{"vulnerability": "CVE-2024-31416", "sightings": [{"uuid": "ec666a5d-f8d2-46ec-828a-1a59a37f7580", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-31416", "type": "seen", "source": "https://t.me/cvedetector/5627", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-31416 - Eaton Foreseer - Input Validation Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-31416 \nPublished : Sept. 13, 2024, 5:15 p.m. | 17\u00a0minutes ago \nDescription : The Eaton Foreseer software provides multiple customizable input fields for the users to configure parameters in the tool like alarms, reports, etc. Some of these input fields were not checking the length and bounds of the entered value. The exploit of this security flaw by a bad actor may result in excessive memory consumption or integer overflow. \nSeverity: 5.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T19:38:22.000000Z"}]}