{"vulnerability": "CVE-2024-3474", "sightings": [{"uuid": "f4b8e1c5-333c-41e0-852e-a4c7d51e001f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34747", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113476856111660874", "content": "", "creation_timestamp": "2024-11-13T17:36:51.508225Z"}, {"uuid": "cf42ddb4-f900-4b27-8c08-61cde6c8de6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34748", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113908418873894802", "content": "", "creation_timestamp": "2025-01-28T22:48:57.698611Z"}, {"uuid": "41571f7d-8627-4534-b1bf-8e107b879662", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34740", "type": "published-proof-of-concept", "source": "Telegram/StnFq2aD-oVk9_iOn0KNijqZJTdZ-dJJ6jhCB9DJIxPvPVY", "content": "", "creation_timestamp": "2025-10-08T21:00:04.000000Z"}, {"uuid": "46660957-f533-4b71-a03b-ca45b79d7d97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34747", "type": "seen", "source": "https://t.me/cvedetector/10866", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34747 - \"Linux Kernel DeviceMem Server DevmemXIntMapPages Use-After-Free Privilege Escalation\"\", \n  \"Content\": \"CVE ID : CVE-2024-34747 \nPublished : Nov. 13, 2024, 6:15 p.m. | 28\u00a0minutes ago \nDescription : In DevmemXIntMapPages of devicemem_server.c, there is a possible use-after-free due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T19:44:52.000000Z"}, {"uuid": "faa9acbe-0c5c-4353-9c3e-9a92cdae7aae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34740", "type": "seen", "source": "https://t.me/cvedetector/3304", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34740 - Adobe BinaryXmlSerializer XML Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-34740 \nPublished : Aug. 15, 2024, 10:15 p.m. | 38\u00a0minutes ago \nDescription : In attributeBytesBase64 and attributeBytesHex of BinaryXmlSerializer.java, there is a possible arbitrary XML injection due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-16T01:10:46.000000Z"}, {"uuid": "b786d22b-e6af-45ce-83de-3ac634fffb81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34741", "type": "seen", "source": "https://t.me/cvedetector/3302", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34741 - \"Qualcomm Lock Screen Privilege Escalation\"\", \n  \"Content\": \"CVE ID : CVE-2024-34741 \nPublished : Aug. 15, 2024, 10:15 p.m. | 38\u00a0minutes ago \nDescription : In setForceHideNonSystemOverlayWindowIfNeeded of WindowState.java, there is a possible way for message content to be visible on the screensaver while lock screen visibility settings are restricted by the user due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-16T01:10:41.000000Z"}, {"uuid": "d7f3dde3-01e5-483f-8c4f-3596314d952a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34742", "type": "seen", "source": "https://t.me/cvedetector/3300", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34742 - Blackberry MDM Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-34742 \nPublished : Aug. 15, 2024, 10:15 p.m. | 38\u00a0minutes ago \nDescription : In shouldWrite of OwnersData.java, there is a possible edge case that prevents MDM policies from being persisted due to a logic error in the code. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-16T01:10:39.000000Z"}, {"uuid": "1129f298-1419-463e-8070-0e55ead25095", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34743", "type": "seen", "source": "https://t.me/cvedetector/3299", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34743 - Qualcomm SurfaceFlinger Tapjacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-34743 \nPublished : Aug. 15, 2024, 10:15 p.m. | 38\u00a0minutes ago \nDescription : In setTransactionState of SurfaceFlinger.cpp, there is a possible way to perform tapjacking due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-16T01:10:38.000000Z"}, {"uuid": "1e07d58b-a3ff-491a-9086-8308526dd54f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34748", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgtbi3n2q32p", "content": "", "creation_timestamp": "2025-01-28T20:15:54.063135Z"}, {"uuid": "73f344be-223b-448f-a57b-75be36a534ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34747", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/aaa30339-107b-4cb3-8a1a-3e5d8398b429", "content": "", "creation_timestamp": "2024-11-07T17:04:54.853683Z"}, {"uuid": "12653411-8380-4489-bcb0-873c80761efa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34748", "type": "seen", "source": "https://t.me/cvedetector/16643", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34748 - DevmemX Use-After-Free Local Kernel EoP\", \n  \"Content\": \"CVE ID : CVE-2024-34748 \nPublished : Jan. 28, 2025, 8:15 p.m. | 1\u00a0hour, 25\u00a0minutes ago \nDescription : In _DevmemXReservationPageAddress of devicemem_server.c, there is a possible use-after-free due to improper casting. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 8.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T22:58:33.000000Z"}, {"uuid": "2ccb2b11-c7c7-4440-9e9c-abaea7e386e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-34748", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113907583468069070", "content": "", "creation_timestamp": "2025-01-28T19:16:29.251311Z"}]}