{"vulnerability": "CVE-2024-44308", "sightings": [{"uuid": "a87f4dc7-dfc6-4065-bdb4-14f50c8374ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44308", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11517", "content": "#exploit\n1. CVE-2024-49039:\nWindows Task Scheduler EoP\nhttps://github.com/je5442804/WPTaskScheduler_CVE-2024-49039\n\n2. CVE-2024-44308:\nApple Safari JavaScriptCore RCE\nhttp://threat-intelligence.llm.re.kr/2024-12-01/CVE-2024-44308\n\n3. CVE-2024-8672:\nAuthenticated Contributor RCE in Widget Options Plugin\nhttps://github.com/Chocapikk/CVE-2024-8672", "creation_timestamp": "2024-12-04T19:24:08.000000Z"}, {"uuid": "92e15edf-54bf-4c1d-9c7b-3304db9cb0c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44308", "type": "seen", "source": "https://t.me/Rootsec_2/5375", "content": "#exploit\n1. CVE-2024-49039:\nWindows Task Scheduler EoP\nhttps://github.com/je5442804/WPTaskScheduler_CVE-2024-49039\n\n2. CVE-2024-44308:\nApple Safari JavaScriptCore RCE\nhttp://threat-intelligence.llm.re.kr/2024-12-01/CVE-2024-44308\n\n3. CVE-2024-8672:\nAuthenticated Contributor RCE in Widget Options Plugin\nhttps://github.com/Chocapikk/CVE-2024-8672", "creation_timestamp": "2024-12-05T07:26:57.000000Z"}, {"uuid": "b7be51f5-9c6b-40e9-ab19-f95bfb96523b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44308", "type": "seen", "source": "https://t.me/DEVIL_La_RSx/2294", "content": "#exploit\n1. CVE-2024-49039:\nWindows Task Scheduler EoP\nhttps://github.com/je5442804/WPTaskScheduler_CVE-2024-49039\n\n2. CVE-2024-44308:\nApple Safari JavaScriptCore RCE\nhttp://threat-intelligence.llm.re.kr/2024-12-01/CVE-2024-44308\n\n3. CVE-2024-8672:\nAuthenticated Contributor RCE in Widget Options Plugin\nhttps://github.com/Chocapikk/CVE-2024-8672", "creation_timestamp": "2024-12-04T17:10:28.000000Z"}, {"uuid": "f4f14039-09c9-4a43-b83e-54a0d1ac3fcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44308", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:11:02.000000Z"}, {"uuid": "99121abf-c81f-4d2f-bc98-2e8e30315a29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44308", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lvutyk7yn227", "content": "", "creation_timestamp": "2025-08-08T08:37:47.550094Z"}, {"uuid": "e737647f-1a0b-4ae0-922f-5166d1cd602f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44308", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/1dfb27bc-c2fd-45d8-b5a5-735db811b60d", "content": "", "creation_timestamp": "2026-02-02T12:26:21.251976Z"}, {"uuid": "52f2f485-6614-4c74-8fd9-fc2ec7535b2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44308", "type": "seen", "source": "https://thehackernews.com/2024/11/apple-releases-urgent-updates-to-patch.html", "content": "", "creation_timestamp": "2024-11-20T04:37:00.000000Z"}, {"uuid": "56e171e9-06a9-4195-8b9d-274c8f5e811c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44308", "type": "seen", "source": "https://www.darkreading.com/cyberattacks-data-breaches/apple-patches-actively-exploited-zero-days", "content": "", "creation_timestamp": "2024-11-20T14:05:05.000000Z"}, {"uuid": "4fa3d618-1d8a-4ec3-b6f4-c0aa478439d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44308", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113511151778117019", "content": "", "creation_timestamp": "2024-11-19T18:58:42.218832Z"}, {"uuid": "a7b496d0-307d-4abd-934c-19c3ccdbbb41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44308", "type": "seen", "source": "https://mstdn.ca/users/rfwaveio/statuses/113533002386695018", "content": "", "creation_timestamp": "2024-11-23T15:35:39.570739Z"}, {"uuid": "3ef0d4cd-6128-4cc2-b87f-8e420daa3117", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44308", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113521843358225188", "content": "", "creation_timestamp": "2024-11-21T16:17:42.365485Z"}, {"uuid": "07ee5623-ffd5-481e-92e6-7f5265bf67cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44308", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2729456", "content": "", "creation_timestamp": "2024-11-21T18:34:11.659908Z"}, {"uuid": "e6358d50-2c7d-4bf8-bd62-4154c682a7cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44308", "type": "exploited", "source": "https://t.me/kasperskyb2b/1513", "content": "\ud83c\udfaf \u041d\u0435\u0434\u0435\u043b\u044f \u0437\u0438\u0440\u043e\u0434\u0435\u0435\u0432 \u043d\u0430 \u0440\u0430\u0434\u0438\u043e Infosec\n\n\u041c\u0438\u043d\u0443\u0432\u0448\u0430\u044f \u043d\u0435\u0434\u0435\u043b\u044f \u043f\u0440\u0438\u043d\u0435\u0441\u043b\u0430 \u0442\u0430\u043a \u043c\u043d\u043e\u0433\u043e \u043d\u043e\u0432\u043e\u0441\u0442\u0435\u0439 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438  patch soon, \u0447\u0442\u043e \u043f\u0440\u0438\u0448\u043b\u043e\u0441\u044c \u0437\u0430\u0432\u0435\u0441\u0442\u0438 \u0434\u043b\u044f \u043d\u0438\u0445 \u043e\u0442\u0434\u0435\u043b\u044c\u043d\u044b\u0439 \u0434\u0430\u0439\u0434\u0436\u0435\u0441\u0442.\n\nPanOS: \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u044d\u043a\u0440\u0430\u043d\u044b Palo Alto \u043e\u0431\u0437\u0430\u0432\u0435\u043b\u0438\u0441\u044c \u0444\u0438\u043a\u0441\u0430\u043c\u0438 \u0434\u043b\u044f CVE-2024-0012 \u0438 CVE-2024-9474, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0432 \u0441\u043e\u0447\u0435\u0442\u0430\u043d\u0438\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u043e\u0431\u0445\u043e\u0434\u0438\u0442\u044c \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044e \u0438 \u043f\u043e\u0432\u044b\u0448\u0430\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0435 \u0434\u043e \u0430\u0434\u043c\u0438\u043d\u0441\u043a\u0438\u0445. \u041a\u0430\u043a \u043c\u0438\u043d\u0438\u043c\u0443\u043c \u0441 18 \u043d\u043e\u044f\u0431\u0440\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u0438 \u043f\u043e \u043e\u0446\u0435\u043d\u043a\u0430\u043c Shadowserver \u043f\u043e\u0440\u0430\u0436\u0435\u043d\u043e \u043e\u043a\u043e\u043b\u043e 2000 \u041c\u0421\u042d.\n\nmacOS: \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u043e \u0434\u0432\u0430 \u0437\u0438\u0440\u043e\u0434\u0435\u044f \u0432 JavascriptCore \u0438 WebKit, CVE-2024-44308, CVE-2024-44309, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a XSS \u0438 RCE \u043d\u0430 \u041c\u0430\u043a\u0430\u0445 \u0441 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u0430\u043c\u0438 Intel. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0432\u0436\u0438\u0432\u0443\u044e \u2014 \u043a\u0430\u043a \u043e\u0431\u044b\u0447\u043d\u043e \u043d\u0435 \u0433\u043e\u0432\u043e\u0440\u044f\u0442 \u043a\u0435\u043c, \u043d\u043e \u0441\u0443\u0434\u044f \u043f\u043e \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u043d\u043e\u0441\u0442\u044f\u043c Google TAG \u0437\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432, \u044d\u0442\u043e \u0447\u0442\u043e-\u0442\u043e \u0438\u0437 \u0430\u0440\u0441\u0435\u043d\u0430\u043b\u0430 \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u044b\u0445 APT.\n\nUbuntu: \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u043e \u043f\u044f\u0442\u044c \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u0432 \u0441\u0435\u0440\u0432\u0438\u0441\u0435 needrestart, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u043d\u0430 Ubuntu-\u0441\u0435\u0440\u0432\u0435\u0440\u0435 \u0434\u043e root \u0431\u0435\u0437 \u0430\u043a\u0442\u0438\u0432\u043d\u044b\u0445 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439 \u0437\u0430\u043b\u043e\u0433\u0438\u043d\u0435\u043d\u043d\u043e\u0433\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f. \n\u0418\u043d\u043e\u0433\u0434\u0430 needrestart \u0432\u0441\u0442\u0440\u0435\u0447\u0430\u0435\u0442\u0441\u044f \u0438 \u0432 \u0434\u0440\u0443\u0433\u0438\u0445 \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u0430\u0445 Linux, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u0438\u0442\u044c \u043d\u0430\u043b\u0438\u0447\u0438\u0435 \u0441\u0435\u0440\u0432\u0438\u0441\u0430 \u0438 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0435\u0433\u043e \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 3.8.