{"vulnerability": "CVE-2024-3446", "sightings": [{"uuid": "31211ea5-5ba0-4e06-87bb-dbcb9c504ccf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3446", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lyobvxu5h22i", "content": "", "creation_timestamp": "2025-09-12T22:13:53.905653Z"}, {"uuid": "2be7b57b-7875-4672-b458-2d9db4123572", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34462", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3mc3vx2e4e22b", "content": "", "creation_timestamp": "2026-01-10T21:03:49.468920Z"}, {"uuid": "c841ea55-e656-4612-a0ee-c043ec1a3980", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34469", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7239", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-34469\nURL\uff1ahttps://github.com/Toxich4/CVE-2024-34469\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-07T07:50:09.000000Z"}, {"uuid": "1c0021c3-4777-4b71-ae54-c87f4dbd2978", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3446", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14626", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-3446\n\ud83d\udd25 CVSS Score: 8.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.\n\ud83d\udccf Published: 2024-04-09T19:34:45.646Z\n\ud83d\udccf Modified: 2025-05-02T23:02:59.338Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2024:6964\n2. https://access.redhat.com/security/cve/CVE-2024-3446\n3. https://bugzilla.redhat.com/show_bug.cgi?id=2274211\n4. https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/", "creation_timestamp": "2025-05-02T23:17:21.000000Z"}, {"uuid": "1653851b-889b-4486-a62d-2766ec5193ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34463", "type": "seen", "source": "https://t.me/cvedetector/4695", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34463 - BPL Personal Weighing Scale BLE Data Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-34463 \nPublished : Sept. 3, 2024, 2:15 p.m. | 15\u00a0minutes ago \nDescription : BPL Personal Weighing Scale PWS-01BT IND/09/18/599 devices send sensitive information in unencrypted BLE packets. (The packet data also lacks authentication and integrity protection.) \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-03T16:38:33.000000Z"}]}