{"vulnerability": "CVE-2023-40404", "sightings": [{"uuid": "51cdc761-004d-4bf6-8ee4-ccb031363cb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40404", "type": "published-proof-of-concept", "source": "https://t.me/Hunt3rkill3rs1/348", "content": "", "creation_timestamp": "2024-05-29T22:24:40.000000Z"}, {"uuid": "79105b64-fe09-436a-93e0-950b81ba91d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40404", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lxsg77prvuj2", "content": "", "creation_timestamp": "2025-09-01T20:18:12.011825Z"}, {"uuid": "6f48d9b9-f602-4645-88a4-90577a1403d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40404", "type": "published-proof-of-concept", "source": "https://t.me/tengkorakcybercrewz/9271", "content": "CVE-2024-27842 + CVE-2023-40404 macOS\n\nSploit allows you to execute code at the kernel \n\nPOC exploit (CVE-2024-27842)\nPOC exploit (CVE-2023-40404)\n\n#macos", "creation_timestamp": "2024-05-29T14:34:38.000000Z"}, {"uuid": "04aafe24-2ed0-4b5e-808a-15f51821ac63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40404", "type": "seen", "source": "https://t.me/Hunt3rkill3rs1/346", "content": "CVE-2024-27842 + CVE-2023-40404 macOS\n\u26d4\n\u0421\u043f\u043b\u043e\u0438\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u0434 \u043d\u0430 \u0443\u0440\u043e\u0432\u043d\u0435 \u044f\u0434\u0440\u0430\n\ud83d\udcc9\ud83d\udcc9\ud83d\udcc9\ud83d\udcc9\ud83d\udcc9\ud83d\udcc9\ud83d\udcc9\ud83d\udcc9", "creation_timestamp": "2024-05-29T22:17:05.000000Z"}, {"uuid": "cfed873e-9512-42cd-bbca-9667ac4499c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40404", "type": "published-proof-of-concept", "source": "Telegram/QOqFRagaafWdpnL2bi9y40ERZBQxDEezlDSSycjjEaFOxg", "content": "", "creation_timestamp": "2024-05-29T14:38:16.000000Z"}, {"uuid": "5675aa41-edcf-4fac-bb48-7ec2b55e9d18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40404", "type": "published-proof-of-concept", "source": "https://t.me/tengkorakcybercrew/9300", "content": "CVE-2024-27842 + CVE-2023-40404 macOS\n\nSploit allows you to execute code at the kernel \n\nPOC exploit (CVE-2024-27842)\nPOC exploit (CVE-2023-40404)\n\n#macos", "creation_timestamp": "2024-05-29T14:34:54.000000Z"}, {"uuid": "83ee3004-1b83-4fb0-a2cd-66f595fe5752", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40404", "type": "published-proof-of-concept", "source": "https://t.me/CipherAgents/1303613", "content": "CVE-2024-27842 + CVE-2023-40404 macOS\n\nSploit allows you to execute code at the kernel level\n\nPOC exploit (\u0434\u043b\u044f CVE-2024-27842)\nPOC exploit (\u0434\u043b\u044f CVE-2023-40404)\n\n#\ud835\ude4f\ud835\ude40\ud835\ude3c\ud835\ude48_\ud835\ude41\ud835\ude4e\ud835\ude40\ud835\ude3e #\ud835\ude4f\ud835\ude40\ud835\ude3c\ud835\ude48_\ud835\ude44\ud835\ude49\ud835\ude3f", "creation_timestamp": "2024-07-03T19:55:08.000000Z"}, {"uuid": "d290d720-0ff7-4745-9b0f-ce1da235de8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40404", "type": "published-proof-of-concept", "source": "Telegram/u9gwB9zadAmct7nmlf-U3EzIgD_RTBx2ZydL0IikJI-zsZ4", "content": "", "creation_timestamp": "2024-05-29T14:08:22.000000Z"}, {"uuid": "7d3efba5-ef0b-487d-bdef-59593523c1ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40404", "type": "published-proof-of-concept", "source": "https://t.me/tengkorakcybercrewz/1767", "content": "CVE-2024-27842 + CVE-2023-40404 macOS\n\nSploit allows you to execute code at the kernel \n\nPOC exploit (CVE-2024-27842)\nPOC exploit (CVE-2023-40404)\n\n#macos", "creation_timestamp": "2024-05-29T14:34:38.000000Z"}, {"uuid": "d63548bb-a35f-467e-b7c8-a07129d2bc0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40404", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10585", "content": "#exploit\n1. CVE-2024-23108:\nFortinet FortiSIEM 2nd Order CI\nhttps://www.horizon3.ai/attack-research/disclosures/cve-2024-23108-fortinet-fortisiem-2nd-order-command-injection-deep-dive\n\n2. CVE-2023-40404:\nApple macOS App UaF\nhttps://github.com/wangtielei/POCs/tree/main/CVE-2023-40404", "creation_timestamp": "2024-05-29T14:44:02.000000Z"}, {"uuid": "f2d2581d-1afd-44cb-997f-0d5e7aaec8dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40404", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2102", "content": "CVE-2024-27842 + CVE-2023-40404 macOS\n*\n\u0421\u043f\u043b\u043e\u0438\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u0434 \u043d\u0430 \u0443\u0440\u043e\u0432\u043d\u0435 \u044f\u0434\u0440\u0430\n*\nPOC exploit (\u0434\u043b\u044f CVE-2024-27842)\nPOC exploit (\u0434\u043b\u044f CVE-2023-40404)\n\n#macos", "creation_timestamp": "2024-05-29T13:14:04.000000Z"}, {"uuid": "fa88a327-5c79-47de-8c6b-f5104e627de4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40404", "type": "seen", "source": "https://t.me/cibsecurity/72861", "content": "\u203c CVE-2023-40404 \u203c\n\nA use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Sonoma 14.1. An app may be able to execute arbitrary code with kernel privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-25T22:45:34.000000Z"}, {"uuid": "38ce215f-262a-43fa-ae4d-8d6a280e1871", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40404", "type": "published-proof-of-concept", "source": "Telegram/Jay9RkKiGwNKOeQ_WU-5E1hMgjui2eC3igROxpdYXhxFfmo", "content": "", "creation_timestamp": "2024-06-29T05:06:04.000000Z"}]}