{"vulnerability": "CVE-2024-5634", "sightings": [{"uuid": "36939265-7f0d-45c4-8af4-6c5b9fa7c6b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56348", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113685576561934015", "content": "", "creation_timestamp": "2024-12-20T14:17:12.670362Z"}, {"uuid": "880fd214-8400-4a5e-8392-b5a7efd9a5be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56349", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113685576577778407", "content": "", "creation_timestamp": "2024-12-20T14:17:12.798880Z"}, {"uuid": "e07b0593-4cfb-4673-b68e-aedd4b8a2d93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-56348", "type": "seen", "source": "AIL", "content": "", "creation_timestamp": "2024-12-23T14:00:20.072000Z"}, {"uuid": "183ea27c-7c06-4bd3-92f7-ffa160622b8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-56349", "type": "seen", "source": "AIL", "content": "", "creation_timestamp": "2024-12-23T14:00:20.072000Z"}, {"uuid": "eb484e55-98b6-4826-ad9f-0e272a01e63c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56348", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldqoiyzizh2s", "content": "", "creation_timestamp": "2024-12-20T15:15:29.565450Z"}, {"uuid": "096baa2f-5709-45c1-b7d0-3170b07cb642", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56349", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldqoj2ymkh2s", "content": "", "creation_timestamp": "2024-12-20T15:15:32.917562Z"}, {"uuid": "9f50c187-7d5f-4815-a3ef-d39c0ace860d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56346", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114187771786940492", "content": "", "creation_timestamp": "2025-03-19T06:52:03.695267Z"}, {"uuid": "4a0c8fdf-8dc8-413a-b6fa-fbb900fb71a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-56346", "type": "seen", "source": "https://bsky.app/profile/timb-machine.infosec.exchange.ap.brid.gy/post/3lktt6j42ijf2", "content": "", "creation_timestamp": "2025-03-20T23:13:40.641822Z"}, {"uuid": "871496be-bb2e-4659-b785-89d7a3bfded0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-56347", "type": "seen", "source": "https://bsky.app/profile/timb-machine.infosec.exchange.ap.brid.gy/post/3lktt6j42ijf2", "content": "", "creation_timestamp": "2025-03-20T23:13:40.750559Z"}, {"uuid": "0231c0b0-ae7a-43c9-955d-b97590addfef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-56346", "type": "seen", "source": "https://infosec.exchange/users/timb_machine/statuses/114197292316490754", "content": "", "creation_timestamp": "2025-03-20T23:13:57.528402Z"}, {"uuid": "cbd986e6-4f50-4067-bbbc-1d65c5968599", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-56347", "type": "seen", "source": "https://infosec.exchange/users/timb_machine/statuses/114197292316490754", "content": "", "creation_timestamp": "2025-03-20T23:13:57.638270Z"}, {"uuid": "5aea70a6-946b-4051-8d39-49683b5071d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56346", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114184473948206209", "content": "", "creation_timestamp": "2025-03-18T16:53:22.741274Z"}, {"uuid": "471c5686-327f-4200-89d7-6ec454d3da0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114184473948206209", "content": "", "creation_timestamp": "2025-03-18T16:53:22.835936Z"}, {"uuid": "d0fb6987-6073-4885-9488-62c3882ae782", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56346", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lko7n22jpm2p", "content": "", "creation_timestamp": "2025-03-18T17:40:20.111165Z"}, {"uuid": "696d5dc8-9231-4b77-8e59-f83d16fba2f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lko7n34c5q2u", "content": "", "creation_timestamp": "2025-03-18T17:40:21.214742Z"}, {"uuid": "fead98ad-e1af-438e-b79d-1c3b2817bd30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56346", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114184692905192326", "content": "", "creation_timestamp": "2025-03-18T17:49:03.931996Z"}, {"uuid": "7b6ed6bf-15a7-4aa1-a214-0ad88bef8908", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114184692980438498", "content": "", "creation_timestamp": "2025-03-18T17:49:05.003017Z"}, {"uuid": "2ca4c5cf-28ce-4e66-b782-78a3722841c