{"vulnerability": "CVE-2024-4067", "sightings": [{"uuid": "9c09b195-e979-4661-9f19-335a274bf8ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40672", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113908419119395905", "content": "", "creation_timestamp": "2025-01-28T22:49:01.652261Z"}, {"uuid": "ba4f52f3-e047-4d9c-8fcc-d9f7929a7ff5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40677", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113908419167376184", "content": "", "creation_timestamp": "2025-01-28T22:49:01.855224Z"}, {"uuid": "529d3eeb-6814-4ad2-a806-1da6018679c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40670", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113908419075430756", "content": "", "creation_timestamp": "2025-01-28T22:49:02.210892Z"}, {"uuid": "94415deb-ea59-4281-908e-a90d02bc70b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4067", "type": "seen", "source": "https://gist.github.com/EduardoCorpay/fdaeb4ec65cc4a1c8fcd2fb0162de09c", "content": "", "creation_timestamp": "2025-06-11T15:29:00.000000Z"}, {"uuid": "d1f3b87e-e106-4fce-ac34-93097c5629fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40674", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3289", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-40674\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In validateSsid of WifiConfigurationUtil.java, there is a possible way to overflow a system configuration file due to a logic error in the code. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2025-01-28T21:31:04Z\n\ud83d\udccf Modified: 2025-01-28T21:31:04Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-40674\n2. https://android.googlesource.com/platform/packages/modules/Wifi/+/debc548ac085ba1ab0582172b97d965e9a1ea43a\n3. https://source.android.com/security/bulletin/2024-10-01", "creation_timestamp": "2025-01-28T22:09:30.000000Z"}, {"uuid": "1bbad252-cb02-48cc-a3ce-236f3a68e162", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40679", "type": "seen", "source": "https://t.me/cvedetector/14616", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40679 - IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) Log File Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-40679 \nPublished : Jan. 8, 2025, 1:15 a.m. | 38\u00a0minutes ago \nDescription : IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 is vulnerable to an information disclosure vulnerability as sensitive information may be included in a log file under specific conditions. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T03:16:04.000000Z"}, {"uuid": "ca23ccfe-eb1e-43f7-9e51-f7c833420f67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40671", "type": "seen", "source": "https://t.me/cvedetector/10869", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40671 - QNAP RasPlex Local Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-40671 \nPublished : Nov. 13, 2024, 6:15 p.m. | 28\u00a0minutes ago \nDescription : In DevmemIntChangeSparse2 of devicemem_server.c, there is a possible way to achieve arbitrary code execution due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T19:44:58.000000Z"}, {"uuid": "e1a0d055-3bf6-43c2-8cad-fd69815cd312", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40679", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113790061886020708", "content": "", "creation_timestamp": "2025-01-08T01:09:12.152909Z"}, {"uuid": "fbf93f59-a867-4c69-83fe-d1c40edf8fc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40679", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf6ygfbrlo2k", "content": "", "creation_timestamp": "2025-01-08T01:15:26.648520Z"}, {"uuid": "31535298-8af8-43d4-b2eb-9759b9d118ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40679", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf6zy2pkkh2u", "content": "", "creation_timestamp": "2025-01-08T01:43:13.865682Z"}, {"uuid": "21cc0ab3-c8ad-4701-86a5-8538949bde7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40677", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113907760564510018", "content": "", "creation_timestamp": "2025-01-28T20:01:31.464762Z"}, {"uuid": "f57dcd8a-8c34-4382-983b-aaab063e908f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40675", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgtl6zhxvh2g", "content": "", "creation_timestamp": "2025-01-28T23:09:46.790071Z"}, {"uuid": "45b795b7-f8dd-4ea4-9847-0f5755e0a015", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40674", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgtl6zufo32y", "content": "", "creation_timestamp": "2025-01-28T23:09:47.460895Z"}, {"uuid": "fa536762-7712-468a-9551-fa6f17d72e80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40673", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgtl6zxnau2q", "content": "", "creation_timestamp": "2025-01-28T23:09:47.979893Z"}, {"uuid": "076988b5-8e7c-450a-a430-e09475b7819c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40670", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgtl72v22l2b", "content": "", "creation_timestamp": "2025-01-28T23:09:52.588286Z"}, {"uuid": "61d6ab10-9641-47d9-a88d-649fbe0b0266", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40677", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgtl72zu6i2h", "content": "", "creation_timestamp": "2025-01-28T23:09:53.295875Z"}, {"uuid": "ebad0e6d-e01a-49c8-87a1-4054d003409e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40672", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgtl735rsp2q", "content": "", "creation_timestamp": "2025-01-28T23:09:53.950339Z"}, {"uuid": "54c1eb71-8ba5-4b8b-b712-192495c96e6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40673", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113910243846976668", "content": "", "creation_timestamp": "2025-01-29T06:33:03.348251Z"}, {"uuid": "de3650cc-f471-4dfa-9a07-2d7a4fa61826", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40673", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lgvujjmysn2o", "content": "", "creation_timestamp": "2025-01-29T21:02:02.515929Z"}, {"uuid": "b959f0c7-6104-4853-83e3-7517f10c9710", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40675", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lgvujjp5if2c", "content": "", "creation_timestamp": "2025-01-29T21:02:03.066372Z"}, {"uuid": "d5d29110-020c-4e78-aa52-81b9972a698c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40676", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lgvujjrsia2n", "content": "", "creation_timestamp": "2025-01-29T21:02:03.714760Z"}, {"uuid": "c1ba77d1-7f1d-4719-b542-551b66fa5489", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40679", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/601", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-40679\n\ud83d\udd39 Description: IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 is vulnerable to an information disclosure vulnerability as sensitive information may be included in a log file under specific conditions.\n\ud83d\udccf Published: 2025-01-08T00:44:37.346Z\n\ud83d\udccf Modified: 2025-01-08T00:44:37.346Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/7175957", "creation_timestamp": "2025-01-08T01:37:38.000000Z"}, {"uuid": "a059a6c2-cb6f-4f41-8fec-d6c2f3f7bda7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40673", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3288", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-40673\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In Source of ZipFile.java, there is a possible way for an attacker to execute arbitrary code by manipulating Dynamic Code Loading due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2025-01-28T21:31:04Z\n\ud83d\udccf Modified: 2025-01-28T21:31:04Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-40673\n2. https://android.googlesource.com/platform/libcore/+/b17fd2f8fe468e7d32e713b442f610cd33e4e7a9\n3. https://source.android.com/security/bulletin/2024-10-01", "creation_timestamp": "2025-01-28T22:09:30.000000Z"}, {"uuid": "0cedc357-78d6-433a-bb22-e7eb87441556", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40675", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3287", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-40675\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In parseUriInternal of Intent.java, there is a possible infinite loop due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2025-01-28T21:31:04Z\n\ud83d\udccf Modified: 2025-01-28T21:31:04Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-40675\n2. https://android.googlesource.com/platform/frameworks/base/+/c6b5490ec659b5854fd429f453f75de5befa6359\n3. https://source.android.com/security/bulletin/2024-10-01", "creation_timestamp": "2025-01-28T22:09:29.000000Z"}, {"uuid": "939a2ce7-5f90-4dcc-b332-aa87e109f59c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40672", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3293", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-40672\n\ud83d\udd25 CVSS Score: 8.4 (CVSS_V3)\n\ud83d\udd39 Description: In onCreate of ChooserActivity.java, there is a possible way to bypass factory reset protections due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2025-01-28T21:31:04Z\n\ud83d\udccf Modified: 2025-01-28T21:31:04Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-40672\n2. https://android.googlesource.com/platform/packages/modules/IntentResolver/+/ccd29124d0d2276a3071c0418c14dec188cd3727\n3. https://source.android.com/security/bulletin/2024-10-01", "creation_timestamp": "2025-01-28T22:09:37.000000Z"}, {"uuid": "77020303-6614-4c69-98e3-ac6f4ed40043", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40677", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3292", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-40677\n\ud83d\udd25 