{"vulnerability": "cve-2024-4710", "sightings": [{"uuid": "dba20322-1110-4a28-a5b3-19de09469d47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47109", "type": "seen", "source": "https://t.me/cvedetector/19966", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47109 - IBM Sterling File Gateway Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-47109 \nPublished : March 10, 2025, 4:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : IBM Sterling File Gateway 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.3 UI could disclosure the installation path of the server which could aid in further attacks against the system. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T19:02:31.000000Z"}, {"uuid": "e5ff23c2-7319-46f1-9d40-7e909eee254b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47100", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1473", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47100\n\ud83d\udd39 Description: A vulnerability has been identified in SIMATIC S7-1200 CPU 1211C AC/DC/Rly (6ES7211-1BE40-0XB0), SIMATIC S7-1200 CPU 1211C DC/DC/DC (6ES7211-1AE40-0XB0), SIMATIC S7-1200 CPU 1211C DC/DC/Rly (6ES7211-1HE40-0XB0), SIMATIC S7-1200 CPU 1212C AC/DC/Rly (6ES7212-1BE40-0XB0), SIMATIC S7-1200 CPU 1212C DC/DC/DC (6ES7212-1AE40-0XB0), SIMATIC S7-1200 CPU 1212C DC/DC/Rly (6ES7212-1HE40-0XB0), SIMATIC S7-1200 CPU 1212FC DC/DC/DC (6ES7212-1AF40-0XB0), SIMATIC S7-1200 CPU 1212FC DC/DC/Rly (6ES7212-1HF40-0XB0), SIMATIC S7-1200 CPU 1214C AC/DC/Rly (6ES7214-1BG40-0XB0), SIMATIC S7-1200 CPU 1214C DC/DC/DC (6ES7214-1AG40-0XB0), SIMATIC S7-1200 CPU 1214C DC/DC/Rly (6ES7214-1HG40-0XB0), SIMATIC S7-1200 CPU 1214FC DC/DC/DC (6ES7214-1AF40-0XB0), SIMATIC S7-1200 CPU 1214FC DC/DC/Rly (6ES7214-1HF40-0XB0), SIMATIC S7-1200 CPU 1215C AC/DC/Rly (6ES7215-1BG40-0XB0), SIMATIC S7-1200 CPU 1215C DC/DC/DC (6ES7215-1AG40-0XB0), SIMATIC S7-1200 CPU 1215C DC/DC/Rly (6ES7215-1HG40-0XB0), SIMATIC S7-1200 CPU 1215FC DC/DC/DC (6ES7215-1AF40-0XB0), SIMATIC S7-1200 CPU 1215FC DC/DC/Rly (6ES7215-1HF40-0XB0), SIMATIC S7-1200 CPU 1217C DC/DC/DC (6ES7217-1AG40-0XB0), SIPLUS S7-1200 CPU 1212 AC/DC/RLY (6AG1212-1BE40-2XB0), SIPLUS S7-1200 CPU 1212 AC/DC/RLY (6AG1212-1BE40-4XB0), SIPLUS S7-1200 CPU 1212 DC/DC/RLY (6AG1212-1HE40-2XB0), SIPLUS S7-1200 CPU 1212 DC/DC/RLY (6AG1212-1HE40-4XB0), SIPLUS S7-1200 CPU 1212C DC/DC/DC (6AG1212-1AE40-2XB0), SIPLUS S7-1200 CPU 1212C DC/DC/DC (6AG1212-1AE40-4XB0), SIPLUS S7-1200 CPU 1212C DC/DC/DC RAIL (6AG2212-1AE40-1XB0), SIPLUS S7-1200 CPU 1214 AC/DC/RLY (6AG1214-1BG40-2XB0), SIPLUS S7-1200 CPU 1214 AC/DC/RLY (6AG1214-1BG40-4XB0), SIPLUS S7-1200 CPU 1214 AC/DC/RLY (6AG1214-1BG40-5XB0), SIPLUS S7-1200 CPU 1214 DC/DC/DC (6AG1214-1AG40-2XB0), SIPLUS S7-1200 CPU 1214 DC/DC/DC (6AG1214-1AG40-4XB0), SIPLUS S7-1200 CPU 1214 DC/DC/DC (6AG1214-1AG40-5XB0), SIPLUS S7-1200 CPU 1214 DC/DC/RLY (6AG1214-1HG40-2XB0), SIPLUS S7-1200 CPU 1214 DC/DC/RLY (6AG1214-1HG40-4XB0), SIPLUS S7-1200 CPU 1214 DC/DC/RLY (6AG1214-1HG40-5XB0), SIPLUS S7-1200 CPU 1214C DC/DC/DC RAIL (6AG2214-1AG40-1XB0), SIPLUS S7-1200 CPU 1214FC DC/DC/DC (6AG1214-1AF40-5XB0), SIPLUS S7-1200 CPU 1214FC DC/DC/RLY (6AG1214-1HF40-5XB0), SIPLUS S7-1200 CPU 1215 AC/DC/RLY (6AG1215-1BG40-2XB0), SIPLUS S7-1200 CPU 1215 AC/DC/RLY (6AG1215-1BG40-4XB0), SIPLUS S7-1200 CPU 1215 AC/DC/RLY (6AG1215-1BG40-5XB0), SIPLUS S7-1200 CPU 1215 DC/DC/DC (6AG1215-1AG40-2XB0), SIPLUS S7-1200 CPU 1215 DC/DC/DC (6AG1215-1AG40-4XB0), SIPLUS S7-1200 CPU 1215 DC/DC/RLY (6AG1215-1HG40-2XB0), SIPLUS S7-1200 CPU 1215 DC/DC/RLY (6AG1215-1HG40-4XB0), SIPLUS S7-1200 CPU 1215 DC/DC/RLY (6AG1215-1HG40-5XB0), SIPLUS S7-1200 CPU 1215C DC/DC/DC (6AG1215-1AG40-5XB0), SIPLUS S7-1200 CPU 1215FC DC/DC/DC (6AG1215-1AF40-5XB0). The web interface of the affected devices is vulnerable to Cross-Site Request Forgery (CSRF) attacks. This could allow an unauthenticated attacker to change the CPU mode by tricking a legitimate and authenticated user with sufficient permissions on the target CPU to click on a malicious link.\n\ud83d\udccf Published: 2025-01-14T10:30:11.506Z\n\ud83d\udccf Modified: 2025-01-14T10:30:11.506Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-717113.html", "creation_timestamp": "2025-01-14T11:08:20.000000Z"}, {"uuid": "d0226138-f1bd-4d00-a390-4f9d92b80d73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47103", "type": "seen", "source": "https://t.me/cvedetector/16968", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47103 - IBM Sterling B2B Integrator Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47103 \nPublished : Jan. 31, 2025, 4:15 p.m. | 1\u00a0hour, 46\u00a0minutes ago \nDescription : IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.3 Standard Edition is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-31T19:34:28.000000Z"}, {"uuid": "f6e4dec9-e500-484f-ba75-3496c45f607a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47107", "type": "seen", "source": "https://t.me/cvedetector/12328", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47107 - IBM QRadar SIEM Stored Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47107 \nPublished : Dec. 7, 2024, 3:15 p.m. | 22\u00a0minutes ago \nDescription : IBM QRadar SIEM 7.5 is vulnerable to stored cross-site scripting. This vulnerability allows authenticated users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-07T21:38:16.000000Z"}, {"uuid": "7ea79b42-7edf-4ec2-b0b6-f7eb7e7903e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47104", "type": "seen", "source": "https://t.me/cvedetector/13180", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47104 - IBM i File Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-47104 \nPublished : Dec. 18, 2024, 11:15 a.m. | 32\u00a0minutes ago \nDescription : IBM i 7.4 and 7.5 is vulnerable to an authenticated user gaining elevated privilege to a physical file. A user with authority to a view can alter the based-on physical file security attributes without having object management rights to the physical file. A malicious actor can use the elevated privileges to perform actions restricted by their view privileges. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-18T12:51:24.000000Z"}, {"uuid": "7de8c3cf-549f-4dd2-b355-3c59f5a19002", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47100", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113826249846900286", "content": "", "creation_timestamp": "2025-01-14T10:32:16.799727Z"}, {"uuid": "764b1ed0-f19b-41a9-bc6c-c384b6a70066", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47100", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113826265635967477", "content": "", "creation_timestamp": "2025-01-14T10:36:18.636501Z"}, {"uuid": "65ad25b3-e03c-4189-9ff9-9f9ac339d490", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47102", "type": "seen", "source": "https://t.me/cvedetector/13629", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47102 - IBM AIX Local Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-47102 \nPublished : Dec. 25, 2024, 3:15 p.m. | 41\u00a0minutes ago \nDescription : IBM AIX\u00a07.2, 7.3, VIOS 3.1, and 4.1  \n  \ncould allow a non-privileged local user to exploit a vulnerability in the AIX perfstat kernel extension to cause a denial of service. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-25T17:09:28.000000Z"}, {"uuid": "9e4dc0b2-aad4-47be-b5e8-41073c6f8ba2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47107", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113612105009390070", "content": "", "creation_timestamp": "2024-12-07T14:52:26.096575Z"}, {"uuid": "de9ca4a9-4720-4a8b-8a60-eace31b8fac6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47104", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113673455791138448", "content": "", "creation_timestamp": "2024-12-18T10:54:44.546145Z"}, {"uuid": "64d397f5-6d83-467c-9ab9-dc8884e87ea7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47100", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfp4rqrn2z2n", "content": "", "creation_timestamp": "2025-01-14T11:15:58.517752Z"}, {"uuid": "a3f64217-c6f2-4394-9352-cad7ef81efba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47100", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-021-02", "content": "", "creation_timestamp": "2025-01-21T11:00:00.000000Z"}, {"uuid": "bfcda1e4-e454-4142-8840-8fba63f4559c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47106", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2303", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47106\n\ud83d\udd39 Description: IBM Jazz for Service Management 1.1.3 through 1.1.3.22 could allow a remote attacker to obtain sensitive information from improper access restrictions that could aid in further attacks against the system.\n\ud83d\udccf Published: 2025-01-18T16:09:47.381Z\n\ud83d\udccf Modified: 2025-01-18T16:09:47.381Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7178507", "creation_timestamp": "2025-01-18T16:57:47.000000Z"}, {"uuid": "dca871a2-abbb-45ff-95cf-3397333443b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47109", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7012", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47109\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: IBM Sterling File Gateway 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.3 UI could disclosure the installation path of the server which could aid in further attacks against the system.