### [CVE-2021-1789](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789) ![](https://img.shields.io/static/v1?label=Product&message=iOS%20and%20iPadOS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=macOS&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2011.2%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2014.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2014.4%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3C%207.3%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution&color=brighgreen) ### Description A type confusion issue was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. Processing maliciously crafted web content may lead to arbitrary code execution. ### POC #### Reference No PoCs from references. #### Github - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/sploitem/WebKitPwn