{"vulnerability": "CVE-2024-4082", "sightings": [{"uuid": "5b7c8c90-d6d0-4c3a-b20d-8a9643bd4f4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40822", "type": "seen", "source": "https://t.me/cvedetector/1967", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40822 - Apple WatchOS Contact Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-40822 \nPublished : July 29, 2024, 11:15 p.m. | 45\u00a0minutes ago \nDescription : This issue was addressed by restricting options offered on a locked device. This issue is fixed in watchOS 10.6, macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6, iOS 16.7.9 and iPadOS 16.7.9. An attacker with physical access to a device may be able to access contacts from the lock screen. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T02:21:20.000000Z"}, {"uuid": "89fcd780-537a-4ee2-84b8-14a6e5972915", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40829", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7628", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-40829\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The issue was addressed with improved checks. This issue is fixed in watchOS 10.6, iOS 17.6 and iPadOS 17.6, iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8. An attacker may be able to view restricted content from the lock screen.\n\ud83d\udccf Published: 2024-07-29T22:17:15.740Z\n\ud83d\udccf Modified: 2025-03-14T19:28:32.445Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/HT214117\n2. https://support.apple.com/en-us/HT214116\n3. https://support.apple.com/en-us/HT214120\n4. https://support.apple.com/en-us/HT214124\n5. http://seclists.org/fulldisclosure/2024/Jul/16\n6. http://seclists.org/fulldisclosure/2024/Jul/21\n7. http://seclists.org/fulldisclosure/2024/Jul/17\n8. http://seclists.org/fulldisclosure/2024/Jul/19", "creation_timestamp": "2025-03-14T19:44:55.000000Z"}, {"uuid": "d54e6bf5-0679-4c3b-b55d-011882ee9988", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40827", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8702", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-40827\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to overwrite arbitrary files.\n\ud83d\udccf Published: 2024-07-29T22:16:41.217Z\n\ud83d\udccf Modified: 2025-03-25T16:10:43.614Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/HT214120\n2. https://support.apple.com/en-us/HT214119\n3. https://support.apple.com/en-us/HT214118\n4. http://seclists.org/fulldisclosure/2024/Jul/20\n5. http://seclists.org/fulldisclosure/2024/Jul/18\n6. http://seclists.org/fulldisclosure/2024/Jul/19", "creation_timestamp": "2025-03-25T16:25:06.000000Z"}, {"uuid": "da647e57-d2f4-4ecf-82a7-cf11c8f08cc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40823", "type": "seen", "source": "https://t.me/cvedetector/1965", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40823 - Apple macOS Gatekeeper Info Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-40823 \nPublished : July 29, 2024, 11:15 p.m. | 45\u00a0minutes ago \nDescription : The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to access user-sensitive data. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T02:21:18.000000Z"}, {"uuid": "f2e81a17-0165-4c6d-b5af-bf795c60fd86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40824", "type": "seen", "source": "https://t.me/cvedetector/1963", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40824 - Apple Watch App Data Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-40824 \nPublished : July 29, 2024, 11:15 p.m. | 45\u00a0minutes ago \nDescription : This issue was addressed through improved state management. This issue is fixed in watchOS 10.6, macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6, tvOS 17.6. An app may be able to bypass Privacy preferences. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T02:21:16.000000Z"}, {"uuid": "52c3e088-835f-4146-92ee-adb15c83c7d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40827", "type": "seen", "source": "https://t.me/cvedetector/1954", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40827 - Apple macOS Arbitrary File Overwrite Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-40827 \nPublished : July 29, 2024, 11:15 p.m. | 45\u00a0minutes ago \nDescription : The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. An app may be able to overwrite arbitrary files. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T02:21:02.000000Z"}, {"uuid": "06994bad-abfa-4a2c-84d4-22de4d23c2dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40829", "type": "seen", "source": "https://t.me/cvedetector/1953", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40829 - Apple WatchOS and iOS Lock Screen Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-40829 \nPublished : July 29, 2024, 11:15 p.m. | 45\u00a0minutes ago \nDescription : The issue was addressed with improved checks. This issue is fixed in watchOS 10.6, iOS 17.6 and iPadOS 17.6, iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8. An attacker may be able to view restricted content from the lock screen. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T02:21:01.000000Z"}, {"uuid": "203803ed-8784-4cab-8652-c6c5c1738d39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40828", "type": "seen", "source": "https://t.me/cvedetector/1948", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40828 - Apple macOS Root Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-40828 \nPublished : July 29, 2024, 11:15 p.m. | 45\u00a0minutes ago \nDescription : The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6, macOS Monterey 12.7.6, macOS Ventura 13.6.8. A malicious app may be able to gain root privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T02:20:53.000000Z"}]}