\n\ud83d\udccf Published: 2025-03-10T16:01:42.848Z\n\ud83d\udccf Modified: 2025-03-10T16:01:42.848Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7185259", "creation_timestamp": "2025-03-10T16:38:04.000000Z"}, {"uuid": "1c0dd533-3161-4ec0-ae3b-ee4d24752098", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47100", "type": "seen", "source": "https://t.me/cvedetector/15245", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47100 - Siemens SIMATIC S7-1200 CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47100 \nPublished : Jan. 14, 2025, 11:15 a.m. | 39\u00a0minutes ago \nDescription : A vulnerability has been identified in SIMATIC S7-1200 CPU 1211C AC/DC/Rly (6ES7211-1BE40-0XB0), SIMATIC S7-1200 CPU 1211C DC/DC/DC (6ES7211-1AE40-0XB0), SIMATIC S7-1200 CPU 1211C DC/DC/Rly (6ES7211-1HE40-0XB0), SIMATIC S7-1200 CPU 1212C AC/DC/Rly (6ES7212-1BE40-0XB0), SIMATIC S7-1200 CPU 1212C DC/DC/DC (6ES7212-1AE40-0XB0), SIMATIC S7-1200 CPU 1212C DC/DC/Rly (6ES7212-1HE40-0XB0), SIMATIC S7-1200 CPU 1212FC DC/DC/DC (6ES7212-1AF40-0XB0), SIMATIC S7-1200 CPU 1212FC DC/DC/Rly (6ES7212-1HF40-0XB0), SIMATIC S7-1200 CPU 1214C AC/DC/Rly (6ES7214-1BG40-0XB0), SIMATIC S7-1200 CPU 1214C DC/DC/DC (6ES7214-1AG40-0XB0), SIMATIC S7-1200 CPU 1214C DC/DC/Rly (6ES7214-1HG40-0XB0), SIMATIC S7-1200 CPU 1214FC DC/DC/DC (6ES7214-1AF40-0XB0), SIMATIC S7-1200 CPU 1214FC DC/DC/Rly (6ES7214-1HF40-0XB0), SIMATIC S7-1200 CPU 1215C AC/DC/Rly (6ES7215-1BG40-0XB0), SIMATIC S7-1200 CPU 1215C DC/DC/DC (6ES7215-1AG40-0XB0), SIMATIC S7-1200 CPU 1215C DC/DC/Rly (6ES7215-1HG40-0XB0), SIMATIC S7-1200 CPU 1215FC DC/DC/DC (6ES7215-1AF40-0XB0), SIMATIC S7-1200 CPU 1215FC DC/DC/Rly (6ES7215-1HF40-0XB0), SIMATIC S7-1200 CPU 1217C DC/DC/DC (6ES7217-1AG40-0XB0), SIPLUS S7-1200 CPU 1212 AC/DC/RLY (6AG1212-1BE40-2XB0), SIPLUS S7-1200 CPU 1212 AC/DC/RLY (6AG1212-1BE40-4XB0), SIPLUS S7-1200 CPU 1212 DC/DC/RLY (6AG1212-1HE40-2XB0), SIPLUS S7-1200 CPU 1212 DC/DC/RLY (6AG1212-1HE40-4XB0), SIPLUS S7-1200 CPU 1212C DC/DC/DC (6AG1212-1AE40-2XB0), SIPLUS S7-1200 CPU 1212C DC/DC/DC (6AG1212-1AE40-4XB0), SIPLUS S7-1200 CPU 1212C DC/DC/DC RAIL (6AG2212-1AE40-1XB0), SIPLUS S7-1200 CPU 1214 AC/DC/RLY (6AG1214-1BG40-2XB0), SIPLUS S7-1200 CPU 1214 AC/DC/RLY (6AG1214-1BG40-4XB0), SIPLUS S7-1200 CPU 1214 AC/DC/RLY (6AG1214-1BG40-5XB0), SIPLUS S7-1200 CPU 1214 DC/DC/DC (6AG1214-1AG40-2XB0), SIPLUS S7-1200 CPU 1214 DC/DC/DC (6AG1214-1AG40-4XB0), SIPLUS S7-1200 CPU 1214 DC/DC/DC (6AG1214-1AG40-5XB0), SIPLUS S7-1200 CPU 1214 DC/DC/RLY (6AG1214-1HG40-2XB0), SIPLUS S7-1200 CPU 1214 DC/DC/RLY (6AG1214-1HG40-4XB0), SIPLUS S7-1200 CPU 1214 DC/DC/RLY (6AG1214-1HG40-5XB0), SIPLUS S7-1200 CPU 1214C DC/DC/DC RAIL (6AG2214-1AG40-1XB0), SIPLUS S7-1200 CPU 1214FC DC/DC/DC (6AG1214-1AF40-5XB0), SIPLUS S7-1200 CPU 1214FC DC/DC/RLY (6AG1214-1HF40-5XB0), SIPLUS S7-1200 CPU 1215 AC/DC/RLY (6AG1215-1BG40-2XB0), SIPLUS S7-1200 CPU 1215 AC/DC/RLY (6AG1215-1BG40-4XB0), SIPLUS S7-1200 CPU 1215 AC/DC/RLY (6AG1215-1BG40-5XB0), SIPLUS S7-1200 CPU 1215 DC/DC/DC (6AG1215-1AG40-2XB0), SIPLUS S7-1200 CPU 1215 DC/DC/DC (6AG1215-1AG40-4XB0), SIPLUS S7-1200 CPU 1215 DC/DC/RLY (6AG1215-1HG40-2XB0), SIPLUS S7-1200 CPU 1215 DC/DC/RLY (6AG1215-1HG40-4XB0), SIPLUS S7-1200 CPU 1215 DC/DC/RLY (6AG1215-1HG40-5XB0), SIPLUS S7-1200 CPU 1215C DC/DC/DC (6AG1215-1AG40-5XB0), SIPLUS S7-1200 CPU 1215FC DC/DC/DC (6AG1215-1AF40-5XB0). The web interface of the affected devices is vulnerable to Cross-Site Request Forgery (CSRF) attacks. This could allow an unauthenticated attacker to change the CPU mode by tricking a legitimate and authenticated user with sufficient permissions on the target CPU to click on a malicious link. