{"vulnerability": "CVE-2024-3473", "sightings": [{"uuid": "57e2457e-c389-4167-891e-a4e95ee9eeb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34732", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113907583438463077", "content": "", "creation_timestamp": "2025-01-28T19:16:28.811876Z"}, {"uuid": "cb7c6c87-9f1e-46c3-900a-41dba47661e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34733", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113907583454099650", "content": "", "creation_timestamp": "2025-01-28T19:16:29.067381Z"}, {"uuid": "f099176d-1d66-4165-b674-d21c03a75254", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34730", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbycz2efl2j", "content": "", "creation_timestamp": "2025-01-21T23:16:43.866700Z"}, {"uuid": "2ab160fc-3860-49de-a879-000fea7456ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34732", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgtbhvw6w62w", "content": "", "creation_timestamp": "2025-01-28T20:15:48.028603Z"}, {"uuid": "dac11b6c-c809-474e-a08f-fba03f9be85e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34733", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgtbhyomdc2t", "content": "", "creation_timestamp": "2025-01-28T20:15:50.542160Z"}, {"uuid": "2b3d997a-039b-4af1-8afe-0269cfc09f77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34732", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113908418711853397", "content": "", "creation_timestamp": "2025-01-28T22:48:55.779338Z"}, {"uuid": "5c289bdc-30cd-4cba-854c-5645e01b620b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34733", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113908418805901133", "content": "", "creation_timestamp": "2025-01-28T22:48:56.511611Z"}, {"uuid": "3bdd2615-d433-4866-b78e-966160c31d71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34738", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8982", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-34738\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In multiple functions of AppOpsService.java, there is a possible way for unprivileged apps to read their own restrictRead app-op states due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2024-08-15T21:56:32.460Z\n\ud83d\udccf Modified: 2025-03-26T21:10:58.257Z\n\ud83d\udd17 References:\n1. https://android.googlesource.com/platform/frameworks/base/+/21d764807b3dcd402d63e2b4c9fbae1c9965400a\n2. https://source.android.com/security/bulletin/2024-08-01", "creation_timestamp": "2025-03-26T21:25:47.000000Z"}, {"uuid": "88f4f61a-7e82-4684-a008-42315e098dab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34730", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2595", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-34730\n\ud83d\udd39 Description: In multiple locations, there is a possible bypass of user consent to enabling new Bluetooth HIDs due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2025-01-21T23:04:42.520Z\n\ud83d\udccf Modified: 2025-01-22T17:41:21.919Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/2025-01-01", "creation_timestamp": "2025-01-22T18:02:21.000000Z"}, {"uuid": "bf8885b8-4de5-4a3b-ad7f-c00c9c8c37ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34733", "type": "seen", "source": "https://t.me/cvedetector/16642", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34733 - Apache DRAM Arbitrary Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-34733 \nPublished : Jan. 28, 2025, 8:15 p.m. | 1\u00a0hour, 25\u00a0minutes ago \nDescription : In DevmemXIntMapPages of devicemem_server.c, there is a possible arbitrary code execution due to an integer overflow. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 8.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T22:58:32.000000Z"}, {"uuid": "7f35b59e-fcd2-4755-8d65-85e2db947842", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34732", "type": "seen", "source": "https://t.me/cvedetector/16641", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34732 - Vulnerability in RGX MMUCache Invalidate in AMD Device\", \n  \"Content\": \"CVE ID : CVE-2024-34732 \nPublished : Jan. 28, 2025, 8:15 p.m. | 1\u00a0hour, 25\u00a0minutes ago \nDescription : In RGXMMUCacheInvalidate of rgxmem.c, there is a possible arbitrary code execution due to a race condition. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 8.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T22:58:29.000000Z"}, {"uuid": "310f8e8a-8ca4-4b56-a1d9-16399377f716", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34739", "type": "seen", "source": "https://t.me/cvedetector/3306", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34739 - Android USB Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-34739 \nPublished : Aug. 15, 2024, 10:15 p.m. | 38\u00a0minutes ago \nDescription : In shouldRestrictOverlayActivities of UsbProfileGroupSettingsManager.java, there is a possible escape from SUW due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-16T01:10:47.000000Z"}, {"uuid": "cb174b13-be97-4fb8-9987-8da017539e2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34730", "type": "seen", "source": "https://t.me/cvedetector/16057", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34730 - Padlock Bluetooth HID Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-34730 \nPublished : Jan. 21, 2025, 11:15 p.m. | 39\u00a0minutes ago \nDescription : In multiple locations, there is a possible bypass of user consent to enabling new Bluetooth HIDs due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-22T01:21:08.000000Z"}, {"uuid": "2df71018-58e6-41b2-997a-d62bc075c294", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34731", "type": "seen", "source": "https://t.me/cvedetector/3305", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34731 - Apache DS Internal Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-34731 \nPublished : Aug. 15, 2024, 10:15 p.m. | 38\u00a0minutes ago \nDescription : In multiple functions of TranscodingResourcePolicy.cpp, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-16T01:10:47.000000Z"}, {"uuid": "deca2902-eacc-4818-b1a2-7a25d730d4e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34736", "type": "seen", "source": "https://t.me/cvedetector/3303", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34736 - Stagefright Android B-Frame Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-34736 \nPublished : Aug. 15, 2024, 10:15 p.m. | 38\u00a0minutes ago \nDescription : In setupVideoEncoder of StagefrightRecorder.cpp, there is a possible asynchronous playback when B-frame support is enabled. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-16T01:10:42.000000Z"}, {"uuid": "3fd7ea28-c3f8-4077-aecc-6dcd94d1666f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34738", "type": "seen", "source": "https://t.me/cvedetector/3301", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34738 - Google Play Services AppOps CVE-Local Escalation of Privilege\", \n  \"Content\": \"CVE ID : CVE-2024-34738 \nPublished : Aug. 15, 2024, 10:15 p.m. | 38\u00a0minutes ago \nDescription : In multiple functions of AppOpsService.java, there is a possible way for unprivileged apps to read their own restrictRead app-op states due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-16T01:10:40.000000Z"}, {"uuid": "a9f513fd-84e1-4f11-b161-855ca4f50ad2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34734", "type": "seen", "source": "https://t.me/cvedetector/3298", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34734 - Fortinet VPN Insecure Default Value Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-34734 \nPublished : Aug. 15, 2024, 10:15 p.m. | 38\u00a0minutes ago \nDescription : In onForegroundServiceButtonClicked of FooterActionsViewModel.kt, there is a possible way to disable the active VPN app from the lockscreen due to an insecure default value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-16T01:10:34.000000Z"}, {"uuid": "41145c06-ff60-490a-9f3b-0ac75577e3e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34737", "type": "seen", "source": "https://t.me/cvedetector/3296", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-34737 - \"Microsoft Windows ActivityClientController Pip Window Privilege Escalation Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-34737 \nPublished : Aug. 15, 2024, 10:15 p.m. | 38\u00a0minutes ago \nDescription : In ensureSetPipAspectRatioQuotaTracker of ActivityClientController.java, there is a possible way to generate unmovable and undeletable pip windows due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-16T01:10:32.000000Z"}]}