{"vulnerability": "CVE-2024-3472", "sightings": [{"uuid": "f3591f8d-119c-4f64-8293-cdd629ad16ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34729", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113476856095833508", "content": "", "creation_timestamp": "2024-11-13T17:36:51.310393Z"}, {"uuid": "27c81aad-60b7-452e-9569-59a50f9703aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34727", "type": "seen", "source": "https://t.me/cvedetector/3307", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34727 - BlueZ SDP Heap Buffer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-34727 \nPublished : Aug. 15, 2024, 10:15 p.m. | 38\u00a0minutes ago \nDescription : In sdpu_compare_uuid_with_attr of sdp_utils.cc, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-16T01:10:48.000000Z"}, {"uuid": "8075f0d2-235a-4d47-a723-26201267935e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34723", "type": "seen", "source": "https://t.me/cvedetector/463", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34723 - In onTransact of ParcelableListBinder.java , there\", \n  \"Content\": \"CVE ID : CVE-2024-34723 \nPublished : July 9, 2024, 9:15 p.m. | 19\u00a0minutes ago \nDescription : In onTransact of ParcelableListBinder.java , there is a possible way to steal mAllowlistToken to launch an app from background due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T23:36:36.000000Z"}, {"uuid": "4b18c5c0-d376-43eb-925f-8e4661beb7b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34720", "type": "seen", "source": "https://t.me/cvedetector/470", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34720 - In com_android_internal_os_ZygoteCommandBuffer_nat\", \n  \"Content\": \"CVE ID : CVE-2024-34720 \nPublished : July 9, 2024, 9:15 p.m. | 19\u00a0minutes ago \nDescription : In com_android_internal_os_ZygoteCommandBuffer_nativeForkRepeatedly of com_android_internal_os_ZygoteCommandBuffer.cpp, there is a possible method to perform arbitrary code execution in any app zygote processes due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T23:36:45.000000Z"}, {"uuid": "7ae2d7fc-901c-4a87-b67f-a3a680694df6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34722", "type": "seen", "source": "https://t.me/cvedetector/468", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34722 - In smp_proc_rand of smp_act.cc, there is a possibl\", \n  \"Content\": \"CVE ID : CVE-2024-34722 \nPublished : July 9, 2024, 9:15 p.m. | 19\u00a0minutes ago \nDescription : In smp_proc_rand of smp_act.cc, there is a possible authentication bypass during legacy BLE pairing due to incorrect implementation of a protocol. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T23:36:44.000000Z"}, {"uuid": "cca0cd0d-d750-4d52-8610-b57f37ec07d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34724", "type": "seen", "source": "https://t.me/cvedetector/466", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34724 - In _UnrefAndMaybeDestroy of pmr.c, there is a poss\", \n  \"Content\": \"CVE ID : CVE-2024-34724 \nPublished : July 9, 2024, 9:15 p.m. | 19\u00a0minutes ago \nDescription : In _UnrefAndMaybeDestroy of pmr.c, there is a possible arbitrary code execution due to a race condition. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T23:36:39.000000Z"}, {"uuid": "e130add4-a5ea-4b5d-817c-26176e90bdf6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34729", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/aaa30339-107b-4cb3-8a1a-3e5d8398b429", "content": "", "creation_timestamp": "2024-11-07T17:04:54.853683Z"}, {"uuid": "893a0317-fab2-474d-a72e-63c38617e9fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34721", "type": "seen", "source": "https://t.me/cvedetector/473", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34721 - In ensureFileColumns of MediaProvider.java, there\", \n  \"Content\": \"CVE ID : CVE-2024-34721 \nPublished : July 9, 2024, 9:15 p.m. | 19\u00a0minutes ago \nDescription : In ensureFileColumns of MediaProvider.java, there is a possible disclosure of files owned by another user due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T23:36:51.000000Z"}, {"uuid": "af06318b-5da8-4262-b721-242fa0c8c8c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34726", "type": "seen", "source": "https://t.me/cvedetector/471", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34726 - In PVRSRV_MMap of pvr_bridge_k.c, there is a possi\", \n  \"Content\": \"CVE ID : CVE-2024-34726 \nPublished : July 9, 2024, 9:15 p.m. | 19\u00a0minutes ago \nDescription : In PVRSRV_MMap of pvr_bridge_k.c, there is a possible arbitrary code execution due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T23:36:46.000000Z"}, {"uuid": "b7cb74b7-dfd9-45f0-849d-86b7b77dfb1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34725", "type": "seen", "source": "https://t.me/cvedetector/462", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34725 - In DevmemIntUnexportCtx of devicemem_server.c, the\", \n  \"Content\": \"CVE ID : CVE-2024-34725 \nPublished : July 9, 2024, 9:15 p.m. | 19\u00a0minutes ago \nDescription : In DevmemIntUnexportCtx of devicemem_server.c, there is a possible arbitrary code execution due to a race condition. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T23:36:35.000000Z"}, {"uuid": "615fc311-4136-4935-871c-2f588fd751ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34729", "type": "seen", "source": "https://t.me/cvedetector/10865", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34729 - Apache Linux Kernel Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-34729 \nPublished : Nov. 13, 2024, 6:15 p.m. | 28\u00a0minutes ago \nDescription : In multiple locations, there is a possible arbitrary code execution due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T19:44:52.000000Z"}]}