\n\n7-zip: \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2024-11477 \u0432 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0435  Zstandard decompression \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u0434 \u0432 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u0435 \u0442\u0435\u043a\u0443\u0449\u0435\u0433\u043e \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430. \u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f, \u0447\u0442\u043e \u0430\u0440\u0445\u0438\u0432\u0430\u0442\u043e\u0440 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0432\u043e \u043c\u043d\u043e\u0433\u0438\u0445 \u0441\u0431\u043e\u0440\u043a\u0430\u0445 Linux, \u0430 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0434\u0435\u0444\u0435\u043a\u0442\u0430 \u0432 WinRAR \u0441\u0442\u0430\u043b\u0430 \u0442\u043e\u043f\u043e\u0432\u044b\u043c \u0432\u0435\u043a\u0442\u043e\u0440\u043e\u043c \u0430\u0442\u0430\u043a \u0432 \u043f\u0440\u043e\u0448\u043b\u043e\u043c \u0433\u043e\u0434\u0443, \u043c\u044b \u0431\u044b \u043d\u0435 \u0437\u0430\u0442\u044f\u0433\u0438\u0432\u0430\u043b\u0438 \u0441 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435\u043c.\n\nCitrix: \u0414\u0432\u0430 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044b\u0445 \u0447\u0443\u0442\u044c \u0431\u043e\u043b\u044c\u0448\u0435 \u043d\u0435\u0434\u0435\u043b\u0438 \u043d\u0430\u0437\u0430\u0434  \u0434\u0435\u0444\u0435\u043a\u0442\u0430, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0438\u0445 \u043a RCE, CVE-2024-8068  \u0438 -8069, \u043d\u0430\u0447\u0430\u043b\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0432 \u0430\u0442\u0430\u043a\u0430\u0445. \u041f\u043e\u0441\u043b\u0435 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043f\u0430\u0443\u0437\u044b Citrix \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u0445\u043e\u0442\u0444\u0438\u043a\u0441.\n\n\u0427\u0442\u043e\u0431\u044b \u0437\u0430\u043a\u043e\u043d\u0447\u0438\u0442\u044c \u043d\u0430 \u043c\u0435\u043d\u0435\u0435 \u043d\u0435\u0440\u0432\u043d\u043e\u0439 \u0438 \u0434\u0430\u0436\u0435 \u0433\u0434\u0435-\u0442\u043e \u043f\u043e\u0437\u0438\u0442\u0438\u0432\u043d\u043e\u0439 \u043d\u043e\u0442\u0435, Google \u043e\u0442\u0447\u0438\u0442\u0430\u043b\u0438\u0441\u044c, \u0447\u0442\u043e \u043f\u0440\u0438\u043a\u0440\u0443\u0442\u0438\u043b\u0438 \u0418\u0418 \u043a \u0444\u0430\u0437\u0437\u0438\u043d\u0433\u0443 \u0438 \u043d\u0430\u0448\u043b\u0438 26 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u0432 \u0441\u043e\u0444\u0442\u0435 open source, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043e\u0434\u0438\u043d (\u044d\u043a\u0437\u043e\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439) \u0431\u0430\u0433 \u0432 \u043f\u0440\u0435\u043a\u0440\u0430\u0441\u043d\u043e \u043e\u0442\u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435 OpenSSL. LLM  \u0441\u043e \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u044c\u044e \u0430\u0432\u0442\u043e\u043d\u043e\u043c\u043d\u043e\u0441\u0442\u0438 \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u0435\u0442 \u043d\u0430 \u0432\u0441\u0435\u0445 \u044d\u0442\u0430\u043f\u0430\u0445 \u2014 \u043e\u0442 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u0438\u044f \u0443\u0447\u0430\u0441\u0442\u043a\u0430 \u043a\u043e\u0434\u0430 \u0434\u043b\u044f \u0444\u0430\u0437\u0437\u0438\u043d\u0433\u0430 \u0434\u043e \u043f\u0435\u0440\u0432\u0438\u0447\u043d\u043e\u0439 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0441\u043f\u0440\u043e\u0432\u043e\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0444\u0430\u0437\u0437\u0438\u043d\u0433\u043e\u043c \u0441\u0431\u043e\u0435\u0432.