{"vulnerability": "CVE-2021-30937", "sightings": [{"uuid": "ea206223-305a-4886-923d-78bba5ad8e81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30937", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/1518", "content": "PoC kernel r/w exploit for iOS 15.0 - 15.1.1 that was patched in iOS 15.2 (CVE-2021-30937) https://github.com/potmdehex/multicast_bytecopy", "creation_timestamp": "2022-11-16T16:07:24.000000Z"}, {"uuid": "00757c7f-c9fe-48be-9ea1-c5308116820e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30937", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/1597", "content": "#exploit\n1. CVE-2021-30937:\nXNU: heap-use-after-free in inm_merge\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2224\n\n2. PHP\u00a0disable_functions\u00a0bypass\nhttps://github.com/mm0r1/exploits\n\n@BlueRedTeam", "creation_timestamp": "2022-01-07T12:36:57.000000Z"}, {"uuid": "61e0c0f3-1796-415f-87a7-ad3c60c456de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30937", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:01:21.000000Z"}, {"uuid": "aaf24afb-a4bf-407b-989f-90f50a433d4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30937", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/130", "content": "CVE-2021-30937 : multicast_bytecopy is a kernel r/w exploit for iOS 15.0 - 15.1.1\nhttps://github.com/potmdehex/multicast_bytecopy", "creation_timestamp": "2022-04-28T21:37:14.000000Z"}, {"uuid": "e5e458e4-1350-4ac1-b143-61818471b4f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30937", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/5147", "content": "#exploit\n1. CVE-2021-30937:\nXNU: heap-use-after-free in inm_merge\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2224\n\n2. PHP\u00a0disable_functions\u00a0bypass\nhttps://github.com/mm0r1/exploits", "creation_timestamp": "2022-01-07T12:45:01.000000Z"}]}