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56346", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lkz45grwas2c", "content": "", "creation_timestamp": "2025-03-23T01:37:12.887781Z"}, {"uuid": "ee553dc8-8ffc-41fd-9843-ee03a32e909c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lkz45grwas2c", "content": "", "creation_timestamp": "2025-03-23T01:37:12.965186Z"}, {"uuid": "bfd2145a-7fb4-4912-8b77-b24ddd6fab80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56346", "type": "seen", "source": "https://bsky.app/profile/r-blueteamsec.bsky.social/post/3lkur54ggbp2o", "content": "", "creation_timestamp": "2025-03-21T08:09:31.703295Z"}, {"uuid": "6047f8bd-788e-4291-b07d-625c11cad653", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://bsky.app/profile/r-blueteamsec.bsky.social/post/3lkur54ggbp2o", "content": "", "creation_timestamp": "2025-03-21T08:09:31.781371Z"}, {"uuid": "3c20fe52-fe5c-47fc-be15-17febcda5bbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lkoriuptj72q", "content": "", "creation_timestamp": "2025-03-18T23:00:10.750343Z"}, {"uuid": "f1dde76e-c97a-4712-97e2-38686c6b72ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56346", "type": "seen", "source": "https://bsky.app/profile/insightsintothings.bsky.social/post/3lkt4x7xixs27", "content": "", "creation_timestamp": "2025-03-20T16:35:40.985566Z"}, {"uuid": "bf4fd790-6553-4300-989c-681e44ce5326", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lkpzqcemuk24", "content": "", "creation_timestamp": "2025-03-19T11:00:08.955981Z"}, {"uuid": "40ef43d5-f7a2-4376-959c-07ff870771a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56346", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkoihyojg72n", "content": "", "creation_timestamp": "2025-03-18T20:18:35.371432Z"}, {"uuid": "63da7f7b-558f-4d34-9339-19c4539654d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkoii2fi6726", "content": "", "creation_timestamp": "2025-03-18T20:18:43.551073Z"}, {"uuid": "29b1369d-6bd3-47bf-b0c2-e70969377de3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56346", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lkpzqc7dgj2p", "content": "", "creation_timestamp": "2025-03-19T11:00:08.127203Z"}, {"uuid": "53c86967-3210-4a03-9f2d-37c2aaa1d18c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56346", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lla4f4sckc2d", "content": "", "creation_timestamp": "2025-03-25T20:30:09.129798Z"}, {"uuid": "d7e498bb-328c-4b2d-8358-3ac96759fb63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56340", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lj7phl7zv525", "content": "", "creation_timestamp": "2025-02-28T05:48:31.908852Z"}, {"uuid": "63c81515-f852-4b2a-8a64-6cf2660f0695", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56346", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lkoriukjbb24", "content": "", "creation_timestamp": "2025-03-18T23:00:09.990984Z"}, {"uuid": "b20dd192-edb0-44c2-82f0-27603bc2c3bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56346", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lkv3knzpvs2q", "content": "", "creation_timestamp": "2025-03-21T11:16:08.043692Z"}, {"uuid": "c2e50a0b-d466-4ef1-94ac-d5bd6f619ca8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lla4f4sckc2d", "content": "", "creation_timestamp": "2025-03-25T20:30:09.217422Z"}, {"uuid": "9dfd8551-1fab-4993-949c-65804adde902", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56346", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lksiyr6yg22v", "content": "", "creation_timestamp": "2025-03-20T10:38:36.113653Z"}, {"uuid": "3eddba2b-86ef-4e8d-8adc-b0f2eff25398", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lkv3knzpvs2q", "content": "", "creation_timestamp": "2025-03-21T11:16:08.134835Z"}, {"uuid": "73648325-20b6-46b6-afcd-6650b8ff3a02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56342", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqw2h53dwv25", "content": "", "creation_timestamp": "2025-06-06T05:00:01.031725Z"}, {"uuid": "a050971a-4207-4b41-b4e3-b6444a34ff50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114187718620579610", "content": "", "creation_timestamp": "2025-03-19T06:38:34.973