The issue was addressed with improved memory handling. This issue is fixed in tvOS 17.5, iOS 16.7.8 and iPadOS 16.7.8, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. Processing web content may lead to arbitrary code execution.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apple ipad Os
Apple mac Os |
|
CPEs | cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Apple ipad Os
Apple mac Os |
|
Metrics |
cvssV3_1
|
ssvc
|
Sat, 16 Nov 2024 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat rhel Aus
Redhat rhel Tus |
|
CPEs | cpe:/a:redhat:enterprise_linux:8 cpe:/a:redhat:rhel_aus:8.2 cpe:/a:redhat:rhel_aus:8.4 cpe:/a:redhat:rhel_aus:8.6 cpe:/a:redhat:rhel_e4s:8.4 cpe:/a:redhat:rhel_e4s:8.6 cpe:/a:redhat:rhel_eus:8.8 cpe:/a:redhat:rhel_tus:8.4 cpe:/a:redhat:rhel_tus:8.6 |
|
Vendors & Products |
Redhat rhel Aus
Redhat rhel Tus |
Tue, 29 Oct 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat rhel E4s
Redhat rhel Eus |
|
CPEs | cpe:/a:redhat:rhel_e4s:9.0 cpe:/a:redhat:rhel_eus:9.2 |
|
Vendors & Products |
Redhat rhel E4s
Redhat rhel Eus |
Thu, 17 Oct 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux |
|
CPEs | cpe:/a:redhat:enterprise_linux:9 | |
Vendors & Products |
Redhat
Redhat enterprise Linux |
Thu, 26 Sep 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 25 Sep 2024 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | webkitgtk: Processing web content may lead to arbitrary code execution | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|

Status: PUBLISHED
Assigner: apple
Published: 2024-06-10T20:56:43.282Z
Updated: 2025-02-13T17:46:47.976Z
Reserved: 2024-02-26T15:32:28.523Z
Link: CVE-2024-27820

Updated: 2024-08-02T00:41:55.470Z

Status : Modified
Published: 2024-06-10T21:15:50.693
Modified: 2024-11-21T09:05:09.333
Link: CVE-2024-27820
