cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-10668,https://securityvulnerability.io/vulnerability/CVE-2024-10668,Unknown File Type Vulnerability in Google Quickshare,"There exists an auth bypass in Google Quickshare where an attacker can upload an unknown file type to a victim. The root cause of the vulnerability lies in the fact that when a Payload Transfer frame of type FILE is sent to Quick Share, the file that is contained in this frame is written to disk in the Downloads folder. Quickshare normally deletes unkown files, however an attacker can send two Payload transfer frames of type FILE and the same payload ID. The deletion logic will only delete the first file and not the second. We recommend upgrading past commit 5d8b9156e0c339d82d3dab0849187e8819ad92c0 or Quick Share Windows v1.0.2002.2",Google,Nearby,,,0.0004299999854993075,false,false,false,false,,false,false,2024-11-07T15:22:24.280Z,0 CVE-2024-38272,https://securityvulnerability.io/vulnerability/CVE-2024-38272,Bypassing Accept File Dialog Vulnerability in QuickShare/Nearby,There exists a vulnerability in Quickshare/Nearby where an attacker can bypass the accept file dialog on QuickShare Windows. Normally in QuickShare Windows app we can't send a file without the user accept from the receiving device if the visibility is set to everyone mode or contacts mode. We recommend upgrading to version 1.0.1724.0 of Quickshare or above,Google,Nearby,4.3,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2024-06-26T15:19:31.362Z,0 CVE-2024-38271,https://securityvulnerability.io/vulnerability/CVE-2024-38271,Bluetooth Vulnerability Allows Attacker to Force Victim's WiFi Connection,"There exists a vulnerability in Quickshare/Nearby where an attacker can force the a victim to stay connected to a temporary hotspot created for the share. As part of the sequence of packets in a QuickShare connection over Bluetooth, the attacker forces the victim to connect to the attacker’s WiFi network and then sends an OfflineFrame that crashes Quick Share. This makes the Wifi connection to the attacker’s network last instead of returning to the old network when the Quick Share session is done allowing the attacker to be a MiTM. We recommend upgrading to version 1.0.1724.0 of Quickshare or above",Google,Nearby,4.8,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2024-06-26T15:19:13.955Z,0