{"vulnerability": "CVE-2024-3467", "sightings": [{"uuid": "69c55c2f-88c1-4ecd-9229-1bf8a2daac9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34673", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113433665117012341", "content": "", "creation_timestamp": "2024-11-06T02:32:49.009225Z"}, {"uuid": "f496cec3-3306-4cb4-ad91-db1d4d38dd16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34674", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113433665132664858", "content": "", "creation_timestamp": "2024-11-06T02:32:49.332661Z"}, {"uuid": "a6bc4b52-e75b-4f74-aaf2-b6775586687d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34675", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113433665147209911", "content": "", "creation_timestamp": "2024-11-06T02:32:49.825596Z"}, {"uuid": "aa70a05e-5621-4645-b5ce-983f2018d9c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34676", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113433665161191617", "content": "", "creation_timestamp": "2024-11-06T02:32:49.887139Z"}, {"uuid": "6c18962a-a8c8-4f65-b701-6f66e945789d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34677", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113433724159209434", "content": "", "creation_timestamp": "2024-11-06T02:47:50.151077Z"}, {"uuid": "ce678192-520b-437a-80bd-0760e93f2ad7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34678", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113433724173410760", "content": "", "creation_timestamp": "2024-11-06T02:47:50.216650Z"}, {"uuid": "8ddaecdf-1400-447f-a996-509dacecc407", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34679", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113433724187370969", "content": "", "creation_timestamp": "2024-11-06T02:47:50.474901Z"}, {"uuid": "14fd1886-93dc-4018-ab39-b997cf78895d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34673", "type": "seen", "source": "https://t.me/cvedetector/9983", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34673 - AT&amp;T Modem Input Validation Denial-of-Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-34673 \nPublished : Nov. 6, 2024, 3:15 a.m. | 34\u00a0minutes ago \nDescription : Improper Input Validation in IpcProtocol in Modem prior to SMR Nov-2024 Release 1 allows local attackers to cause Denial-of-Service. \nSeverity: 4.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-06T04:57:46.000000Z"}, {"uuid": "1008bd3e-9611-4af7-a0cc-149cd4b43359", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34677", "type": "seen", "source": "https://t.me/cvedetector/9987", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34677 - Samsung System UI Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-34677 \nPublished : Nov. 6, 2024, 3:15 a.m. | 34\u00a0minutes ago \nDescription : Exposure of sensitive information in System UI prior to SMR Nov-2024 Release 1 allow local attackers to make malicious apps appear as legitimate. \nSeverity: 4.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-06T04:57:51.000000Z"}, {"uuid": "200d1d6e-5aa1-4443-8c3b-3365c48b6014", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34676", "type": "seen", "source": "https://t.me/cvedetector/9986", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34676 - \"CenOS libsubextractor.so Out-of-Bounds Write Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-34676 \nPublished : Nov. 6, 2024, 3:15 a.m. | 34\u00a0minutes ago \nDescription : Out-of-bounds write in parsing subtitle file in libsubextractor.so prior to SMR Nov-2024 Release 1 allows local attackers to cause memory corruption. User interaction is required for triggering this vulnerability. \nSeverity: 4.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-06T04:57:51.000000Z"}, {"uuid": "8d57d73b-6392-46ff-9f46-f288ea1315c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34675", "type": "seen", "source": "https://t.me/cvedetector/9985", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34675 - OnePlus Pixel Density Unauthorized Screen Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-34675 \nPublished : Nov. 6, 2024, 3:15 a.m. | 34\u00a0minutes ago \nDescription : Improper access control in Dex Mode prior to SMR Nov-2024 Release 1 allows physical attackers to temporarily access to unlocked screen. \nSeverity: 2.4 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-06T04:57:50.000000Z"}, {"uuid": "2b4762f3-818b-4346-ade1-66b1027ac7d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34674", "type": "seen", "source": "https://t.me/cvedetector/9984", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34674 - Samsung Contacts Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-34674 \nPublished : Nov. 6, 2024, 3:15 a.m. | 34\u00a0minutes ago \nDescription : Improper access control in Contacts prior to SMR Nov-2024 Release 1 allows physical attackers to access data across multiple user profiles. \nSeverity: 4.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-06T04:57:49.000000Z"}, {"uuid": "6e45cd25-b670-4f5b-90f4-0d1e1d33b5b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34671", "type": "seen", "source": "https://t.me/cvedetector/7322", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34671 - Samsung Internet Sensitive Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-34671 \nPublished : Oct. 8, 2024, 7:15 a.m. | 38\u00a0minutes ago \nDescription : Use of implicit intent for sensitive communication in translation\ud63bin Samsung Internet prior to version 26.0.3.1 allows local attackers to get sensitive information. User interaction is required for triggering this vulnerability. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-08T10:21:43.000000Z"}, {"uuid": "390a1682-322e-48fd-b3d6-9b067d64b4cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34670", "type": "seen", "source": "https://t.me/cvedetector/7321", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34670 - Samsung Sound Assistant Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-34670 \nPublished : Oct. 8, 2024, 7:15 a.m. | 38\u00a0minutes ago \nDescription : Use of implicit intent for sensitive communication in Sound Assistant prior to version 6.1.0.9 allows local attackers to get sensitive information. \nSeverity: 4.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-08T10:21:42.000000Z"}, {"uuid": "758cacc7-5941-4340-9f6b-276958b618cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34672", "type": "seen", "source": "https://t.me/cvedetector/7319", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34672 - Samsung Video Player Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-34672 \nPublished : Oct. 8, 2024, 7:15 a.m. | 38\u00a0minutes ago \nDescription : Improper input validation in SamsungVideoPlayer prior to versions 7.3.29.1 in Android 12, 7.3.36.1 in Android 13, and 7.3.41.230 in Android 14 allows local attackers to access video file of other users. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-08T10:21:40.000000Z"}, {"uuid": "81856786-23ab-4bcf-9d61-32719f77a6fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34679", "type": "seen", "source": "https://t.me/cvedetector/9982", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34679 - Crane Local File Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-34679 \nPublished : Nov. 6, 2024, 3:15 a.m. | 34\u00a0minutes ago \nDescription : Incorrect default permissions in Crane prior to SMR Nov-2024 Release 1 allows local attackers to access files with phone privilege. \nSeverity: 4.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-06T04:57:45.000000Z"}, {"uuid": "84a49f5a-27a7-42a6-a56b-3a7e844b8311", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34678", "type": "seen", "source": "https://t.me/cvedetector/9981", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34678 - Apache Shape Out-of-Bounds Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-34678 \nPublished : Nov. 6, 2024, 3:15 a.m. | 34\u00a0minutes ago \nDescription : Out-of-bounds write in libsapeextractor.so prior to SMR Nov-2024 Release 1 allows local attackers to cause memory corruption. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-06T04:57:44.000000Z"}]}