{"vulnerability": "CVE-2024-3468", "sightings": [{"uuid": "6fc0259c-20ad-4981-8099-373de26879d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34680", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113433724201771931", "content": "", "creation_timestamp": "2024-11-06T02:47:50.735242Z"}, {"uuid": "d27f3dbb-c278-4d53-8ce3-7644f2d7addb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34681", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113433783203626627", "content": "", "creation_timestamp": "2024-11-06T03:02:50.966939Z"}, {"uuid": "4d33e3b8-a5a5-43f4-b3f7-c8d17711d48f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34682", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113433783217730295", "content": "", "creation_timestamp": "2024-11-06T03:02:51.090828Z"}, {"uuid": "b4634f18-994f-48b5-8b4b-b6dc796d79d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34682", "type": "seen", "source": "https://t.me/cvedetector/9979", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34682 - TP-Link Wi-Fi Router Authorization Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-34682 \nPublished : Nov. 6, 2024, 3:15 a.m. | 34\u00a0minutes ago \nDescription : Improper authorization in Settings prior to SMR Nov-2024 Release 1 allows physical attackers to access stored WiFi password in Maintenance Mode. \nSeverity: 2.4 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-06T04:57:43.000000Z"}, {"uuid": "86fc4231-7fee-4691-8618-e51e71527036", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34681", "type": "seen", "source": "https://t.me/cvedetector/9978", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34681 - Samsung Galaxy Watch Persistent Local Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-34681 \nPublished : Nov. 6, 2024, 3:15 a.m. | 34\u00a0minutes ago \nDescription : Improper input validation in BluetoothAdapter prior to SMR Nov-2024 Release 1 allows local attackers to cause local permanent denial of service on Galaxy Watch. \nSeverity: 6.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-06T04:57:39.000000Z"}, {"uuid": "7eeab60e-5c84-4e96-a4f1-210e48f02ee8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34680", "type": "seen", "source": "https://t.me/cvedetector/9977", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34680 - \"WlanTest Implicit Intent Sensitive Information Disclosure\"\", \n  \"Content\": \"CVE ID : CVE-2024-34680 \nPublished : Nov. 6, 2024, 3:15 a.m. | 34\u00a0minutes ago \nDescription : Use of implicit intent for sensitive communication in WlanTest prior to SMR Nov-2024 Release 1 allows local attackers to get sensitive information. \nSeverity: 4.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-06T04:57:39.000000Z"}, {"uuid": "040fb25e-9a2c-4801-a448-bfc68df5df85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34689", "type": "seen", "source": "https://t.me/cvedetector/251", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34689 - WebFlow Services of SAP Business Workflow allows a\", \n  \"Content\": \"CVE ID : CVE-2024-34689 \nPublished : July 9, 2024, 5:15 a.m. | 19\u00a0minutes ago \nDescription : WebFlow Services of SAP Business Workflow allows  \nan authenticated attacker to enumerate accessible HTTP endpoints in the  \ninternal network by specially crafting HTTP requests. On successful  \nexploitation this can result in information disclosure. It has no impact on  \nintegrity and availability of the application. \nSeverity: 5.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T07:38:40.000000Z"}, {"uuid": "fee7c291-c801-420a-ba1c-00a5209dccff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34685", "type": "seen", "source": "https://t.me/cvedetector/234", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34685 - Due to weak encoding of user-controlled input in S\", \n  \"Content\": \"CVE ID : CVE-2024-34685 \nPublished : July 9, 2024, 4:15 a.m. | 26\u00a0minutes ago \nDescription : Due to weak encoding of user-controlled input in  \nSAP NetWeaver Knowledge Management XMLEditor which allows malicious scripts can  \nbe executed in the application, potentially leading to a Cross-Site Scripting  \n(XSS) vulnerability. This has no impact on the availability of the application  \nbut it has a low impact on its confidentiality and integrity. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T06:48:11.000000Z"}]}