{"vulnerability": "cve-2024-4305", "sightings": [{"uuid": "c233e86a-00cb-42e5-9851-9374cd9b652c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43053", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113582911851527283", "content": "", "creation_timestamp": "2024-12-02T11:08:13.716840Z"}, {"uuid": "3525b8e9-8b45-4f1f-bf90-1b2e911158f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43052", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113582852853032155", "content": "", "creation_timestamp": "2024-12-02T10:53:13.393500Z"}, {"uuid": "cdbf51dc-c419-4489-a721-b358721f79cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43050", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113582852839001009", "content": "", "creation_timestamp": "2024-12-02T10:53:13.445757Z"}, {"uuid": "fcc66bc1-68b4-4e6f-a9dc-098df614718b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43052", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113583434171471172", "content": "", "creation_timestamp": "2024-12-02T13:21:03.366063Z"}, {"uuid": "7295cc4e-587c-4383-a07b-956ad72e0bd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43059", "type": "seen", "source": "https://t.me/cvedetector/19343", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43059 - HP Smart Array Vulnerability - Memory Corruption\", \n  \"Content\": \"CVE ID : CVE-2024-43059 \nPublished : March 3, 2025, 11:15 a.m. | 54\u00a0minutes ago \nDescription : Memory corruption while invoking IOCTL calls from the use-space for HGSL memory node. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-03T13:52:37.000000Z"}, {"uuid": "fc6c6131-8359-47a6-b41c-987f9f95466a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43055", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-19T02:47:46.000000Z"}, {"uuid": "3312f7c9-7ec1-480d-b484-cd21fffe6b64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43057", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-19T02:47:46.000000Z"}, {"uuid": "614d43a1-33ca-4564-bc31-190baabc20ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43051", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-19T02:47:46.000000Z"}, {"uuid": "672412c0-2192-4fec-bae0-f79dd7236118", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43057", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114098199144823059", "content": "", "creation_timestamp": "2025-03-03T11:12:33.554826Z"}, {"uuid": "07a0c1c8-afc0-4c32-8079-0a5802409e1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43058", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-09-10T07:00:41.000000Z"}, {"uuid": "80a537ed-5f0c-405d-91b2-0df2c3de650b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43058", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-08-09T17:25:38.000000Z"}, {"uuid": "588d95be-f993-4ff5-a7f0-46547ea61648", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43055", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-18T13:31:24.000000Z"}, {"uuid": "41d7313d-4267-47e9-a9ee-a023402a27e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43057", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-18T13:31:24.000000Z"}, {"uuid": "e56bd05e-0210-466e-bfef-2e6bc6b4fc66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43051", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-18T13:31:24.000000Z"}, {"uuid": "ef422de7-8844-4725-9d99-a2b5bbe66026", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43053", "type": "seen", "source": "https://t.me/cvedetector/11756", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43053 - Memory corruption while invoking IOCTL calls from\", \n  \"Content\": \"CVE ID : CVE-2024-43053 \nPublished : Dec. 2, 2024, 11:15 a.m. | 35\u00a0minutes ago \nDescription : Memory corruption while invoking IOCTL calls from user space to read WLAN target diagnostic information. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-02T12:53:49.000000Z"}, {"uuid": "f76b83c4-19f6-4b2d-9187-c6412b5bb39f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43052", "type": "seen", "source": "https://t.me/cvedetector/11755", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43052 - Qualcomm Snapdragon NPU Memory Corruption\", \n  \"Content\": \"CVE ID : CVE-2024-43052 \nPublished : Dec. 2, 2024, 11:15 a.m. | 35\u00a0minutes ago \nDescription : Memory corruption while processing API calls to NPU with invalid input. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-02T12:53:48.000000Z"}, {"uuid": "e971ac8c-d6de-4cb9-ae47-88acd5a611e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43050", "type": "seen", "source": "https://t.me/cvedetector/11754", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43050 - Memory corruption while invoking IOCTL calls from\", \n  \"Content\": \"CVE ID : CVE-2024-43050 \nPublished : Dec. 2, 2024, 11:15 a.m. | 35\u00a0minutes ago \nDescription : Memory corruption while invoking IOCTL calls from user space to issue factory test command inside WLAN driver. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-02T12:53:47.000000Z"}]}