{"vulnerability": "CVE-2024-37358", "sightings": [{"uuid": "d2b2ecba-ddff-4c18-8c78-b4e8b0d5b13e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37358", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113956707363822061", "content": "", "creation_timestamp": "2025-02-06T11:29:20.465855Z"}, {"uuid": "cf583920-63f2-479f-9153-943325ebc2d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37358", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhj2uxgonn2t", "content": "", "creation_timestamp": "2025-02-06T12:16:23.835790Z"}, {"uuid": "fa860d0d-b7be-4c1c-8ab2-6e63f7e9b3f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37358", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113957016903179334", "content": "", "creation_timestamp": "2025-02-06T12:48:06.204840Z"}, {"uuid": "9b788ec5-0eae-4ad0-9ce9-58f2dac3bfd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37358", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhjbpmwfrg2g", "content": "", "creation_timestamp": "2025-02-06T14:18:41.266648Z"}, {"uuid": "b72005a0-0422-4dbe-a0c3-cb52449c1ca5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37358", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lhh5drseez2u", "content": "", "creation_timestamp": "2025-02-05T17:55:09.166073Z"}, {"uuid": "e47557d9-6725-4d22-a91b-393790fea29b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37358", "type": "seen", "source": "https://t.me/cvedetector/17380", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37358 - Apache James IMAP Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-37358 \nPublished : Feb. 6, 2025, 12:15 p.m. | 16\u00a0minutes ago \nDescription : Similarly to CVE-2024-34055, Apache James is vulnerable to denial of service through the abuse of IMAP literals from both authenticated and unauthenticated users, which could be used to cause unbounded memory allocation and very long computations  \n  \nVersion 3.7.6 and 3.8.2 restrict such illegitimate use of IMAP literals. \nSeverity: 8.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-06T13:33:18.000000Z"}]}