{"vulnerability": "cve-2024-4308", "sightings": [{"uuid": "842cb439-d055-4482-8022-32f5f27d7829", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43083", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/aaa30339-107b-4cb3-8a1a-3e5d8398b429", "content": "", "creation_timestamp": "2024-11-07T17:04:54.853683Z"}, {"uuid": "4f82f141-8162-4a43-9526-0857fe524a2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43081", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/aaa30339-107b-4cb3-8a1a-3e5d8398b429", "content": "", "creation_timestamp": "2024-11-07T17:04:54.853683Z"}, {"uuid": "7db25042-7bde-4b2a-aa7d-552bfc8de36d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43085", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/aaa30339-107b-4cb3-8a1a-3e5d8398b429", "content": "", "creation_timestamp": "2024-11-07T17:04:54.853683Z"}, {"uuid": "405fec24-3871-4879-a292-991004911c93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43084", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/aaa30339-107b-4cb3-8a1a-3e5d8398b429", "content": "", "creation_timestamp": "2024-11-07T17:04:54.853683Z"}, {"uuid": "9bea7403-366b-4cb3-b0e7-1ae38bcb807d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43082", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/aaa30339-107b-4cb3-8a1a-3e5d8398b429", "content": "", "creation_timestamp": "2024-11-07T17:04:54.853683Z"}, {"uuid": "24790afd-4aa1-4f6a-91a7-87ffc373f0d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43086", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/aaa30339-107b-4cb3-8a1a-3e5d8398b429", "content": "", "creation_timestamp": "2024-11-07T17:04:54.853683Z"}, {"uuid": "52e52294-f92b-4b88-aa17-451c79e63588", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43087", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/aaa30339-107b-4cb3-8a1a-3e5d8398b429", "content": "", "creation_timestamp": "2024-11-07T17:04:54.853683Z"}, {"uuid": "04fdb617-6ee0-4a23-8331-de94da451c22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43080", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/aaa30339-107b-4cb3-8a1a-3e5d8398b429", "content": "", "creation_timestamp": "2024-11-07T17:04:54.853683Z"}, {"uuid": "220f0a15-48ee-4ec6-9615-27e35ee49ed9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43089", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/aaa30339-107b-4cb3-8a1a-3e5d8398b429", "content": "", "creation_timestamp": "2024-11-07T17:04:54.853683Z"}, {"uuid": "6a3c8a28-67ef-4ad7-801e-b24c66304ac2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43088", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/aaa30339-107b-4cb3-8a1a-3e5d8398b429", "content": "", "creation_timestamp": "2024-11-07T17:04:54.853683Z"}, {"uuid": "7801d5d1-c1b6-4142-82e3-b0ec67fc9832", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43083", "type": "seen", "source": "https://t.me/cvedetector/10861", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43083 - Intelbras WiFiConfiguration Persistent Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43083 \nPublished : Nov. 13, 2024, 6:15 p.m. | 28\u00a0minutes ago \nDescription : In validate of WifiConfigurationUtil.java , there is a possible persistent denial of service due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T19:44:45.000000Z"}, {"uuid": "68a29fcf-40b8-43cf-b5a0-c90efa448a13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43082", "type": "seen", "source": "https://t.me/cvedetector/10871", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43082 - Apache FtpClient Unrestricted File Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43082 \nPublished : Nov. 13, 2024, 6:15 p.m. | 28\u00a0minutes ago \nDescription : In onActivityResult of EditUserPhotoController.java, there is a possible cross-user media read due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T19:44:59.000000Z"}, {"uuid": "9545bf74-ef58-4f19-af6e-a79bbebbbf40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43089", "type": "seen", "source": "https://t.me/cvedetector/10857", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43089 - Android MediaProvider Java Critical Permission Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43089 \nPublished : Nov. 13, 2024, 6:15 p.m. | 28\u00a0minutes ago \nDescription : In updateInternal of MediaProvider.java , there is a possible access of another app's files due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T19:44:42.000000Z"}, {"uuid": "7d54d8a2-c07e-4d2f-8947-dc35459881ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43084", "type": "seen", "source": "https://t.me/cvedetector/10860", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43084 - Apache Mod_security Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43084 \nPublished : Nov. 13, 2024, 6:15 p.m. | 28\u00a0minutes ago \nDescription : In visitUris of multiple files, there is a possible information disclosure due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T19:44:45.000000Z"}, {"uuid": "8ac24db2-c753-4136-ab80-0f5932cf460f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43087", "type": "seen", "source": "https://t.me/cvedetector/10855", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43087 - Android AccessibilitySettings local privilege escalation vulnerability.\", \n  \"Content\": \"CVE ID : CVE-2024-43087 \nPublished : Nov. 13, 2024, 6:15 p.m. | 28\u00a0minutes ago \nDescription : In getInstalledAccessibilityPreferences of AccessibilitySettings.java, there is a possible way to hide an enabled accessibility service in the accessibility service settings due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T19:44:38.000000Z"}, {"uuid": "d00503de-c7d0-4d41-bfbf-782a0ce969e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43086", "type": "seen", "source": "https://t.me/cvedetector/10854", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43086 - Samsung AccountManagerService Confidential Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-43086 \nPublished : Nov. 13, 2024, 6:15 p.m. | 28\u00a0minutes ago \nDescription : In validateAccountsInternal of AccountManagerService.java, there is a possible way to leak account credentials to a third party app due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T19:44:37.000000Z"}, {"uuid": "d251d974-f993-4b5d-ba02-2da379b02bc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43085", "type": "seen", "source": "https://t.me/cvedetector/10853", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43085 - Android UsbDeviceManager Local Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-43085 \nPublished : Nov. 13, 2024, 6:15 p.m. | 28\u00a0minutes ago \nDescription : In handleMessage of UsbDeviceManager.java, there is a possible method to access device contents over USB without unlocking the device due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T19:44:36.000000Z"}, {"uuid": "c4803e4f-eef6-4719-9854-45805eb9662b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43080", "type": "seen", "source": "https://t.me/cvedetector/10870", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43080 - Apache Android AppRestrictionsFragment.java Unvalidated Deserialization Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-43080 \nPublished : Nov. 13, 2024, 6:15 p.m. | 28\u00a0minutes ago \nDescription : In onReceive of AppRestrictionsFragment.java, there is a possible escalation of privilege due to unsafe deserialization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T19:44:58.000000Z"}, {"uuid": "928d43fe-49e1-4710-b38a-5e5e93356d3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43088", "type": "seen", "source": "https://t.me/cvedetector/10856", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43088 - Android AppInfoBase.java Privilege Escalation startPosition\", \n  \"Content\": \"CVE ID : CVE-2024-43088 \nPublished : Nov. 13, 2024, 6:15 p.m. | 28\u00a0minutes ago \nDescription : In multiple functions in AppInfoBase.java, there is a possible way to manipulate app permission settings belonging to another user on the device due to a missing permission check. This could lead to local escalation of privilege across user boundaries with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T19:44:38.000000Z"}]}