiwXyL4FC", "content": "", "creation_timestamp": "2025-06-21T15:46:16.000000Z"}, {"uuid": "3f191ea6-cbb0-414b-bca6-7cd8deb3f45a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28767", "type": "seen", "source": "https://t.me/cvedetector/13434", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-28767 - IBM Security Directory Integrator Arbitrary Command Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-28767 \nPublished : Dec. 20, 2024, 2:15 p.m. | 30\u00a0minutes ago \nDescription : IBM Security Directory Integrator 7.2.0 through 7.2.0.13 and 10.0.0 through 10.0.3 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-20T15:54:48.000000Z"}, {"uuid": "234f0f80-b4ba-4c2b-81d2-c1dc763c72f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28766", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgouno4n6c2i", "content": "", "creation_timestamp": "2025-01-27T02:15:43.842881Z"}, {"uuid": "1ca341e3-7cf4-4172-8a38-1451cbbc8194", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28766", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3154", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-jhj5-wgm2-6mqf\n\ud83d\udd25 CVSS Score: 2.3 (CVSS_V3)\n\ud83d\udd39 Description: IBM Security Directory Integrator 7.2.0 and IBM Security Verify Directory Integrator 10.0.0 could disclose sensitive information about directory contents that could aid in further attacks against the system.\n\ud83d\udccf Published: 2025-01-27T03:30:26Z\n\ud83d\udccf Modified: 2025-01-27T03:30:26Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-28766\n2. https://www.ibm.com/support/pages/node/7161444", "creation_timestamp": "2025-01-27T04:07:36.000000Z"}, {"uuid": "94f9260b-84ed-4473-a80e-144139851a02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2876", "type": "published-proof-of-concept", "source": "Telegram/zgEhNQe2b0I72P9LRtUE2ufSpxMLoG_NjZsbzG0ZmKwqFcM", "content": "", "creation_timestamp": "2025-06-22T00:37:41.000000Z"}, {"uuid": "cd32cac6-ed5f-4670-89fd-d4cdd2ebb998", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2876", "type": "published-proof-of-concept", "source": "Telegram/ZFLF7WQaRiSWKNuB3dr5kDrC90j-V6c5hWqui2boQpb17jI", "content": "", "creation_timestamp": "2025-06-21T15:46:16.000000Z"}, {"uuid": "246e0dee-6cf9-4c53-9701-e15c346489eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2876", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1430", "content": "", "creation_timestamp": "2024-05-08T20:16:54.000000Z"}]}