890Z"}, {"uuid": "94e2ef11-7fe3-48b6-8d09-d3f550449a5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56343", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqw2lmksmq2m", "content": "", "creation_timestamp": "2025-06-06T05:02:31.415979Z"}, {"uuid": "4745c22a-b26a-4ab1-adf6-24373cad6cd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-d731742b-dac0288c73b84244", "content": "", "creation_timestamp": "2025-11-18T19:38:20.521071Z"}, {"uuid": "982507b6-7285-4e3d-afbe-bf9a73dec5c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56346", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114818314877443706", "content": "", "creation_timestamp": "2025-07-08T15:27:27.747257Z"}, {"uuid": "164f06b5-b91e-47de-8ae1-6e87228a00dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56346", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114818316545973785", "content": "", "creation_timestamp": "2025-07-08T15:27:53.159599Z"}, {"uuid": "def957f3-d23d-4ff4-b20f-8de6473644fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56346", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-d731742b-dac0288c73b84244", "content": "", "creation_timestamp": "2025-11-18T19:38:20.596578Z"}, {"uuid": "f14dfb32-57fe-4348-8a82-b761e626fc73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56340", "type": "seen", "source": "MISP/af1fbe07-e10c-40c4-844e-d4419bdf6f80", "content": "", "creation_timestamp": "2025-08-22T13:26:18.000000Z"}, {"uuid": "d41ae15d-315d-4438-878a-0c1a80b612a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56346", "type": "seen", "source": "MISP/3e4b778d-5810-4171-a915-f1d106684af4", "content": "", "creation_timestamp": "2025-08-11T18:27:49.000000Z"}, {"uuid": "6e063c6b-c9fd-4c57-bac0-43e5bf64e893", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56340", "type": "seen", "source": "https://t.me/cvedetector/19113", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56340 - IBM Cognos Analytics Local File Inclusion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56340 \nPublished : Feb. 28, 2025, 3:15 a.m. | 42\u00a0minutes ago \nDescription : IBM Cognos Analytics 11.2.0 through 11.2.4 FP5 is vulnerable to local file inclusion vulnerability, allowing an attacker to access sensitive files by inserting path traversal payloads inside the deficon parameter. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-28T05:19:10.000000Z"}, {"uuid": "a7284805-febd-4de8-91f2-3ba3c016af74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8021", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56347\n\ud83d\udd25 CVSS Score: 9.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: IBM AIX 7.2 and 7.3 nimsh service SSL/TLS protection mechanisms could allow a remote attacker to execute arbitrary commands due to improper process controls.\n\ud83d\udccf Published: 2025-03-18T16:16:09.506Z\n\ud83d\udccf Modified: 2025-03-19T03:55:54.102Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7186621", "creation_timestamp": "2025-03-19T04:48:48.000000Z"}, {"uuid": "abb39055-851f-4fb3-bf12-770efa6a186a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56348", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/76736", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #RCE #Remote\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a cve-2024-56348\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a Msakhana68\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a FreeMarker\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-03-23 03:23:01\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nDemonstrate an authentication bypass and remote code execution exploit targeting JetBrains TeamCity versions before 2024.12 via REST API abuse.\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-03-23T04:00:39.000000Z"}, {"uuid": "fc8e8973-e2c2-4587-80fa-ead73ecf98ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56340", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5827", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56340\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: IBM Cognos Analytics 11.2.0 through 11.2.4 FP5 is vulnerable to local file inclusion vulnerability, allowing an attacker to access sensitive files by inserting path traversal payloads inside the deficon parameter.