{"vulnerability": "CVE-2021-30666", "sightings": [{"uuid": "207652e6-61f1-4f96-8011-4d435077eaa9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30666", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:17.000000Z"}, {"uuid": "15ae8659-abb9-4523-a85b-5ae3b3c60d8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30666", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "ceb60446-16c1-4ce9-91e1-538f18659c62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30666", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971134", "content": "", "creation_timestamp": "2024-12-24T20:24:45.341309Z"}, {"uuid": "3e418137-8876-4610-a3c5-7e174395d2a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30666", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:55.000000Z"}, {"uuid": "60e7987f-86c3-45d5-9294-79f28be67f5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2021-30666", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/57558a2b-fa3a-4c9d-ac66-1a2232e39a2a", "content": "", "creation_timestamp": "2026-02-02T12:28:37.744309Z"}, {"uuid": "d07852c3-f063-4441-bf93-7c13580961d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2021-30666", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=579", "content": "", "creation_timestamp": "2021-05-04T04:00:00.000000Z"}, {"uuid": "cc73af12-8884-4930-bb9d-7795bada3688", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30666", "type": "seen", "source": "https://t.me/cKure/5148", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 \ud83d\udce2 Apple on Monday released security updates for\u00a0iOS,\u00a0macOS, and\u00a0watchOS\u00a0to address three zero-day flaws and expand patches for a fourth vulnerability that the company said might have been exploited in the wild.\n\nCVE-2021-30663:\u00a0An integer overflow vulnerability that could be exploited to craft malicious web content, which may lead to code execution. The flaw was addressed with improved input validation.\n\nCVE-2021-30665:\u00a0A memory corruption issue that could be exploited to craft malicious web content, which may lead to code execution. The flaw was addressed with improved state management.\n\nCVE-2021-30666:\u00a0A buffer overflow vulnerability that could be exploited to craft malicious web content, which may lead to code execution. The flaw was addressed with improved memory handling.\n\nhttps://thehackernews.com/2021/05/apple-releases-urgent-security-patches.html", "creation_timestamp": "2021-05-04T08:13:01.000000Z"}, {"uuid": "a56e0f58-a73d-412a-819e-b8e9886b1c29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30666", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4267", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2021-30666\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2021-09-08T15:15:13.553\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/HT212341\n2. https://support.apple.com/en-us/HT212341", "creation_timestamp": "2025-02-13T17:09:17.000000Z"}, {"uuid": "4ff9a96c-8353-4314-a3ca-989f353b311b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30666", "type": "exploited", "source": "Telegram/KWw-sxkha_bofSpKJWzuwsMl07d2H5N76gyFRZUPh6khQltD", "content": "", "creation_timestamp": "2025-02-14T10:08:10.000000Z"}, {"uuid": "17ddf778-6891-4364-8c25-b264e80e3cf3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30666", "type": "exploited", "source": "https://t.me/arpsyndicate/1132", "content": "#ExploitObserverAlert\n\nCVE-2021-30666\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2021-30666. A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 12.5.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..\n\nFIRST-EPSS: 0.003490000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2023-12-04T06:16:14.000000Z"}, {"uuid": "54c53bf5-15ee-49f7-b9d4-80ac58cb1a7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30666", "type": "exploited", "source": "https://t.me/cibsecurity/28487", "content": "\u203c CVE-2021-30666 \u203c\n\nA buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 12.5.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-08T18:42:44.000000Z"}]}