{"vulnerability": "CVE-2024-2336", "sightings": [{"uuid": "e9759fcf-31af-410a-8a89-0491da48cfc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23366", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113780989487073986", "content": "", "creation_timestamp": "2025-01-06T10:41:58.313567Z"}, {"uuid": "27bbdab8-3d43-4db4-9fa8-684fb613bbcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23366", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf2yzlfnnd2l", "content": "", "creation_timestamp": "2025-01-06T11:15:31.579034Z"}, {"uuid": "bd22a260-41ac-46ac-aba9-b27014fcc410", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23366", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf32kwlm7z2i", "content": "", "creation_timestamp": "2025-01-06T11:43:08.294729Z"}, {"uuid": "264e2326-8e41-420c-b0b3-4291867428cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23366", "type": "seen", "source": "MISP/3445a876-cced-4346-bf37-e276ba39cff4", "content": "", "creation_timestamp": "2025-09-02T18:30:14.000000Z"}, {"uuid": "1f622165-c6d9-45c9-82f4-a9754cc97b49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23366", "type": "seen", "source": "https://t.me/cvedetector/14356", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-23366 - Apache James Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-23366 \nPublished : Jan. 6, 2025, 11:15 a.m. | 28\u00a0minutes ago \nDescription : Information Disclosure while invoking the mailbox write API when message received from user is larger than mailbox size. \nSeverity: 6.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-06T12:45:05.000000Z"}, {"uuid": "7d40e093-3ded-428f-a95b-876c3aab3587", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23362", "type": "seen", "source": "https://t.me/cvedetector/4621", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-23362 - Cisco Cobalt RSA Key Parsing Cryptographic Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-23362 \nPublished : Sept. 2, 2024, 12:15 p.m. | 25\u00a0minutes ago \nDescription : Cryptographic issue while parsing RSA keys in COBR format. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-02T14:43:01.000000Z"}, {"uuid": "05c9a37a-e027-4d3c-b5e5-7a7fdbcd9fd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23364", "type": "seen", "source": "https://t.me/cvedetector/4624", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-23364 - Aruba Wireless CORP WiFi Dos Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-23364 \nPublished : Sept. 2, 2024, 12:15 p.m. | 25\u00a0minutes ago \nDescription : Transient DOS when processing the non-transmitted BSSID profile sub-elements present within the MBSSID Information Element (IE) of a beacon frame that is received from over-the-air (OTA). \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-02T14:43:06.000000Z"}, {"uuid": "49d9f7c9-75c7-4f87-ac5d-2e441204f7ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23365", "type": "seen", "source": "https://t.me/cvedetector/4622", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-23365 - MinkSocket Double Free Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-23365 \nPublished : Sept. 2, 2024, 12:15 p.m. | 25\u00a0minutes ago \nDescription : Memory corruption while releasing shared resources in MinkSocket listener thread. \nSeverity: 8.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-02T14:43:02.000000Z"}]}