CVSS Score: 8.4 (CVSS_V3)\n\ud83d\udd39 Description: In shouldSkipForInitialSUW of AdvancedPowerUsageDetail.java, there is a possible way to bypass factory reset protections due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2025-01-28T21:31:04Z\n\ud83d\udccf Modified: 2025-01-28T21:31:04Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-40677\n2. https://android.googlesource.com/platform/packages/apps/Settings/+/db26138f07db830e3fb78283d37de3c0296d93cb\n3. https://source.android.com/security/bulletin/2024-10-01", "creation_timestamp": "2025-01-28T22:09:36.000000Z"}, {"uuid": "49777d48-cfbe-4915-8fc7-88ca424fc467", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40677", "type": "seen", "source": "https://t.me/cvedetector/16638", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40677 - Samsung AdvancedPowerUsage Denial of Service Local Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-40677 \nPublished : Jan. 28, 2025, 8:15 p.m. | 1\u00a0hour, 24\u00a0minutes ago \nDescription : In shouldSkipForInitialSUW of AdvancedPowerUsageDetail.java, there is a possible way to bypass factory reset protections due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 8.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T22:58:27.000000Z"}, {"uuid": "fc8fef30-0778-4fc4-bdcf-158c846c2615", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40676", "type": "seen", "source": "https://t.me/cvedetector/16637", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40676 - Google AccountManagerService Confused Deputy Local Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-40676 \nPublished : Jan. 28, 2025, 8:15 p.m. | 1\u00a0hour, 24\u00a0minutes ago \nDescription : In checkKeyIntent of AccountManagerService.java, there is a possible way to bypass intent security check and install an unknown app due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T22:58:26.000000Z"}, {"uuid": "512b5d26-8004-40b8-8399-07cd3d6a6966", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40675", "type": "seen", "source": "https://t.me/cvedetector/16636", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40675 - Android Intent parseUriInternal Infinite Loop Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-40675 \nPublished : Jan. 28, 2025, 8:15 p.m. | 1\u00a0hour, 24\u00a0minutes ago \nDescription : In parseUriInternal of Intent.java, there is a possible infinite loop due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T22:58:22.000000Z"}, {"uuid": "feac0652-a1ca-4da6-8874-3521e0b2ddfd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40674", "type": "seen", "source": "https://t.me/cvedetector/16635", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40674 - \"Netgear WifiConfiguration Overflow Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-40674 \nPublished : Jan. 28, 2025, 8:15 p.m. | 1\u00a0hour, 24\u00a0minutes ago \nDescription : In validateSsid of WifiConfigurationUtil.java, there is a possible way to overflow a system configuration file due to a logic error in the code. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T22:58:21.000000Z"}, {"uuid": "7b781eaa-e810-47d0-89bc-2efa513b9255", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40673", "type": "seen", "source": "https://t.me/cvedetector/16634", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40673 - Apache ZipFile Java Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-40673 \nPublished : Jan. 28, 2025, 8:15 p.m. | 1\u00a0hour, 24\u00a0minutes ago \nDescription : In Source of ZipFile.java, there is a possible way for an attacker to execute arbitrary code by manipulating Dynamic Code Loading due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T22:58:21.000000Z"}, {"uuid": "035e6b80-96a8-4918-a7ec-75a3b612dd52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40672", "type": "seen", "source": "https://t.me/cvedetector/16633", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40672 - Samsung Android ChooserActivity Java Missing Permission Check Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-40672 \nPublished : Jan. 28, 2025, 8:15 p.m. | 1\u00a0hour, 24\u00a0minutes ago \nDescription : In onCreate of ChooserActivity.java, there is a possible way to bypass factory reset protections due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 8.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T22:58:20.000000Z"}, {"uuid": "d258df93-907f-4b8a-8351-7f32e99f9556", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40670", "type": "seen", "source": "https://t.me/cvedetector/16632", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40670 - Adobe Reader Use After Free (Local Privilege Escalation)\", \n  \"Content\": \"CVE ID : CVE-2024-40670 \nPublished : Jan. 28, 2025, 8:15 p.m. | 1\u00a0hour, 24\u00a0minutes ago \nDescription : In TBD of TBD, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 8.