{"vulnerability": "cve-2024-3405", "sightings": [{"uuid": "28c10575-c1c9-433c-bb85-ac35442f86e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34055", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113956707363822061", "content": "", "creation_timestamp": "2025-02-06T11:29:20.528001Z"}, {"uuid": "aaeda0c4-0396-4b19-9a9e-43e9370b8985", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34055", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhj2uxgonn2t", "content": "", "creation_timestamp": "2025-02-06T12:16:23.877658Z"}, {"uuid": "a9a225e6-5440-4d37-ba99-8aef5269d1be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34055", "type": "seen", "source": "https://t.me/cvedetector/17380", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37358 - Apache James IMAP Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-37358 \nPublished : Feb. 6, 2025, 12:15 p.m. | 16\u00a0minutes ago \nDescription : Similarly to CVE-2024-34055, Apache James is vulnerable to denial of service through the abuse of IMAP literals from both authenticated and unauthenticated users, which could be used to cause unbounded memory allocation and very long computations  \n  \nVersion 3.7.6 and 3.8.2 restrict such illegitimate use of IMAP literals. \nSeverity: 8.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-06T13:33:18.000000Z"}, {"uuid": "a58ee40f-547a-4c52-ad95-0e220493c1ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34057", "type": "seen", "source": "https://t.me/cvedetector/6017", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34057 - Triangle Microworks TMW IEC 61850 Client Buffer Overflow Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2024-34057 \nPublished : Sept. 18, 2024, 7:15 p.m. | 21\u00a0minutes ago \nDescription : Triangle Microworks TMW IEC 61850 Client source code libraries before 12.2.0 lack a buffer size check when processing received messages. The resulting buffer overflow can cause a crash, resulting in a denial of service. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-18T21:46:21.000000Z"}, {"uuid": "6931eafc-103b-450c-b845-0fb7a1a5c9b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34055", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhjbpmwfrg2g", "content": "", "creation_timestamp": "2025-02-06T14:18:41.321604Z"}]}