{"vulnerability": "CVE-2024-44285", "sightings": [{"uuid": "b0e4d8c3-76ee-451b-948b-f7a9e62e76a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44285", "type": "published-proof-of-concept", "source": "https://t.me/Leak_DBMS/1527", "content": "\ud83d\udee1IOSurface UaF (CVE-2024-44285)\n\ud83d\udca5https://github.com/34306/IOSurface_poc18\n\ud83d\udd16@Leak_DBMS", "creation_timestamp": "2024-11-30T21:46:32.000000Z"}, {"uuid": "ed28db06-b2fd-4f66-b6e5-715b3dd95949", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44285", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2395", "content": "CVE-2024-44285 \n*\n panic  iOS 18.0/18.0.1\n*\nPOC", "creation_timestamp": "2024-11-30T21:09:43.000000Z"}, {"uuid": "23b85b8c-cd6a-427d-a30c-71b16e9b8f23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44285", "type": "published-proof-of-concept", "source": "https://t.me/DEVIL_La_RSx/1473", "content": "CVE-2024-44285 (panic  iOS 18.0/18.0.1) - POC", "creation_timestamp": "2024-11-30T21:26:53.000000Z"}, {"uuid": "0e2fc4c5-5a28-459c-89e4-5fc4c141fb39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44285", "type": "seen", "source": "https://t.me/cvedetector/9191", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44285 - Apple iOS/WatchOS/tvOS/tvisionOS Use-After-Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-44285 \nPublished : Oct. 28, 2024, 9:15 p.m. | 32\u00a0minutes ago \nDescription : A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 18.1 and iPadOS 18.1, watchOS 11.1, visionOS 2.1, tvOS 18.1. An app may be able to cause unexpected system termination or corrupt kernel memory. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-28T22:51:52.000000Z"}, {"uuid": "65c97b6b-6950-415b-8a41-89b09788c8d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44285", "type": "seen", "source": "https://bsky.app/profile/justus61.bsky.social/post/3lh7ynij4rc2l", "content": "", "creation_timestamp": "2025-02-02T21:42:28.987131Z"}, {"uuid": "2e5237b3-6cb6-4717-9af9-a1fb56caaf53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44285", "type": "seen", "source": "https://bsky.app/profile/justus61.bsky.social/post/3lh7yw5ngvk2l", "content": "", "creation_timestamp": "2025-02-02T21:47:19.116335Z"}, {"uuid": "1eb62cc5-a329-42f3-8e99-08ef1212f4f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44285", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9261", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aApp for CVE-2024-44285\nURL\uff1ahttps://github.com/slds1/explt\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-11-30T13:27:04.000000Z"}]}