{"uuid": "3b7f0848-6e9c-4444-a3c7-b3e871a69e01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9358", "type": "seen", "source": "https://t.me/cvedetector/6694", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9358 - ThingsBoard Remote HTTP RPC API Resource Exhaustion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-9358 \nPublished : Oct. 1, 2024, 2:15 a.m. | 42\u00a0minutes ago \nDescription : A vulnerability has been found in ThingsBoard up to 3.7.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component HTTP RPC API. The manipulation leads to resource consumption. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 3.7.1 is able to address this issue. It is recommended to upgrade the affected component. The vendor was informed on 2024-07-24 about this vulnerability and announced the release of 3.7.1 for the second half of September 2024. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-01T05:12:31.000000Z"}