\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 #\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 @\u041f2\u0422", "creation_timestamp": "2024-11-23T09:01:40.000000Z"}, {"uuid": "a179bf38-50be-4907-ab3a-33504c3aa2e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44308", "type": "exploited", "source": "https://t.me/KomunitiSiber/2893", "content": "Apple Releases Urgent Updates to Patch Actively Exploited Zero-Day Vulnerabilities\nhttps://thehackernews.com/2024/11/apple-releases-urgent-updates-to-patch.html\n\nApple has released security updates for iOS, iPadOS, macOS, visionOS, and its Safari web browser to address two zero-day flaws that have come under active exploitation in the wild.\nThe flaws are listed below -\n\nCVE-2024-44308 - A vulnerability in JavaScriptCore that could lead to arbitrary code execution when processing malicious web content\nCVE-2024-44309 - A cookie management vulnerability in", "creation_timestamp": "2024-11-20T08:30:06.000000Z"}, {"uuid": "26b9d11e-e069-49b4-af4f-11fd0bd0cd9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44308", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2024-0457", "content": "", "creation_timestamp": "2024-11-20T09:01:35.000000Z"}, {"uuid": "4a2b6f86-5343-4793-ac7f-1bc2015c5a54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44308", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2024-0456", "content": "", "creation_timestamp": "2024-11-20T09:00:42.000000Z"}, {"uuid": "a151c660-c847-4320-85d2-6bba6e4600c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44308", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-11-21T21:10:03.000000Z"}, {"uuid": "caada24d-cc95-42a6-897e-bea0b1824c7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44308", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/1dfb27bc-c2fd-45d8-b5a5-735db811b60d", "content": "", "creation_timestamp": "2026-02-02T12:26:21.251976Z"}, {"uuid": "468e83ec-9159-4a39-b707-62a6fffdc98d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44308", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1427", "content": "", "creation_timestamp": "2024-11-20T04:00:00.000000Z"}, {"uuid": "c95bd4b6-2890-4a29-b5f2-8dca67cf44c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44308", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/ad1ae2c4-042c-4d66-8de6-ebb2212ca611", "content": "", "creation_timestamp": "2024-11-20T05:23:51.386432Z"}, {"uuid": "cec99f54-5475-4f38-80d6-370a3ddaff01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44308", "type": "exploited", "source": "https://t.me/cvedetector/11552", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-44308 - Apple Safari Web Content Arbitrary Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-44308 \nPublished : Nov. 20, 2024, 12:15 a.m. | 43\u00a0minutes ago \nDescription : The issue was addressed with improved checks. This issue is fixed in Safari 18.1.1, iOS 17.7.2 and iPadOS 17.7.2, macOS Sequoia 15.1.1, iOS 18.1.1 and iPadOS 18.1.1, visionOS 2.1.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-20T02:02:31.000000Z"}, {"uuid": "402f816d-8f13-43d5-9498-b0e2e9a94603", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44308", "type": "exploited", "source": "Telegram/bh4tixHw8yPz_nRdcCCtC0xK-SCdLHht1i_q7SHfsW3Sdg", "content": "", "creation_timestamp": "2024-11-20T12:33:01.000000Z"}, {"uuid": "252a0a5c-badd-4b25-963b-6480a9f36df1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44308", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2401", "content": "CVE-2024-44308 Apple (Safari)\n*\nRCE \n*\nWriteUp + POC \n*", "creation_timestamp": "2024-12-02T03:18:53.000000Z"}]}