{"vulnerability": "cve-2024-4508", "sightings": [{"uuid": "52bd4917-7200-4336-8aa1-bdad653764ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45081", "type": "seen", "source": "https://t.me/cvedetector/18467", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45081 - IBM Cognos Controller Insufficient Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45081 \nPublished : Feb. 19, 2025, 4:15 p.m. | 2\u00a0hours, 23\u00a0minutes ago \nDescription : IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0   \n  \n  \n  \ncould allow an authenticated user to modify restricted content due to incorrect authorization checks. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-19T20:25:13.000000Z"}, {"uuid": "6681307b-3e69-422b-a452-206c75bf1cca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45082", "type": "seen", "source": "https://t.me/cvedetector/13217", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45082 - IBM Cognos Analytics Open Redirect Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45082 \nPublished : Dec. 18, 2024, 5:15 p.m. | 25\u00a0minutes ago \nDescription : IBM Cognos Analytics\u00a011.2.0 through 11.2.4 and 12.0.0 through 12.0.3   \n  \ncould allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-18T18:42:50.000000Z"}, {"uuid": "9305ae9c-bd4b-4797-8e73-d18941ff1f32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45087", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113465418403471519", "content": "", "creation_timestamp": "2024-11-11T17:08:05.885161Z"}, {"uuid": "5bbc57cf-79e2-4e69-9890-4be5dbaec6d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45088", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113465169999475322", "content": "", "creation_timestamp": "2024-11-11T16:04:55.977271Z"}, {"uuid": "77f693c7-6986-49c3-ac2e-3ff52cc9da8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45084", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114031810247197260", "content": "", "creation_timestamp": "2025-02-19T17:49:03.725379Z"}, {"uuid": "c87e05eb-bf22-43ac-ad2a-70424091b949", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45084", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3likej6jhpq2c", "content": "", "creation_timestamp": "2025-02-19T18:06:37.279389Z"}, {"uuid": "fba30884-dfce-45ab-8a7b-5609a63b0ee8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45081", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3likej6wdxc2a", "content": "", "creation_timestamp": "2025-02-19T18:06:38.432338Z"}, {"uuid": "a51e419f-abac-412e-b7d7-30543b000e98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45084", "type": "seen", "source": "MISP/9ca82492-7deb-4197-a6f1-191e121eef96", "content": "", "creation_timestamp": "2025-08-25T13:32:05.000000Z"}, {"uuid": "25171399-82ca-4891-b02a-b7cd57d2008b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45081", "type": "seen", "source": "MISP/9ca82492-7deb-4197-a6f1-191e121eef96", "content": "", "creation_timestamp": "2025-08-25T13:32:05.000000Z"}, {"uuid": "3b650d19-1341-4a22-b597-2a3963015142", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45089", "type": "seen", "source": "https://t.me/cvedetector/16972", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45089 - IBM Sterling B2B Integrator EBICS Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-45089 \nPublished : Jan. 31, 2025, 4:15 p.m. | 1\u00a0hour, 46\u00a0minutes ago \nDescription : IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.3 Standard Edition EBICS server could allow an authenticated user to obtain sensitive filename information due to an observable discrepancy. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-31T19:34:35.000000Z"}, {"uuid": "063b6913-f299-4b92-b7ff-8876a9804965", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45087", "type": "seen", "source": "https://t.me/cvedetector/10515", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45087 - IBM WebSphere Application Server Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45087 \nPublished : Nov. 11, 2024, 5:15 p.m. | 16\u00a0minutes ago \nDescription : IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T18:36:58.000000Z"}, {"uuid": "bc916369-4081-4410-93e0-4d6c99d40b90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45088", "type": "seen", "source": "https://t.me/cvedetector/10511", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45088 - IBM Maximo Asset Management Stored Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2024-45088 \nPublished : Nov. 11, 2024, 4:15 p.m. | 25\u00a0minutes ago \nDescription : IBM Maximo Asset Management 7.6.1.3 is vulnerable to stored cross-site scripting. This vulnerability allows authenticated users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-11T17:46:45.000000Z"}, {"uuid": "bd457584-2617-42a1-bfa6-ed99cf83e7f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45085", "type": "seen", "source": "https://t.me/cvedetector/7982", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45085 - IBM WebSphere Application Server Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45085 \nPublished : Oct. 15, 2024, 10:15 p.m. | 44\u00a0minutes ago \nDescription : IBM WebSphere Application Server 8.5 is vulnerable to a denial of service, under certain configurations, caused by an unexpected specially crafted request. A remote attacker could exploit this vulnerability to cause an error resulting in a denial of service. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-16T01:18:43.000000Z"}, {"uuid": "11e246eb-f651-4431-9fa5-280df1ba9f07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45086", "type": "seen", "source": "https://t.me/cvedetector/9788", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45086 - IBM WebSphere Application Server XXE Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45086 \nPublished : Nov. 4, 2024, 8:15 p.m. | 40\u00a0minutes ago \nDescription : IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A privileged user could exploit this vulnerability to expose sensitive information or consume memory resources. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-04T21:58:26.000000Z"}, {"uuid": "61a12f5e-2d02-482a-a659-365c63618fe0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45082", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113674730848031945", "content": "", "creation_timestamp": "2024-12-18T16:19:00.915112Z"}, {"uuid": "f04065f2-3b5b-4bfb-95d0-e8811293d6d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45089", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lh2fhz3vcn2j", "content": "", "creation_timestamp": "2025-01-31T16:16:04.127545Z"}, {"uuid": "5f998f1d-53bc-49b8-875a-e2fd4de55a17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45089", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lh2qmgbcms2q", "content": "", "creation_timestamp": "2025-01-31T19:35:25.232768Z"}]}