{"vulnerability": "CVE-2024-4610", "sightings": [{"uuid": "bb513bbd-2c37-45d4-a42d-e09312b28f60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4610", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-06-12T18:10:03.000000Z"}, {"uuid": "69cd84fa-91d3-43ab-b105-9981aa672511", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-4610", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/b61fe924-9487-437e-960d-d4ce0605e994", "content": "", "creation_timestamp": "2026-02-02T12:26:35.244802Z"}, {"uuid": "8721e795-745e-4374-9a81-0c2c2a186775", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4610", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:55.000000Z"}, {"uuid": "0f88a20b-1f06-4b93-9e71-d20368f5b181", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4610", "type": "seen", "source": "MISP/fc16b923-3a13-4e9d-9aac-10a57cac12c7", "content": "", "creation_timestamp": "2025-08-18T18:31:00.000000Z"}, {"uuid": "8d6efc74-63ff-41b4-8c1d-8cbedf6431ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4610", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:01:26.000000Z"}, {"uuid": "7cdbaa99-5d72-4185-b237-d062f1432d8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4610", "type": "exploited", "source": "Telegram/6v1ahh7hPWOW8Ok3Sp4hG59yOTfaaNgCSzOLDB2lcLZIb_Y", "content": "", "creation_timestamp": "2024-06-11T09:49:31.000000Z"}, {"uuid": "da6e4df9-a2f2-47c7-8cd3-ecb6b85b76f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46103", "type": "seen", "source": "https://t.me/cvedetector/6131", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46103 - \"SEMCMS SQL Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-46103 \nPublished : Sept. 20, 2024, 9:15 p.m. | 39\u00a0minutes ago \nDescription : SEMCMS 4.8 is vulnerable to SQL Injection via SEMCMS_Main.php. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-20T23:56:10.000000Z"}, {"uuid": "4a75b7e2-d516-4103-bf37-9ccb780e3002", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-46101", "type": "seen", "source": "https://t.me/cvedetector/6130", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46101 - GDidees CMS File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46101 \nPublished : Sept. 20, 2024, 9:15 p.m. | 39\u00a0minutes ago \nDescription : GDidees CMS &lt;=\nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-20T23:56:09.000000Z"}, {"uuid": "c2a5a316-fbab-4035-8cd0-7f330d642a0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4610", "type": "exploited", "source": "Telegram/Gy-PjQ30H5In3KQFQWu48dRn8GaaxLEn9ildKOKlVmOoqw", "content": "", "creation_timestamp": "2024-06-11T12:42:42.000000Z"}, {"uuid": "4102bde6-0251-4a7b-a4ae-c19745858fed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4610", "type": "exploited", "source": "Telegram/f6e414AbFLwEVijKDOZQ5Pf200IjGJSmvaDYCXo7QecyAQ", "content": "", "creation_timestamp": "2024-06-11T10:16:16.000000Z"}, {"uuid": "be89b663-52ba-4695-a401-ddc8d19821c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4610", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/2245", "content": "The Hacker News\nArm Warns of Actively Exploited Zero-Day Vulnerability in Mali GPU Drivers\n\nArm is warning of a security vulnerability impacting Mali GPU Kernel Driver that it said has been actively exploited in the wild.\nTracked as CVE-2024-4610, the use-after-free issue impacts the following products -\n\nBifrost GPU Kernel Driver (all versions from r34p0 to r40p0)\nValhall GPU Kernel Driver (all versions from r34p0 to r40p0)\n\n\"A local non-privileged user can make improper GPU memory", "creation_timestamp": "2024-06-11T12:42:43.000000Z"}, {"uuid": "aabc8b16-2618-43f0-bce0-39ac7702ad2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4610", "type": "exploited", "source": "https://t.me/KomunitiSiber/2085", "content": "Arm Warns of Actively Exploited Zero-Day Vulnerability in Mali GPU Drivers\nhttps://thehackernews.com/2024/06/arm-warns-of-actively-exploited-zero.html\n\nArm is warning of a security vulnerability impacting Mali GPU Kernel Driver that it said has been actively exploited in the wild.\nTracked as CVE-2024-4610, the use-after-free issue impacts the following products -\n\nBifrost GPU Kernel Driver (all versions from r34p0 to r40p0)\nValhall GPU Kernel Driver (all versions from r34p0 to r40p0)\n\n\"A local non-privileged user can make improper GPU memory", "creation_timestamp": "2024-06-11T11:06:03.000000Z"}, {"uuid": "3ad54009-6f93-4365-8458-d15603351197", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4610", "type": "exploited", "source": "https://t.me/HackingInsights/1986", "content": "\u200aCVE-2024-4610 \u2013 Arm Mali GPU Zero-Day Under Active Exploit: Millions of Devices at Risk\n\nhttps://securityonline.info/cve-2024-4610-arm-mali-gpu-zero-day-under-active-exploit-millions-of-devices-at-risk/", "creation_timestamp": "2024-06-09T12:23:00.000000Z"}, {"uuid": "bcec5680-818c-4cd3-b737-1fe15c9838eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4610", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/11374", "content": "The Hacker News\nArm Warns of Actively Exploited Zero-Day Vulnerability in Mali GPU Drivers\n\nArm is warning of a security vulnerability impacting Mali GPU Kernel Driver that it said has been actively exploited in the wild.\nTracked as CVE-2024-4610, the use-after-free issue impacts the following products -\n\nBifrost GPU Kernel Driver (all versions from r34p0 to r40p0)\nValhall GPU Kernel Driver (all versions from r34p0 to r40p0)\n\n\"A local non-privileged user can make improper GPU memory", "creation_timestamp": "2024-06-11T12:42:43.000000Z"}, {"uuid": "c9b3cbe0-839e-473b-a898-31ccc06d9860", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4610", "type": "exploited", "source": "https://t.me/information_security_channel/52356", "content": "Arm Warns of Exploited Kernel Driver Vulnerability\nhttps://www.securityweek.com/arm-warns-of-exploited-kernel-driver-vulnerability/\n\nArm warns that CVE-2024-4610, a Mali GPU kernel driver vulnerability addressed two years ago, is exploited in attacks.\nThe post Arm Warns of Exploited Kernel Driver Vulnerability (https://www.securityweek.com/arm-warns-of-exploited-kernel-driver-vulnerability/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2024-06-11T13:50:33.000000Z"}]}