\n\ud83d\udccf Published: 2025-02-28T02:32:30.345Z\n\ud83d\udccf Modified: 2025-02-28T02:33:41.495Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7183676", "creation_timestamp": "2025-02-28T03:26:31.000000Z"}, {"uuid": "dfea8003-5a3d-427c-b135-3662d508e4c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56346", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8169", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56346\n\ud83d\udd25 CVSS Score: 10 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: IBM AIX 7.2 and 7.3 nimesis NIM master service could allow a remote attacker to execute arbitrary commands due to improper process controls.\n\ud83d\udccf Published: 2025-03-18T16:15:23.565Z\n\ud83d\udccf Modified: 2025-03-20T03:55:53.567Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7186621", "creation_timestamp": "2025-03-20T04:18:30.000000Z"}, {"uuid": "b9e73765-0cc8-443c-822a-1caf70f28ea4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://t.me/cvedetector/20594", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56347 - IBM AIX nimsh SSL/TLS Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56347 \nPublished : March 18, 2025, 5:15 p.m. | 1\u00a0hour, 18\u00a0minutes ago \nDescription : IBM AIX 7.2 and 7.3 nimsh service SSL/TLS protection mechanisms could allow a remote attacker to execute arbitrary commands due to improper process controls. \nSeverity: 9.6 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-18T20:15:05.000000Z"}, {"uuid": "2b7d9115-b869-4b82-87c1-e8205176d76a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56340", "type": "seen", "source": "Telegram/YqE05BXpU9odXgF9_jB0PyfNQmdLZPcxJER9bHc08Jr2NxBl", "content": "", "creation_timestamp": "2025-03-02T11:44:21.000000Z"}, {"uuid": "e1e93960-9900-4ad5-acd5-9c6ff9302b09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56341", "type": "seen", "source": "https://t.me/cvedetector/21884", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56341 - IBM Content Navigator Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56341 \nPublished : April 2, 2025, 3:15 p.m. | 1\u00a0hour, 13\u00a0minutes ago \nDescription : IBM Content Navigator 3.0.11, 3.0.15, and 3.1.0 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-02T19:10:01.000000Z"}, {"uuid": "cd0d599a-8ae7-434b-acc0-504fdb0941bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56346", "type": "seen", "source": "https://t.me/cvedetector/20593", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56346 - IBM AIX Nimesis NIM Master Remote Command Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56346 \nPublished : March 18, 2025, 5:15 p.m. | 1\u00a0hour, 18\u00a0minutes ago \nDescription : IBM AIX 7.2 and 7.3 nimesis NIM master service could allow a remote attacker to execute arbitrary commands due to improper process controls. \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-18T20:15:04.000000Z"}, {"uuid": "6a96781a-604a-422c-a1c0-238d028709ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56346", "type": "seen", "source": "https://t.me/thehackernews/6526", "content": "Two major vendors just patched remote code execution flaws\u2014update NOW before attackers exploit them.\n\n\ud83d\udd34 Veeam Backup (CVE-2025-23120, 9.9/10)\n\u27a1\ufe0f Affects v12.3.0.310 &amp; earlier\n\u27a1\ufe0f Allows RCE by authenticated users\n\u27a1\ufe0f Fixed in v12.3.1 (12.3.1.1139)\n\n\ud83d\udd34 IBM AIX (CVE-2024-56346 &amp; CVE-2024-56347, 10/10 &amp; 9.6/10)\n\u27a1\ufe0f Affects AIX 7.2 &amp; 7.3\n\u27a1\ufe0f Exploitable via NIM services\n\n\u26a0\ufe0f No attacks seen yet, but don\u2019t wait\u2014patch immediately.