{"vulnerability": "CVE-2024-2785", "sightings": [{"uuid": "2db1b5d3-26cb-4efc-a1b7-216cde2266a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27856", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfsniynqw42g", "content": "", "creation_timestamp": "2025-01-15T20:53:19.068333Z"}, {"uuid": "6bb76578-9e87-4cfa-b718-93e4565c1446", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27856", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113834073013755047", "content": "", "creation_timestamp": "2025-01-15T19:41:48.798217Z"}, {"uuid": "b153ba06-9dae-40be-96c4-bc6a991eb1cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27856", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfslfwgdjk2r", "content": "", "creation_timestamp": "2025-01-15T20:15:47.564638Z"}, {"uuid": "83ad010e-f4a3-4a4f-aed6-5d65dc4fb44d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27856", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-048/", "content": "", "creation_timestamp": "2025-01-20T05:00:00.000000Z"}, {"uuid": "3a5ef5ab-7459-4341-b247-5c03da745b2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27859", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhtu6zdwoq2q", "content": "", "creation_timestamp": "2025-02-10T19:16:02.066369Z"}, {"uuid": "159d4086-9f69-420b-9522-d0a31079db85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27859", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhu5whgjh62q", "content": "", "creation_timestamp": "2025-02-10T22:10:12.956307Z"}, {"uuid": "e739f7f9-aa45-4011-8bb5-2002c7d90b4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27859", "type": "seen", "source": "https://t.me/cvedetector/17598", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-27859 - Apple Web Content Arbitrary Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-27859 \nPublished : Feb. 10, 2025, 7:15 p.m. | 27\u00a0minutes ago \nDescription : The issue was addressed with improved memory handling. This issue is fixed in iOS 17.4 and iPadOS 17.4, tvOS 17.4, watchOS 10.4, visionOS 1.1, macOS Sonoma 14.4. Processing web content may lead to arbitrary code execution. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-10T21:16:48.000000Z"}, {"uuid": "450a6132-6204-4c3a-b647-6bd4524cd5e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27859", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113980964748069947", "content": "", "creation_timestamp": "2025-02-10T18:18:19.890381Z"}, {"uuid": "c7a422b7-269e-4a83-960d-cbba41fec088", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27859", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113981077764064439", "content": "", "creation_timestamp": "2025-02-10T18:47:03.145404Z"}, {"uuid": "c54fcbf2-f19c-4d91-b843-7e597d78a9b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27850", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8548", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-27850\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: This issue was addressed with improvements to the noise injection algorithm. This issue is fixed in visionOS 1.2, macOS Sonoma 14.5, Safari 17.5, iOS 17.5 and iPadOS 17.5. A maliciously crafted webpage may be able to fingerprint the user.\n\ud83d\udccf Published: 2024-06-10T20:56:45.824Z\n\ud83d\udccf Modified: 2025-03-24T21:04:10.688Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/HT214101\n2. https://support.apple.com/en-us/HT214106\n3. https://support.apple.com/en-us/HT214108\n4. https://support.apple.com/en-us/HT214103\n5. http://seclists.org/fulldisclosure/2024/Jun/5", "creation_timestamp": "2025-03-24T21:23:28.000000Z"}, {"uuid": "1138f4b6-d097-454c-abad-71434491c109", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27856", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1842", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-27856\n\ud83d\udd39 Description: The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.5, iOS 16.7.8 and iPadOS 16.7.8, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, tvOS 17.5, visionOS 1.2. Processing a file may lead to unexpected app termination or arbitrary code execution.\n\ud83d\udccf Published: 2025-01-15T19:35:57.075Z\n\ud83d\udccf Modified: 2025-01-15T19:35:57.075Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/120901\n2. https://support.apple.com/en-us/120906\n3. https://support.apple.com/en-us/120896\n4. https://support.apple.com/en-us/120898\n5. https://support.apple.com/en-us/120905\n6. https://support.apple.com/en-us/120902\n7. https://support.apple.com/en-us/120903", "creation_timestamp": "2025-01-15T19:55:10.000000Z"}, {"uuid": "59bb2d50-0ede-4b83-8e00-f22c06fa088c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27856", "type": "seen", "source": "https://t.me/cvedetector/15520", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-27856 - Apple Safari and iOS Arbitrary Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-27856 \nPublished : Jan. 15, 2025, 8:15 p.m. | 25\u00a0minutes ago \nDescription : The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.5, iOS 16.7.8 and iPadOS 16.7.8, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, tvOS 17.5, visionOS 1.2. Processing a file may lead to unexpected app termination or arbitrary code execution. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T21:49:39.000000Z"}, {"uuid": "31f36b0d-d7a1-4b8f-8d6f-5624c0ae06ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27859", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7689", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-27859\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The issue was addressed with improved memory handling. This issue is fixed in iOS 17.4 and iPadOS 17.4, tvOS 17.4, watchOS 10.4, visionOS 1.1, macOS Sonoma 14.4. Processing web content may lead to arbitrary code execution.\n\ud83d\udccf Published: 2025-02-10T18:09:24.906Z\n\ud83d\udccf Modified: 2025-03-15T14:58:30.650Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/120881\n2. https://support.apple.com/en-us/120882\n3. https://support.apple.com/en-us/120883\n4. https://support.apple.com/en-us/120895\n5. https://support.apple.com/en-us/120893", "creation_timestamp": "2025-03-15T15:45:19.000000Z"}, {"uuid": "c03408bc-b007-4855-b74d-1d0be6768082", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27858", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8008", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-27858\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15. An app may be able to access protected user data.\n\ud83d\udccf Published: 2024-09-16T23:22:36.830Z\n\ud83d\udccf Modified: 2025-03-18T20:16:49.848Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/121238", "creation_timestamp": "2025-03-18T20:48:34.000000Z"}]}