{"vulnerability": "CVE-2024-27859", "sightings": [{"uuid": "450a6132-6204-4c3a-b647-6bd4524cd5e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27859", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113980964748069947", "content": "", "creation_timestamp": "2025-02-10T18:18:19.890381Z"}, {"uuid": "3a5ef5ab-7459-4341-b247-5c03da745b2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27859", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhtu6zdwoq2q", "content": "", "creation_timestamp": "2025-02-10T19:16:02.066369Z"}, {"uuid": "159d4086-9f69-420b-9522-d0a31079db85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27859", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhu5whgjh62q", "content": "", "creation_timestamp": "2025-02-10T22:10:12.956307Z"}, {"uuid": "c7a422b7-269e-4a83-960d-cbba41fec088", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27859", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113981077764064439", "content": "", "creation_timestamp": "2025-02-10T18:47:03.145404Z"}, {"uuid": "e739f7f9-aa45-4011-8bb5-2002c7d90b4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27859", "type": "seen", "source": "https://t.me/cvedetector/17598", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-27859 - Apple Web Content Arbitrary Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-27859 \nPublished : Feb. 10, 2025, 7:15 p.m. | 27\u00a0minutes ago \nDescription : The issue was addressed with improved memory handling. This issue is fixed in iOS 17.4 and iPadOS 17.4, tvOS 17.4, watchOS 10.4, visionOS 1.1, macOS Sonoma 14.4. Processing web content may lead to arbitrary code execution. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-10T21:16:48.000000Z"}, {"uuid": "31f36b0d-d7a1-4b8f-8d6f-5624c0ae06ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-27859", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7689", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-27859\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The issue was addressed with improved memory handling. This issue is fixed in iOS 17.4 and iPadOS 17.4, tvOS 17.4, watchOS 10.4, visionOS 1.1, macOS Sonoma 14.4. Processing web content may lead to arbitrary code execution.\n\ud83d\udccf Published: 2025-02-10T18:09:24.906Z\n\ud83d\udccf Modified: 2025-03-15T14:58:30.650Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/120881\n2. https://support.apple.com/en-us/120882\n3. https://support.apple.com/en-us/120883\n4. https://support.apple.com/en-us/120895\n5. https://support.apple.com/en-us/120893", "creation_timestamp": "2025-03-15T15:45:19.000000Z"}]}