{"vulnerability": "CVE-2023-42875", "sightings": [{"uuid": "c5c54fbf-f009-48cd-9473-02bdbd6b23ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-42875", "type": "seen", "source": "https://t.me/cvedetector/22760", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-42875 - Apple Safari Arbitrary Code Execution\", \n  \"Content\": \"CVE ID : CVE-2023-42875 \nPublished : April 11, 2025, 3:15 p.m. | 36\u00a0minutes ago \nDescription : Processing web content may lead to arbitrary code execution. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14, watchOS 10, tvOS 17, Safari 17. The issue was addressed with improved memory handling. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-11T18:07:43.000000Z"}, {"uuid": "a3493c55-55f8-46e8-8c79-dbd286e67a8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-42875", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114320021678810637", "content": "", "creation_timestamp": "2025-04-11T15:24:57.517931Z"}, {"uuid": "42787ebd-04be-40bb-8d19-15a59a271d03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-42875", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmkkp5nkqg2r", "content": "", "creation_timestamp": "2025-04-11T17:38:11.751718Z"}]}