{"vulnerability": "cve-2024-4070", "sightings": [{"uuid": "3d71c95a-4bbc-49cd-a283-d06951518f9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40702", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf63tg2uzf2r", "content": "", "creation_timestamp": "2025-01-07T16:43:47.992316Z"}, {"uuid": "c8acfc4f-9a77-4e41-8242-fc075ea64062", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40702", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113788094631140974", "content": "", "creation_timestamp": "2025-01-07T16:48:54.630082Z"}, {"uuid": "1ca0b7b1-50e1-4d5b-a9f3-377cc5663cd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40702", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf62bwcj5p2l", "content": "", "creation_timestamp": "2025-01-07T16:16:04.491416Z"}, {"uuid": "fc03894c-5b86-42ff-9ed2-b7a413dad050", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40700", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113947540020210559", "content": "", "creation_timestamp": "2025-02-04T20:37:57.801363Z"}, {"uuid": "ba1c94aa-6cfb-4633-ad0e-b568b90b4bd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40700", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhey3rzjrq2f", "content": "", "creation_timestamp": "2025-02-04T21:15:52.459447Z"}, {"uuid": "aee86654-4ce9-47c4-a8b1-4814e5fb3e85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40706", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113884039307944877", "content": "", "creation_timestamp": "2025-01-24T15:28:53.896857Z"}, {"uuid": "2cbaf76a-7c05-46df-b83d-60d021979fc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40700", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5052", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-40700\n\ud83d\udd25 CVSS Score: 6.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: IBM Security Verify Access Appliance and Container 10.0.0 through 10.0.8 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.\n\ud83d\udccf Published: 2025-02-04T20:36:10.138Z\n\ud83d\udccf Modified: 2025-02-22T20:57:09.499Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7182386", "creation_timestamp": "2025-02-22T21:25:52.000000Z"}, {"uuid": "a7a0038b-9aaf-4854-8868-ce16a41fa6a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40709", "type": "seen", "source": "https://t.me/cvedetector/5054", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40709 - CloudLinux Privilege Escalation Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-40709 \nPublished : Sept. 7, 2024, 5:15 p.m. | 41\u00a0minutes ago \nDescription : A missing authorization vulnerability allows a local low-privileged user on the machine to escalate their privileges to root level. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-07T20:11:09.000000Z"}, {"uuid": "896c8e52-4628-4650-ac6d-536a1563bf0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40700", "type": "seen", "source": "https://t.me/cvedetector/17254", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40700 - IBM Security Verify Access Appliance and Container Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-40700 \nPublished : Feb. 4, 2025, 9:15 p.m. | 2\u00a0hours, 7\u00a0minutes ago \nDescription : IBM Security Verify Access Appliance and Container 10.0.0 through 10.0.8 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-05T00:45:58.000000Z"}, {"uuid": "39d5e156-0b89-4fd8-a593-3db1f8117399", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40703", "type": "seen", "source": "https://t.me/cvedetector/6159", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40703 - IBM Cognos Analytics Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-40703 \nPublished : Sept. 22, 2024, 1:15 p.m. | 36\u00a0minutes ago \nDescription : IBM Cognos Analytics 11.2.0, 11.2.1, 11.2.2, 11.2.3, 11.2.4, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and IBM Cognos Analytics Reports for iOS 11.0.0.7 could allow a local attacker to obtain sensitive information in the form of an API key.  An attacker could use this information to launch further attacks against affected applications. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-22T16:04:12.000000Z"}, {"uuid": "482f68e0-b701-4932-9fd0-388fb1a2c035", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40700", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhf3uwxqrn2u", "content": "", "creation_timestamp": "2025-02-04T22:23:45.623822Z"}, {"uuid": "49bc436e-0c9c-495d-801e-c496bf985d87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40706", "type": "seen", "source": "https://t.me/cvedetector/16300", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40706 - IBM InfoSphere Information Server Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-40706 \nPublished : Jan. 24, 2025, 4:15 p.m. | 22\u00a0minutes ago \nDescription : IBM InfoSphere Information Server 11.7 could allow a remote user to obtain sensitive version information that could aid in further attacks against the system. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T17:45:19.000000Z"}]}