{"vulnerability": "CVE-2024-3360", "sightings": [{"uuid": "57d70548-f818-4926-a028-665f1b1ddccf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-3360", "type": "seen", "source": "Telegram/7F7jkhsZ-HKh3YhmEA4wP46VK1VFRx4DOp71PlhiYaGSDCGj", "content": "", "creation_timestamp": "2025-02-14T10:01:37.000000Z"}, {"uuid": "5af9b2e8-d3ca-4c73-853e-5e7809a16317", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-33601", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4930", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-33601\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: nscd: netgroup cache may terminate daemon on memory allocation failure\n\nThe Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or\nxrealloc and these functions may terminate the process due to a memory\nallocation failure resulting in a denial of service to the clients.  The\nflaw was introduced in glibc 2.15 when the cache was added to nscd.\n\nThis vulnerability is only present in the nscd binary.\n\ud83d\udccf Published: 2024-05-06T19:22:07.763Z\n\ud83d\udccf Modified: 2025-02-21T16:58:43.843Z\n\ud83d\udd17 References:\n1. https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007\n2. https://security.netapp.com/advisory/ntap-20240524-0014/\n3. https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html\n4. http://www.openwall.com/lists/oss-security/2024/07/22/5", "creation_timestamp": "2025-02-21T17:18:29.000000Z"}, {"uuid": "abe52b6a-0d8e-49f5-8aac-1179a93eddd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-33605", "type": "seen", "source": "https://t.me/realLulzSec/15025", "content": "CVE-2024-33605\n\nGET /installed_emanual_list.html\n\n#exploit #poc", "creation_timestamp": "2024-07-30T21:15:41.000000Z"}, {"uuid": "83c00518-ade5-41b2-a54d-3ce5e7cf9e20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-33603", "type": "seen", "source": "https://t.me/cvedetector/9428", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-33603 - LevelOne WBR-6012 Router Information Disclosure and Session Hijacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-33603 \nPublished : Oct. 30, 2024, 2:15 p.m. | 27\u00a0minutes ago \nDescription : The LevelOne WBR-6012 router has an information disclosure vulnerability in its web application, which allows unauthenticated users to access a verbose system log page and obtain sensitive data, such as memory addresses and IP addresses for login attempts. This flaw could lead to session hijacking due to the device's reliance on IP address for authentication. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-30T15:51:59.000000Z"}, {"uuid": "78edf951-74de-4e73-8086-9415b44e92e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-33605", "type": "seen", "source": "https://t.me/realLulzSec/1587", "content": "CVE-2024-33605\n\nGET /installed_emanual_list.html\n\n#exploit #poc", "creation_timestamp": "2024-07-30T21:15:41.000000Z"}, {"uuid": "1d1c88f1-4963-4524-8c4d-b9ead0356b63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-33606", "type": "seen", "source": "Telegram/DHvcvl5SGbghTlx4mfoG3aYCfH0EC_Nz2xoa03BAwKzrHw2-", "content": "", "creation_timestamp": "2025-03-02T11:46:30.000000Z"}, {"uuid": "05e2101d-f17b-4abb-bb12-9035510d140b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-33605", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2922", "content": "CVE-2024-33605\n\nGET /installed_emanual_list.html\n\n#exploit #poc", "creation_timestamp": "2024-07-30T18:00:59.000000Z"}, {"uuid": "d380a8c2-eb96-4f20-817c-d8fc6775a1ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-33605", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113548181027221474", "content": "", "creation_timestamp": "2024-11-26T07:55:43.304913Z"}, {"uuid": "0d6c1840-b275-4e29-a6de-4d1ede33d4b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-33601", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-05", "content": "", "creation_timestamp": "2025-06-12T10:00:00.000000Z"}, {"uuid": "b67d18f8-e352-4a99-a332-f43701043ce4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-33602", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-05", "content": "", "creation_timestamp": "2025-06-12T10:00:00.000000Z"}, {"uuid": "7d691d97-5590-44d6-ac64-6a3e959d4158", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-33600", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-05", "content": "", "creation_timestamp": "2025-06-12T10:00:00.000000Z"}, {"uuid": "21769138-9028-46d7-9767-0e875a95850b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-33600", "type": "seen", "source": "https://bsky.app/profile/lambdawatchdog.bsky.social/post/3lupiewnbkm22", "content": "", "creation_timestamp": "2025-07-24T12:01:29.089933Z"}, {"uuid": "22a1eb9a-6e4d-4deb-9009-2dce47ce80a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-33601", "type": "seen", "source": "https://bsky.app/profile/lambdawatchdog.bsky.social/post/3lupiex4bhk2x", "content": "", "creation_timestamp": "2025-07-24T12:01:29.935828Z"}, {"uuid": "efb35543-91de-4b61-b562-d04ec26de60e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-33602", "type": "seen", "source": "https://bsky.app/profile/lambdawatchdog.bsky.social/post/3lupiexshv72a", "content": "", "creation_timestamp": "2025-07-24T12:01:30.830192Z"}, {"uuid": "2f55170a-037e-4861-a9b2-320bcca82e8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-33601", "type": "seen", "source": "Telegram/-K2IPvCzwqrcZGZXcsjMDeKuQ_9WWP09GZdomgul6GrWedb7", "content": "", "creation_timestamp": "2025-02-21T22:10:26.000000Z"}]}