{"vulnerability": "CVE-2024-4081", "sightings": [{"uuid": "9d1b67e8-3152-4eac-937c-455f2b64057d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40812", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7615", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-40812\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A logic issue was addressed with improved checks. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, visionOS 1.3, macOS Sonoma 14.6. A shortcut may be able to bypass Internet permission requirements.\n\ud83d\udccf Published: 2024-07-29T22:17:12.185Z\n\ud83d\udccf Modified: 2025-03-14T17:16:45.901Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/HT214117\n2. https://support.apple.com/en-us/HT214116\n3. https://support.apple.com/en-us/HT214120\n4. https://support.apple.com/en-us/HT214124\n5. https://support.apple.com/en-us/HT214119\n6. https://support.apple.com/en-us/HT214123\n7. https://support.apple.com/en-us/HT214118\n8. http://seclists.org/fulldisclosure/2024/Jul/16\n9. http://seclists.org/fulldisclosure/2024/Jul/23\n10. http://seclists.org/fulldisclosure/2024/Jul/21\n11. http://seclists.org/fulldisclosure/2024/Jul/20\n12. http://seclists.org/fulldisclosure/2024/Jul/17\n13. http://seclists.org/fulldisclosure/2024/Jul/18\n14. http://seclists.org/fulldisclosure/2024/Jul/19", "creation_timestamp": "2025-03-14T17:49:02.000000Z"}, {"uuid": "3a924ba9-54a7-4ab5-82bd-976dc39eabb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40812", "type": "seen", "source": "https://bsky.app/profile/lizp.bsky.social/post/3lty33vrqss2d", "content": "", "creation_timestamp": "2025-07-15T04:32:33.770213Z"}, {"uuid": "d27cec12-8b97-4636-96e1-95c9eb46c806", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40812", "type": "seen", "source": "https://bsky.app/profile/lizp.bsky.social/post/3lty33w7hc22d", "content": "", "creation_timestamp": "2025-07-15T04:32:35.429667Z"}, {"uuid": "a75be1e7-f8c3-40fe-bf78-ec03cce21628", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4081", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14230", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-4081\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: A memory corruption issue due to an improper length check in NI LabVIEW may disclose information or result in arbitrary code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects NI LabVIEW 2024 Q1 and prior versions.\n\ud83d\udccf Published: 2024-07-23T13:32:52.584Z\n\ud83d\udccf Modified: 2025-05-01T03:55:27.540Z\n\ud83d\udd17 References:\n1. https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/memory-corruption-issues-due-to-improper-length-checks-in-labview.html", "creation_timestamp": "2025-05-01T04:14:54.000000Z"}, {"uuid": "30037f23-816a-42be-a7e6-8b3abf8c77ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40810", "type": "seen", "source": "https://t.me/cvedetector/8818", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40810 - Apple macOS Sonoma Out-of-Bounds Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-40810 \nPublished : Oct. 24, 2024, 5:15 p.m. | 36\u00a0minutes ago \nDescription : An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in macOS Sonoma 14.6. An app may be able to cause a coprocessor crash. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-24T20:10:01.000000Z"}, {"uuid": "59516f2f-d18c-486e-a2a1-96ff25207038", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4081", "type": "seen", "source": "https://t.me/cvedetector/1506", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-4081 - NI LabVIEW Memory Corruption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-4081 \nPublished : July 23, 2024, 2:15 p.m. | 43\u00a0minutes ago \nDescription : A memory corruption issue due to an improper length check in NI LabVIEW may disclose information or result in arbitrary code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects NI LabVIEW 2024 Q1 and prior versions. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-23T17:14:15.000000Z"}, {"uuid": "5a8ab95f-0ce2-4cc0-bb8e-9f12a7c6f94e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40815", "type": "published-proof-of-concept", "source": "Telegram/O_96JMXWnCSBuBB46Cc1BcDMuR0RRbHcNpUkRi8BOM5Q5pQ", "content": "", "creation_timestamp": "2025-01-31T04:00:07.000000Z"}, {"uuid": "25c76f60-8d1b-414a-9d1b-706587fc7444", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40815", "type": "seen", "source": "https://t.me/cvedetector/1956", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40815 - Apple macOS/iOS/iPadOS/watchOS/tvOS Pointer Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-40815 \nPublished : July 29, 2024, 11:15 p.m. | 45\u00a0minutes ago \nDescription : A race condition was addressed with additional validation. This issue is fixed in macOS Ventura 13.6.8, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, macOS Sonoma 14.6. A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T02:21:03.000000Z"}, {"uuid": "fa9e35f0-88c8-4ea3-870c-39ada62fd5bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40811", "type": "seen", "source": "https://t.me/cvedetector/1960", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40811 - Apple macOS File System Protection Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-40811 \nPublished : July 29, 2024, 11:15 p.m. | 45\u00a0minutes ago \nDescription : The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6. An app may be able to modify protected parts of the file system. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T02:21:10.000000Z"}, {"uuid": "d72253d9-fc9f-489e-a028-85f48de1e322", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40817", "type": "seen", "source": "https://t.me/cvedetector/1958", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40817 - Apple Safari macOS UI Spoofing Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-40817 \nPublished : July 29, 2024, 11:15 p.m. | 45\u00a0minutes ago \nDescription : The issue was addressed with improved UI handling. This issue is fixed in macOS Sonoma 14.6, Safari 17.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. Visiting a website that frames malicious content may lead to UI spoofing. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T02:21:08.000000Z"}, {"uuid": "1178e1cd-2831-423e-b303-b05d05e75019", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40813", "type": "seen", "source": "https://t.me/cvedetector/1957", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40813 - Apple Watch Siri Lock Screen Bypass Vulnerability (Inadvertent Information Disclosure)\", \n  \"Content\": \"CVE ID : CVE-2024-40813 \nPublished : July 29, 2024, 11:15 p.m. | 45\u00a0minutes ago \nDescription : A lock screen issue was addressed with improved state management. This issue is fixed in watchOS 10.6, iOS 17.6 and iPadOS 17.6. An attacker with physical access may be able to use Siri to access sensitive user data. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T02:21:04.000000Z"}, {"uuid": "fd292553-79e9-435e-90ff-713cd2f2ba16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40812", "type": "seen", "source": "https://t.me/cvedetector/1966", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40812 - Apple iOS/WatchOS/PadOS/MacOS Vision/Logic Verification Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-40812 \nPublished : July 29, 2024, 11:15 p.m. | 45\u00a0minutes ago \nDescription : A logic issue was addressed with improved checks. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, visionOS 1.3, macOS Sonoma 14.6. A shortcut may be able to bypass Internet permission requirements. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T02:21:19.000000Z"}, {"uuid": "3a9b33ca-4056-46d2-a405-6039c6214caa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40814", "type": "seen", "source": "https://t.me/cvedetector/1964", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40814 - Apple macOS Sonoma Privilege Escalation Downgrade Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-40814 \nPublished : July 29, 2024, 11:15 p.m. | 45\u00a0minutes ago \nDescription : A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Sonoma 14.6. An app may be able to bypass Privacy preferences. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T02:21:17.000000Z"}, {"uuid": "724a3c3e-0177-412a-bb69-aa7daf8495ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40816", "type": "seen", "source": "https://t.me/cvedetector/1962", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40816 - Apple macOS OOB Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-40816 \nPublished : July 29, 2024, 11:15 p.m. | 45\u00a0minutes ago \nDescription : An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A local attacker may be able to cause unexpected system shutdown. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T02:21:12.000000Z"}]}