{"vulnerability": "CVE-2025-3121", "sightings": [{"uuid": "a1440667-f35e-4bdf-a412-92c4fc7a349a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3121", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lluikvsoqg2h", "content": "", "creation_timestamp": "2025-04-02T23:01:30.515521Z"}, {"uuid": "bdcf275f-9485-482d-b87b-3650ec41b521", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31219", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-305/", "content": "", "creation_timestamp": "2025-05-21T03:00:00.000000Z"}, {"uuid": "ce783fd1-ba68-4c24-8c21-e58d8f10d80e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31219", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lpimn42o5k2k", "content": "", "creation_timestamp": "2025-05-19T03:23:01.694991Z"}, {"uuid": "d0daee3a-187f-43a3-a364-27f80550331d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31213", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lpimn42o5k2k", "content": "", "creation_timestamp": "2025-05-19T03:23:01.778229Z"}, {"uuid": "9dbd7e65-2ea1-45fa-a829-b53ab77c891d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31216", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m66gfbd5wy2s", "content": "", "creation_timestamp": "2025-11-21T23:22:32.322620Z"}, {"uuid": "01b4ee9b-5376-42e9-9cb7-2eb61d59d886", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31214", "type": "seen", "source": "https://bsky.app/profile/zmediaen.bsky.social/post/3lp5iwm6qon2k", "content": "", "creation_timestamp": "2025-05-14T17:17:27.493234Z"}, {"uuid": "0a0018e6-4d6a-4791-856b-9467849ee232", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31219", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lpb2yg6yps2m", "content": "", "creation_timestamp": "2025-05-16T03:18:35.255099Z"}, {"uuid": "967352ed-886c-4d2e-9ffe-177ac04d0120", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31217", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16229", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31217\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The issue was addressed with improved input validation. This issue is fixed in watchOS 11.5, tvOS 18.5, iPadOS 17.7.7, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, visionOS 2.5, Safari 18.5. Processing maliciously crafted web content may lead to an unexpected Safari crash.\n\ud83d\udccf Published: 2025-05-12T21:42:58.039Z\n\ud83d\udccf Modified: 2025-05-13T20:15:10.287Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122720\n2. https://support.apple.com/en-us/122716\n3. https://support.apple.com/en-us/122405\n4. https://support.apple.com/en-us/122404\n5. https://support.apple.com/en-us/122721\n6. https://support.apple.com/en-us/122722\n7. https://support.apple.com/en-us/122719", "creation_timestamp": "2025-05-13T20:31:09.000000Z"}, {"uuid": "9165497e-481f-44f7-9990-70ff7a85d7a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31219", "type": "seen", "source": "Telegram/B6_vWUmFTVCX1yfhELfHqaTN2Gx6ui5cUH0-W9-255yNy0M", "content": "", "creation_timestamp": "2026-04-02T22:17:09.000000Z"}, {"uuid": "aac625a6-245e-43cd-8681-7f7c16ed9e69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31213", "type": "seen", "source": "Telegram/LxwhYgp3VyykJFkTybHSMczvBDUi5kkG99Yg-gAxQSwVjzg", "content": "", "creation_timestamp": "2026-04-02T22:16:45.000000Z"}, {"uuid": "1ef50e45-59b2-4863-adff-ae57222a7493", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3121", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10154", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3121\n\ud83d\udd25 CVSS Score: 4.8 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability classified as problematic has been found in PyTorch 2.6.0. Affected is the function torch.jit.jit_module_from_flatbuffer. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-04-02T22:00:12.390Z\n\ud83d\udccf Modified: 2025-04-02T22:00:12.390Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.303012\n2. https://vuldb.com/?ctiid.303012\n3. https://vuldb.com/?submit.525049\n4. https://github.com/pytorch/pytorch/issues/149800\n5. https://github.com/pytorch/pytorch/issues/149800#issue-2940240700", "creation_timestamp": "2025-04-02T22:34:42.000000Z"}, {"uuid": "74b7c65d-f116-4ea7-a660-a181d7117f2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31218", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16406", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31218\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.5. An app may be able to observe the hostnames of new network connections.