The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution.
References
Configurations
Configuration 1 (hide)
|
History
05 Jan 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
18 Aug 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Aug 2023, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
04 Aug 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
02 Aug 2023, 22:30
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://support.apple.com/en-us/HT213843 - Vendor Advisory | |
References | (MISC) https://support.apple.com/en-us/HT213846 - Vendor Advisory | |
References | (MISC) http://www.openwall.com/lists/oss-security/2023/08/02/1 - Third Party Advisory | |
References | (MISC) https://support.apple.com/en-us/HT213841 - Vendor Advisory | |
References | (MISC) https://support.apple.com/en-us/HT213848 - Vendor Advisory | |
References | (MISC) https://support.apple.com/en-us/HT213847 - Vendor Advisory | |
CPE | cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* |
|
First Time |
Apple iphone Os
Apple Apple safari Apple watchos Apple tvos Apple ipados Apple macos |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CWE | NVD-CWE-noinfo |
02 Aug 2023, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Jul 2023, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-27 01:15
Updated : 2024-02-28 20:33
NVD link : CVE-2023-38595
Mitre link : CVE-2023-38595
CVE.ORG link : CVE-2023-38595
JSON object : View
Products Affected
apple
- safari
- watchos
- macos
- tvos
- ipados
- iphone_os
CWE