{"uuid": "fd292553-79e9-435e-90ff-713cd2f2ba16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40812", "type": "seen", "source": "https://t.me/cvedetector/1966", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40812 - Apple iOS/WatchOS/PadOS/MacOS Vision/Logic Verification Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-40812 \nPublished : July 29, 2024, 11:15 p.m. | 45\u00a0minutes ago \nDescription : A logic issue was addressed with improved checks. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, visionOS 1.3, macOS Sonoma 14.6. A shortcut may be able to bypass Internet permission requirements. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-30T02:21:19.000000Z"}