{"vulnerability": "cve-2024-5418", "sightings": [{"uuid": "a14d5dd9-18f1-4a42-9836-012fdf2169b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54189", "type": "seen", "source": "https://bsky.app/profile/FunctionalProgramming.activitypub.awakari.com.ap.brid.gy/post/3lqp2zntce2t2", "content": "", "creation_timestamp": "2025-06-03T10:23:16.575703Z"}, {"uuid": "7e8808ad-6a95-46bd-8f40-21a02dddd2da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54181", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113742088456394313", "content": "", "creation_timestamp": "2024-12-30T13:48:55.819072Z"}, {"uuid": "60502998-518b-47be-ade0-c5400779ebad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54188", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114552270680970829", "content": "", "creation_timestamp": "2025-05-22T15:48:55.665182Z"}, {"uuid": "f965881e-2932-472f-962f-14f6856d988a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54183", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrvrce5sog2v", "content": "", "creation_timestamp": "2025-06-18T19:41:28.589750Z"}, {"uuid": "97a1a2a1-cef4-4911-86a1-0466038ad5f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54189", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqpckwcuru2r", "content": "", "creation_timestamp": "2025-06-03T12:36:39.898202Z"}, {"uuid": "0af36086-c4b4-4099-abd9-d9ea12347430", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54181", "type": "seen", "source": "https://t.me/cvedetector/13933", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-54181 - IBM WebSphere Automation Code Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-54181 \nPublished : Dec. 30, 2024, 2:15 p.m. | 41\u00a0minutes ago \nDescription : IBM WebSphere Automation 1.7.5 could allow a remote privileged user, who has authorized access to the swagger UI, to execute arbitrary code. Using specially crafted input, the user could exploit this vulnerability to execute arbitrary code on the system. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-30T15:57:53.000000Z"}, {"uuid": "803f794e-517b-4395-b4bb-99443b5b55c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54189", "type": "seen", "source": "https://infosec.place/objects/058aaad9-ac04-48ea-b2ba-18347f0a6be0", "content": "", "creation_timestamp": "2025-06-03T10:00:13.229507Z"}, {"uuid": "0c592c5b-af21-46dc-97c5-3c4acdb6bb31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54189", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lqp25ovz6r2p", "content": "", "creation_timestamp": "2025-06-03T10:06:06.393636Z"}, {"uuid": "e1ccca4a-e455-480d-945a-13f2b1a350fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54183", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18763", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-54183\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.4 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.\n\ud83d\udccf Published: 2025-06-18T15:08:50.493Z\n\ud83d\udccf Modified: 2025-06-18T15:26:42.026Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7237060", "creation_timestamp": "2025-06-18T15:42:54.000000Z"}]}