\n\ud83d\udccf Published: 2025-05-12T21:42:25.925Z\n\ud83d\udccf Modified: 2025-05-14T19:46:57.375Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122716", "creation_timestamp": "2025-05-14T20:32:36.000000Z"}, {"uuid": "63da176a-048a-472c-adbf-73c0025d7a4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31215", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16484", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31215\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The issue was addressed with improved checks. This issue is fixed in watchOS 11.5, tvOS 18.5, iPadOS 17.7.7, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, visionOS 2.5, Safari 18.5. Processing maliciously crafted web content may lead to an unexpected process crash.\n\ud83d\udccf Published: 2025-05-12T21:42:19.514Z\n\ud83d\udccf Modified: 2025-05-15T13:19:54.212Z\n\ud83d\udd17 References:\n1. https://support.apple.com/en-us/122720\n2. https://support.apple.com/en-us/122716\n3. https://support.apple.com/en-us/122405\n4. https://support.apple.com/en-us/122404\n5. https://support.apple.com/en-us/122721\n6. https://support.apple.com/en-us/122722\n7. https://support.apple.com/en-us/122719", "creation_timestamp": "2025-05-15T13:33:27.000000Z"}, {"uuid": "3fb9323b-7950-455b-aaad-48729a24b064", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3121", "type": "seen", "source": "https://t.me/cvedetector/21913", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3121 - PyTorch Memory Corruption (Local Access)\", \n  \"Content\": \"CVE ID : CVE-2025-3121 \nPublished : April 2, 2025, 10:15 p.m. | 20\u00a0minutes ago \nDescription : A vulnerability classified as problematic has been found in PyTorch 2.6.0. Affected is the function torch.jit.jit_module_from_flatbuffer. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. \nSeverity: 3.3 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-03T01:01:18.000000Z"}, {"uuid": "c9f18602-a0d5-4217-b2cf-fa49cfa3020d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31214", "type": "seen", "source": "https://t.me/CyberBulletin/3256", "content": "\u26a1\ufe0fBeneath the interface, Apple said iOS 18.5 hardens the kernel against two memory-corruption issues and cleans up a libexpat flaw (CVE-2024-8176) that affects a broad range of software projects. \n\nOther notable fixes include an issue in Baseband (CVE-2025-31214) that allows attackers in a privileged network position to intercept traffic on the new iPhone 16e line; a privilege escalation bug in mDNSResponder (CVE-2025-31222); an issue in Notes that expose data from a locked iPhone screen; and security gaps in FrontBoard, iCloud Document Sharing, and Mail Addressing.\n\n#CyberBulletin", "creation_timestamp": "2025-05-13T04:32:06.000000Z"}, {"uuid": "b8b1143a-babe-48fb-ad2a-52f491ba7e43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31214", "type": "seen", "source": "https://t.me/true_secator/7025", "content": "Apple \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u0441\u0442\u0435\u043a\u0435 macOS, iPhone \u0438 iPad, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0440\u044f\u0434\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 RCE.\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u0430\u044f iOS 18.5, \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u043d\u0430\u044f \u0432\u043c\u0435\u0441\u0442\u0435 \u0441 \u043f\u0430\u0442\u0447\u0430\u043c\u0438 \u0434\u043b\u044f  iPadOS, \u0437\u0430\u043a\u0440\u044b\u0432\u0430\u0435\u0442 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0432 AppleJPEG \u0438 CoreMedia, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0435 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0441\u043e\u0437\u0434\u0430\u0432\u0430\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u043c\u0435\u0434\u0438\u0430\u0444\u0430\u0439\u043b\u044b \u0434\u043b\u044f \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0441 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 \u0446\u0435\u043b\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0442\u0430\u043a\u0436\u0435 \u043f\u043e\u0444\u0438\u043a\u0441\u0438\u043b\u0430 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 CoreAudio, CoreGraphics \u0438 ImageIO, \u043a\u0430\u0436\u0434\u0430\u044f \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u0430 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0441\u0431\u043e\u044e \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u0438\u043b\u0438 \u0443\u0442\u0435\u0447\u043a\u0435 \u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u0440\u0438 \u043e\u0442\u043a\u0440\u044b\u0442\u0438\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u043a\u043e\u043d\u0442\u0435\u043d\u0442\u0430.