{"vulnerability": "cve-2024-4306", "sightings": [{"uuid": "1b0453f8-423b-463f-a72f-2e924b135ec3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43063", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113781048565394179", "content": "", "creation_timestamp": "2025-01-06T10:57:00.066236Z"}, {"uuid": "97a807f8-f64d-4aba-8e86-1dc0bc5383a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43064", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113781107563141439", "content": "", "creation_timestamp": "2025-01-06T11:12:00.081056Z"}, {"uuid": "5e33a971-d5ff-472c-bebd-3412d726279c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43063", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf2z22derx2e", "content": "", "creation_timestamp": "2025-01-06T11:15:47.233858Z"}, {"uuid": "7b1c0e15-147e-4499-8406-7964bc292f61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43064", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf2z24gva622", "content": "", "creation_timestamp": "2025-01-06T11:15:49.454997Z"}, {"uuid": "bc07c6af-9be3-4d36-803f-8c61b9e748af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43064", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf32kw5wpz2i", "content": "", "creation_timestamp": "2025-01-06T11:43:07.136242Z"}, {"uuid": "e62c48bc-3bf4-4aa5-8137-aec918de0a2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43063", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf32kx4udq2q", "content": "", "creation_timestamp": "2025-01-06T11:43:11.020978Z"}, {"uuid": "d20c4c12-e52a-41b6-b6e5-2b135654b433", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43061", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114098092985513084", "content": "", "creation_timestamp": "2025-03-03T10:45:33.633824Z"}, {"uuid": "d9215e62-ffd7-4df7-8275-041dab5c5f1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43066", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114296413423674894", "content": "", "creation_timestamp": "2025-04-07T11:21:03.442604Z"}, {"uuid": "4f6bd8e7-79c0-4b6c-97af-8a39f4932a22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43066", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-09-10T07:00:41.000000Z"}, {"uuid": "a5d283bb-9afb-48c4-b391-967299b8940d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43065", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-09-10T07:00:41.000000Z"}, {"uuid": "86d4dd08-715c-4a7c-a87b-d0daa3a9708e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43064", "type": "seen", "source": "MISP/3445a876-cced-4346-bf37-e276ba39cff4", "content": "", "creation_timestamp": "2025-09-02T18:30:14.000000Z"}, {"uuid": "b4ef083f-da3f-4c69-bf7b-bd7e59500c82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43060", "type": "seen", "source": "https://t.me/cvedetector/19344", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43060 - Qualcomm Snapdragon Voice Activation Memory Corruption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43060 \nPublished : March 3, 2025, 11:15 a.m. | 54\u00a0minutes ago \nDescription : Memory corruption during voice activation, when sound model parameters are loaded from HLOS to ADSP. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-03T13:52:38.000000Z"}, {"uuid": "17b35041-18eb-42eb-9dec-98cff989d6fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43066", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-08-09T17:25:38.000000Z"}, {"uuid": "bcc2013e-ff99-4098-9072-d5b7396d0c81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43063", "type": "seen", "source": "https://t.me/cvedetector/14353", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43063 - Apache Mail Server Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43063 \nPublished : Jan. 6, 2025, 11:15 a.m. | 28\u00a0minutes ago \nDescription : information disclosure while invoking the mailbox read API. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-06T12:45:00.000000Z"}, {"uuid": "6edc97c5-8d68-47cf-9e63-3ecc0921de00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43067", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-09-10T07:00:41.000000Z"}, {"uuid": "689fe8b1-80cc-4308-adc0-7d60e75033d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43065", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-08-09T17:25:38.000000Z"}, {"uuid": "d8adb53b-cbb1-4d0f-84f1-d03970ecff2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43067", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-08-09T17:25:38.000000Z"}, {"uuid": "b94405ff-65d8-4f9f-bfd9-ef98a67431ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43064", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5840", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-43064\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Uncontrolled resource consumption when a driver, an application or a SMMU client tries to access the global registers through SMMU.\n\ud83d\udccf Published: 2025-01-06T10:33:21.864Z\n\ud83d\udccf Modified: 2025-02-28T06:09:02.181Z\n\ud83d\udd17 References:\n1. https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html", "creation_timestamp": "2025-02-28T06:25:57.000000Z"}, {"uuid": "1ea87111-3412-4724-b24f-d541f700690b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43062", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6187", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-43062\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Memory corruption caused by missing locks and checks on the DMA fence and improper synchronization.\n\ud83d\udccf Published: 2025-03-03T10:07:29.197Z\n\ud83d\udccf Modified: 2025-03-03T10:07:29.197Z\n\ud83d\udd17 References:\n1. https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html", "creation_timestamp": "2025-03-03T10:30:04.000000Z"}, {"uuid": "5e52ea41-f490-4d9e-8821-fdcd636fef57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43061", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6188", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-43061\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Memory corruption during voice activation, when sound model parameters are loaded from HLOS, and the received sound model list is empty in HLOS drive.\n\ud83d\udccf Published: 2025-03-03T10:07:28.054Z\n\ud83d\udccf Modified: 2025-03-03T10:07:28.054Z\n\ud83d\udd17 References:\n1. https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html", "creation_timestamp": "2025-03-03T10:30:05.000000Z"}, {"uuid": "a19fc64c-2ce4-42e7-b46b-9e9f5bfdf471", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43064", "type": "seen", "source": "https://t.me/cvedetector/14344", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43064 - VMware ESXi GPU Acceleration Vulnerability - Unchecked Resource Consumption\", \n  \"Content\": \"CVE ID : CVE-2024-43064 \nPublished : Jan. 6, 2025, 11:15 a.m. | 28\u00a0minutes ago \nDescription : Uncontrolled resource consumption when a driver, an application or a SMMU client tries to access the global registers through SMMU. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-06T12:44:50.000000Z"}]}