\n\nFull details: https://thehackernews.com/2025/03/veeam-and-ibm-release-patches-for-high.html", "creation_timestamp": "2025-03-20T15:03:48.000000Z"}, {"uuid": "4c0d8aea-623e-4337-b277-3c82488a15ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56348", "type": "seen", "source": "https://t.me/cvedetector/13443", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56348 - JetBrains TeamCity Agent Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56348 \nPublished : Dec. 20, 2024, 3:15 p.m. | 21\u00a0minutes ago \nDescription : In JetBrains TeamCity before 2024.12 improper access control allowed viewing details of unauthorized agents \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-20T16:45:01.000000Z"}, {"uuid": "de834c7f-b93a-407c-9a95-7b87e69e11d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56349", "type": "seen", "source": "https://t.me/cvedetector/13439", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56349 - JetBrains TeamCity Insufficient Authorization Vulnerability (Access Control Weakness)\", \n  \"Content\": \"CVE ID : CVE-2024-56349 \nPublished : Dec. 20, 2024, 3:15 p.m. | 21\u00a0minutes ago \nDescription : In JetBrains TeamCity before 2024.12 improper access control allowed unauthorized users to modify build logs \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-20T16:44:55.000000Z"}, {"uuid": "722e8821-19fa-48e7-94b5-6adec8d69cea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56346", "type": "seen", "source": "https://t.me/CyberBulletin/2727", "content": "\u26a1Two major vendors just patched remote code execution flaws\u2014update NOW before attackers exploit them.\n\nVeeam Backup (CVE-2025-23120, 9.9/10)\nAffects v12.3.0.310 &amp; earlier\nAllows RCE by authenticated users\nFixed in v12.3.1 (12.3.1.1139)\n\nIBM AIX (CVE-2024-56346 &amp; CVE-2024-56347, 10/10 &amp; 9.6/10)\nAffects AIX 7.2 &amp; 7.3\nExploitable via NIM services\n\n\u26a0\ufe0f No attacks seen yet, but don\u2019t wait\u2014patch immediately.\n\n#CyberBulletin", "creation_timestamp": "2025-03-21T06:44:57.000000Z"}, {"uuid": "b40b6097-fd90-4f8d-9574-32295a9cd034", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://t.me/CyberBulletin/2727", "content": "\u26a1Two major vendors just patched remote code execution flaws\u2014update NOW before attackers exploit them.\n\nVeeam Backup (CVE-2025-23120, 9.9/10)\nAffects v12.3.0.310 &amp; earlier\nAllows RCE by authenticated users\nFixed in v12.3.1 (12.3.1.1139)\n\nIBM AIX (CVE-2024-56346 &amp; CVE-2024-56347, 10/10 &amp; 9.6/10)\nAffects AIX 7.2 &amp; 7.3\nExploitable via NIM services\n\n\u26a0\ufe0f No attacks seen yet, but don\u2019t wait\u2014patch immediately.\n\n#CyberBulletin", "creation_timestamp": "2025-03-21T06:44:57.000000Z"}, {"uuid": "3af0c54c-25d4-4b0f-a1cc-7db39d3094c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5634", "type": "seen", "source": "https://t.me/cvedetector/306", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5634 - Longse model\u00a0LBH30FE200W cameras, as well as produ\", \n  \"Content\": \"CVE ID : CVE-2024-5634 \nPublished : July 9, 2024, 11:15 a.m. | 35\u00a0minutes ago \nDescription : Longse model\u00a0LBH30FE200W cameras, as well as products based on this device, make use of telnet passwords which follow a specific pattern. Once the pattern is known, brute-forcing the password becomes relatively easy.\u00a0  \nAdditionally, every camera with the same firmware version shares the same password. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T13:55:45.000000Z"}, {"uuid": "51ca2e81-e850-4e68-b133-12ffc826aee5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56340", "type": "published-proof-of-concept", "source": "Telegram/zSzoebszbbIXMk27Rqts2RR5nycMptSURZnSEC0hbBVOUIQ", "content": "", "creation_timestamp": "2025-03-03T22:00:06.000000Z"}, {"uuid": "4f0013f8-8af2-407a-ac0f-b3cc18ad80c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56347", "type": "seen", "source": "https://t.me/thehackernews/6526", "content": "Two major vendors just patched remote code execution flaws\u2014update NOW before attackers exploit them.\n\n\ud83d\udd34 Veeam Backup (CVE-2025-23120, 9.9/10)\n\u27a1\ufe0f Affects v12.3.0.310 &amp; earlier\n\u27a1\ufe0f Allows RCE by authenticated users\n\u27a1\ufe0f Fixed in v12.3.1 (12.3.1.1139)\n\n\ud83d\udd34 IBM AIX (CVE-2024-56346 &amp; CVE-2024-56347, 10/10 &amp; 9.6/10)\n\u27a1\ufe0f Affects AIX 7.2 &amp; 7.3\n\u27a1\ufe0f Exploitable via NIM services\n\n\u26a0\ufe0f No attacks seen yet, but don\u2019t wait\u2014patch immediately.\n\nFull details: https://thehackernews.com/2025/03/veeam-and-ibm-release-patches-for-high.html", "creation_timestamp": "2025-03-20T15:03:48.000000Z"}]}