\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 iOS 18.5 \u0442\u0430\u043a\u0436\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442 9 \u0434\u0440\u0443\u0433\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439\nWebKit, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u0430 \u0447\u0435\u0440\u0435\u0437 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u0432\u0435\u0431-\u0441\u0430\u0439\u0442, \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043a\u043e\u0434\u0430 \u0438\u043b\u0438 \u0441\u0431\u043e\u044e \u0434\u0432\u0438\u0436\u043a\u0430 Safari.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u0443\u044e \u043e\u0448\u0438\u0431\u043a\u0443 \u00ab\u043a\u043d\u043e\u043f\u043a\u0438 \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f \u0437\u0432\u0443\u043a\u0430\u00bb \u0432 FaceTime, \u0438\u0437-\u0437\u0430 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0430\u0443\u0434\u0438\u043e\u0437\u0430\u043f\u0438\u0441\u044c \u0440\u0430\u0437\u0433\u043e\u0432\u043e\u0440\u0430 \u043c\u043e\u0433\u043b\u0430 \u043e\u0441\u0442\u0430\u0432\u0430\u0442\u044c\u0441\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0439 \u0434\u0430\u0436\u0435 \u043f\u043e\u0441\u043b\u0435 \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f \u043c\u0438\u043a\u0440\u043e\u0444\u043e\u043d\u0430.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Apple, \u0432 iOS 18.5 \u0443\u0441\u0438\u043b\u0435\u043d\u0430 \u0437\u0430\u0449\u0438\u0442\u0430 \u044f\u0434\u0440\u0430 \u0432 \u0447\u0430\u0441\u0442\u0438 \u0434\u0432\u0443\u0445 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u0441 \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u0435\u043c \u043f\u0430\u043c\u044f\u0442\u0438 \u0438 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c libexpat (CVE-2024-8176), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0448\u0438\u0440\u043e\u043a\u0438\u0439 \u0441\u043f\u0435\u043a\u0442\u0440 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u0440\u0435\u0448\u0435\u043d\u0438\u0439.\n\n\u0421\u0440\u0435\u0434\u0438 \u0434\u0440\u0443\u0433\u0438\u0445 \u0432\u0430\u0436\u043d\u044b\u0445 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0438:\n\n- CVE-2025-31214 \u0432 Baseband, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c, \u043d\u0430\u0445\u043e\u0434\u044f\u0449\u0438\u043c\u0441\u044f \u0432 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c \u043f\u043e\u043b\u043e\u0436\u0435\u043d\u0438\u0438 \u0432 \u0441\u0435\u0442\u0438, \u043f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u044b\u0432\u0430\u0442\u044c \u0442\u0440\u0430\u0444\u0438\u043a \u043d\u0430 \u043d\u043e\u0432\u043e\u0439 \u043b\u0438\u043d\u0435\u0439\u043a\u0435 iPhone 16e; \n- EoP-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 mDNSResponder (CVE-2025-31222);\n- \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0432 Notes, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0440\u0430\u0441\u043a\u0440\u044b\u0432\u0430\u0435\u0442 \u0434\u0430\u043d\u043d\u044b\u0435 \u0441 \u0437\u0430\u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u044d\u043a\u0440\u0430\u043d\u0430 iPhone;\n- \u0430 \u0442\u0430\u043a\u0436\u0435 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0438 \u0432 FrontBoard, iCloud Document Sharing \u0438 Mail Addressing.\n\nApple \u043d\u0435 \u0443\u043f\u043e\u043c\u0438\u043d\u0430\u0435\u0442 \u043e \u0442\u043e\u043c, \u0447\u0442\u043e \u043a\u0430\u043a\u0438\u0435-\u043b\u0438\u0431\u043e \u043e\u0448\u0438\u0431\u043a\u0438 \u0431\u044b\u043b\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u044b \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445.\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 iOS 18.5 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e \u0434\u043b\u044f iPhone XS \u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0438\u0445 \u0432\u0435\u0440\u0441\u0438\u0439; \u0441\u043e\u043f\u0443\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0439 \u0432\u044b\u043f\u0443\u0441\u043a iPadOS \u043e\u0445\u0432\u0430\u0442\u044b\u0432\u0430\u0435\u0442 iPad Pro (2018 \u0438 \u043d\u043e\u0432\u0435\u0435), iPad Air 3, iPad 7, iPad mini 5 \u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0438\u0435 \u043c\u043e\u0434\u0435\u043b\u0438.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0430 \u043a\u0440\u0443\u043f\u043d\u044b\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f macOS Sequoia, macOS Sonoma, macOS Ventura, WatchOS, tvOS \u0438 visionOS.", "creation_timestamp": "2025-05-13T12:40:08.000000Z"}]}