An integer overflow was addressed with improved input validation. This issue is fixed in tvOS 17.5, iOS 16.7.8 and iPadOS 16.7.8, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5. Processing maliciously crafted web content may lead to arbitrary code execution.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apple ipad Os
|
|
CPEs | cpe:2.3:a:apple:visionos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Apple ipad Os
|
|
Metrics |
cvssV3_1
|
ssvc
|
Sat, 16 Nov 2024 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat rhel Aus
Redhat rhel Eus Redhat rhel Tus |
|
CPEs | cpe:/a:redhat:rhel_aus:8.2 cpe:/a:redhat:rhel_aus:8.4 cpe:/a:redhat:rhel_aus:8.6 cpe:/a:redhat:rhel_e4s:8.4 cpe:/a:redhat:rhel_e4s:8.6 cpe:/a:redhat:rhel_eus:8.8 cpe:/a:redhat:rhel_eus:9.2 cpe:/a:redhat:rhel_tus:8.4 cpe:/a:redhat:rhel_tus:8.6 |
|
Vendors & Products |
Redhat rhel Aus
Redhat rhel Eus Redhat rhel Tus |
Tue, 29 Oct 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux Redhat rhel E4s |
|
CPEs | cpe:/a:redhat:enterprise_linux:8 cpe:/a:redhat:enterprise_linux:9 cpe:/a:redhat:rhel_e4s:9.0 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux Redhat rhel E4s |
Thu, 26 Sep 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-119 | |
References |
|
Wed, 25 Sep 2024 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|

Status: PUBLISHED
Assigner: apple
Published:
Updated: 2025-02-13T17:46:55.550Z
Reserved: 2024-02-26T15:32:28.526Z
Link: CVE-2024-27833

Updated: 2024-08-02T00:41:55.143Z

Status : Modified
Published: 2024-06-10T21:15:51.090
Modified: 2024-11-21T09:05:12.963
Link: CVE-2024-27833