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T13:09:10.000000Z"}, {"uuid": "4fba9c3d-0624-4788-b068-2c4414372946", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47106", "type": "seen", "source": "https://t.me/cvedetector/15809", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47106 - IBM Jazz for Service Management Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47106 \nPublished : Jan. 18, 2025, 4:15 p.m. | 37\u00a0minutes ago \nDescription : IBM Jazz for Service Management 1.1.3 through 1.1.3.22 could allow a remote attacker to obtain sensitive information from improper access restrictions that could aid in further attacks against the system. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-18T17:54:06.000000Z"}, {"uuid": "379a794d-f5fa-462a-84bd-5304bf78f378", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47102", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113714015336154746", "content": "", "creation_timestamp": "2024-12-25T14:49:34.102163Z"}, {"uuid": "bcc5c2f1-070e-4af0-8021-887d37767bee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47102", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3le5atjwt3a2f", "content": "", "creation_timestamp": "2024-12-25T15:15:27.204072Z"}, {"uuid": "46a23661-d8a4-44d1-be94-5b00a131886c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47100", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfp6u34ojc2e", "content": "", "creation_timestamp": "2025-01-14T11:53:06.079435Z"}, {"uuid": "a2d2fe5e-0c37-4109-ad96-d2566053dea0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47106", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113850239137768638", "content": "", "creation_timestamp": "2025-01-18T16:13:04.204937Z"}, {"uuid": "32bdbd5c-cdd5-4a93-8fd1-5af8407e72ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47106", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfzpfrev2e2t", "content": "", "creation_timestamp": "2025-01-18T16:15:55.054820Z"}, {"uuid": "29d4d025-b94d-486a-9ade-1883aba857e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47106", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfzuczauqx2y", "content": "", "creation_timestamp": "2025-01-18T17:43:51.383172Z"}, {"uuid": "5f06b749-b012-43c9-a120-e4b4a8347222", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47103", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lh2fi3n4qc2t", "content": "", "creation_timestamp": "2025-01-31T16:16:06.864732Z"}, {"uuid": "19a93cf6-b794-46c7-9b75-e7f935f24c5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47103", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lh2qmgtc3o2b", "content": "", "creation_timestamp": "2025-01-31T19:35:26.954823Z"}, {"uuid": "2e5a2688-af9a-48b9-8144-b9b25b61b26a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-47109", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lk2cw24ikh2f", "content": "", "creation_timestamp": "2025-03-10T19:45:51.190849Z"}]}