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T22:58:19.000000Z"}, {"uuid": "7e4096fc-98ef-471f-8745-e845778cd9cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40672", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113907642526418597", "content": "", "creation_timestamp": "2025-01-28T19:31:30.492948Z"}, {"uuid": "ae973b45-7c82-48b7-ba2e-bcc1079ebf85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40670", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113907642512259514", "content": "", "creation_timestamp": "2025-01-28T19:31:31.174473Z"}, {"uuid": "752e3146-108a-4b93-bc02-50ff316921ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40673", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113907701524268534", "content": "", "creation_timestamp": "2025-01-28T19:46:30.607450Z"}, {"uuid": "425aa859-09a6-4eb1-92ab-114bfaa91c11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40674", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113907701538509621", "content": "", "creation_timestamp": "2025-01-28T19:46:30.861607Z"}, {"uuid": "6a5b3d69-a544-4b6a-b147-0c8307e5f5d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40675", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113907701552776098", "content": "", "creation_timestamp": "2025-01-28T19:46:31.244997Z"}, {"uuid": "e5f64357-a6e3-4653-b610-ff8e68976597", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40676", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113907701567556684", "content": "", "creation_timestamp": "2025-01-28T19:46:31.470427Z"}, {"uuid": "e8462de8-1299-46e3-aa02-dd4de54540b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40670", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgtbiozjmb2b", "content": "", "creation_timestamp": "2025-01-28T20:16:14.616245Z"}, {"uuid": "ec0a8a59-cd1c-475e-b2f8-ce3640b5064a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40672", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgtbirnj3g2c", "content": "", "creation_timestamp": "2025-01-28T20:16:17.113803Z"}, {"uuid": "bde4a4bc-2a49-469a-bccf-a5ff1a6ed72b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40673", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgtbiu4cir2r", "content": "", "creation_timestamp": "2025-01-28T20:16:19.878953Z"}, {"uuid": "2136a665-453c-404b-bf55-8533ecacb172", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40674", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgtbiwdium27", "content": "", "creation_timestamp": "2025-01-28T20:16:22.038215Z"}, {"uuid": "52f695e5-909b-4bef-89ca-9ab07cd0a01d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40675", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgtbiyvhlu2i", "content": "", "creation_timestamp": "2025-01-28T20:16:24.782081Z"}, {"uuid": "680ab3ff-bbb1-406d-a7fa-61aa4dc8f81e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40676", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgtbj37ouj2r", "content": "", "creation_timestamp": "2025-01-28T20:16:26.818010Z"}, {"uuid": "3c2e01c5-c84f-4662-8bd2-eb5ecc4d1bba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40677", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgtbj5jkvc2t", "content": "", "creation_timestamp": "2025-01-28T20:16:29.203294Z"}, {"uuid": "9fb2a2d1-98c3-4bb5-bd09-7b6251d79b22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40671", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/aaa30339-107b-4cb3-8a1a-3e5d8398b429", "content": "", "creation_timestamp": "2024-11-07T17:04:54.853683Z"}, {"uuid": "47bd999e-eabd-46eb-9b0a-8664d4c4cba8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40676", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3294", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-40676\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In checkKeyIntent of AccountManagerService.java, there is a possible way to bypass intent security check and install an unknown app due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2025-01-28T21:31:04Z\n\ud83d\udccf Modified: 2025-01-28T21:31:04Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-40676\n2. https://android.googlesource.com/platform/frameworks/base/+/e8a53246607b52b15269f97aef9ba7e928ba2473\n3. https://source.android.com/security/bulletin/2024-10-01", "creation_timestamp": "2025-01-28T22:09:38.000000Z"}, {"uuid": "3530201b-c931-41a1-b529-f251503fca68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40679", "type": "seen", "source": "Telegram/VlxboRjobngVdFjM7ywHtBUvnA2O83ve4iHoRDCTSIq7qg85", "content": "", "creation_timestamp": "2025-02-01T17:28:11.000000Z"}]}