{"vulnerability": "cve-2024-5646", "sightings": [{"uuid": "3a6c0db9-9dac-402c-9ac3-24980ce3d5cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56467", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhk6agwuus2g", "content": "", "creation_timestamp": "2025-02-06T22:49:15.509059Z"}, {"uuid": "caea4fe5-5255-40cc-8eba-2e08469775f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56467", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113958841808577146", "content": "", "creation_timestamp": "2025-02-06T20:32:09.420917Z"}, {"uuid": "b0ec69cb-f7f2-4546-ab59-5fc4a4781c95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56463", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li5pdhacsw2g", "content": "", "creation_timestamp": "2025-02-14T17:15:40.303384Z"}, {"uuid": "bf319dd2-0d6b-4fb6-a698-a466f6c580af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56463", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li5uda4wp62m", "content": "", "creation_timestamp": "2025-02-14T18:45:08.417167Z"}, {"uuid": "aaead5bf-3e68-4981-809e-fc7f4ae16eab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56467", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5079", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56467\n\ud83d\udd25 CVSS Score: 3.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: IBM EntireX 11.1 could allow a local user to obtain sensitive information when a detailed technical error message is returned.  This information could be used in further attacks against the system.\n\ud83d\udccf Published: 2025-02-06T20:30:45.432Z\n\ud83d\udccf Modified: 2025-02-22T22:13:01.190Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7182693", "creation_timestamp": "2025-02-22T23:19:59.000000Z"}, {"uuid": "a54fb9b2-7a0e-46f4-b4b8-6435d6f120ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56463", "type": "seen", "source": "https://t.me/cvedetector/18132", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56463 - IBM QRadar SIEM Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56463 \nPublished : Feb. 14, 2025, 5:15 p.m. | 1\u00a0hour, 2\u00a0minutes ago \nDescription : IBM QRadar SIEM 7.5 is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. \nSeverity: 4.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-14T19:57:09.000000Z"}, {"uuid": "ef92ba48-2f57-4a34-828f-0a774dbf439d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56467", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhjyz7demr24", "content": "", "creation_timestamp": "2025-02-06T21:15:38.244213Z"}, {"uuid": "50eaa8b0-ae7c-4441-b232-30d4ad5c1cfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56467", "type": "seen", "source": "https://t.me/cvedetector/17444", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56467 - IBM EntireX Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-56467 \nPublished : Feb. 6, 2025, 9:15 p.m. | 1\u00a0hour, 29\u00a0minutes ago \nDescription : IBM EntireX 11.1 could allow a local user to obtain sensitive information when a detailed technical error message is returned.  This information could be used in further attacks against the system. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-07T00:26:10.000000Z"}, {"uuid": "dc9d0b0a-8e9d-4c50-98af-d14a716e5c5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5646", "type": "seen", "source": "Telegram/CyShfnxDIVHOXG7Cu89TEXIMBwJip83Ry2BPq0N2ZmPm28i0", "content": "", "creation_timestamp": "2025-02-06T02:43:29.000000Z"}]}