{"vulnerability": "cve-2024-4069", "sightings": [{"uuid": "1bf1c93a-0a06-4230-b4a7-7e8db8e3c885", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40691", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113589919639009226", "content": "", "creation_timestamp": "2024-12-03T16:50:23.822750Z"}, {"uuid": "f1b1544a-b8d0-428f-bb83-cb791dcaaab0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40695", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113685460387605959", "content": "", "creation_timestamp": "2024-12-20T13:47:40.075667Z"}, {"uuid": "e7cfb435-e95a-466c-a38e-89914bb15e1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40695", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldql6hmenh2s", "content": "", "creation_timestamp": "2024-12-20T14:15:55.413090Z"}, {"uuid": "c41ece25-56c5-486c-9ece-0f20da997e38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40693", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113884039293462758", "content": "", "creation_timestamp": "2025-01-24T15:28:53.682312Z"}, {"uuid": "b7085e0c-bbe9-492e-be1d-b6b78f5be30d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-40690", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3m7chmesi4a2g", "content": "", "creation_timestamp": "2025-12-06T07:20:15.776328Z"}, {"uuid": "fc8cacc5-b3e9-44fe-96e2-baf70c71870a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40693", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113884352540988302", "content": "", "creation_timestamp": "2025-01-24T16:48:35.136585Z"}, {"uuid": "094d47e5-9337-4734-bbd0-f15850c8c8d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40693", "type": "seen", "source": "https://t.me/cvedetector/16299", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40693 - IBM Planning Analytics RCE through Malicious File Upload\", \n  \"Content\": \"CVE ID : CVE-2024-40693 \nPublished : Jan. 24, 2025, 4:15 p.m. | 22\u00a0minutes ago \nDescription : IBM Planning Analytics 2.0 and 2.1 could be vulnerable to malicious file upload by not validating the content of the file uploaded to the web interface. Attackers can make use of this weakness and upload malicious executable files into the system, and it can be sent to victim for performing further attacks. \nSeverity: 8.0 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T17:45:18.000000Z"}, {"uuid": "be1e7d54-3478-44c3-bb1b-e9a647fe6782", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40696", "type": "seen", "source": "https://t.me/cvedetector/16975", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40696 - IBM Sterling B2B Integrator XSS Injection\", \n  \"Content\": \"CVE ID : CVE-2024-40696 \nPublished : Jan. 31, 2025, 4:15 p.m. | 1\u00a0hour, 46\u00a0minutes ago \nDescription : IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.3 Standard Edition is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-31T19:34:37.000000Z"}, {"uuid": "cad3e47c-6caf-4c64-8d90-522a3df386e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40691", "type": "seen", "source": "https://t.me/cvedetector/11906", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40691 - IBM Cognos Controller 11.0.0 and 11.0.1 could be\", \n  \"Content\": \"CVE ID : CVE-2024-40691 \nPublished : Dec. 3, 2024, 5:15 p.m. | 2\u00a0hours ago \nDescription : IBM Cognos Controller 11.0.0 and 11.0.1   \n  \ncould be vulnerable to malicious file upload by not validating the content of the file uploaded to the web interface. Attackers can make use of this weakness and upload malicious executable files into the system, and it can be sent to victim for performing further attacks. \nSeverity: 8.0 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-03T20:40:55.000000Z"}, {"uuid": "49c308df-9de0-45b6-a786-a244679354c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40690", "type": "seen", "source": "https://t.me/cvedetector/785", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40690 - IBM InfoSphere Server 11.7 is vulnerable to cross-\", \n  \"Content\": \"CVE ID : CVE-2024-40690 \nPublished : July 12, 2024, 6:15 p.m. | 36\u00a0minutes ago \nDescription : IBM InfoSphere Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.  IBM X-Force ID:  297720. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-12T21:07:35.000000Z"}, {"uuid": "d963efb3-c0f9-4f1e-88f2-adff49517b1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40696", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lh2fhwcpev2e", "content": "", "creation_timestamp": "2025-01-31T16:16:01.135801Z"}, {"uuid": "6c5b1504-88f5-4b4a-9e00-67784b9b02a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40696", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lh2qmghpco2h", "content": "", "creation_timestamp": "2025-01-31T19:35:25.810365Z"}, {"uuid": "8329a779-c606-4360-bbd9-7bc329176de4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40695", "type": "seen", "source": "https://t.me/cvedetector/13433", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40695 - IBM Cognos Analytics File Upload Vulnerability (Remote Code Execution)\", \n  \"Content\": \"CVE ID : CVE-2024-40695 \nPublished : Dec. 20, 2024, 2:15 p.m. | 30\u00a0minutes ago \nDescription : IBM Cognos Analytics 11.2.0 through 11.2.4 FP4 and   \n  \n12.0.0 through 12.0.4  \n  \n  \n  \ncould be vulnerable to malicious file upload by not validating the content of the file uploaded to the web interface. Attackers can make use of this weakness and upload malicious executable files into the system, and it can be sent to victim for performing further attacks. \nSeverity: 8.0 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-20T15:54:47.000000Z"}, {"uuid": "57b0e86e-029c-41f6-b6e9-3acd214a8763", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40697", "type": "seen", "source": "https://t.me/cvedetector/2997", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40697 - IBM Common Licensing Weak Password Enforcement\", \n  \"Content\": \"CVE ID : CVE-2024-40697 \nPublished : Aug. 13, 2024, 11:15 a.m. | 26\u00a0minutes ago \nDescription : IBM Common Licensing 9.0 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts.  IBM X-Force ID:  297895. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-13T13:45:59.000000Z"}]}