CVE-2024-23222

Known exploited
A type confusion issue was addressed with improved checks. This issue is fixed in iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, tvOS 17.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited.
Source: Apple Inc.
Max CVSS
8.8
EPSS Score
0.09%
Published
2024-01-23
Updated
2024-05-16
CISA KEV Added
2024-01-23
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, iOS 17.3 and iPadOS 17.3. Processing maliciously crafted web content may lead to arbitrary code execution.
Source: Apple Inc.
Max CVSS
8.8
EPSS Score
0.09%
Published
2024-01-23
Updated
2024-01-30
The issue was addressed with improved memory handling. This issue is fixed in watchOS 10.3, tvOS 17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, Safari 17.3. Processing web content may lead to arbitrary code execution.
Source: Apple Inc.
Max CVSS
8.8
EPSS Score
0.12%
Published
2024-01-23
Updated
2024-02-26
The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.3. Processing web content may lead to arbitrary code execution.
Source: Apple Inc.
Max CVSS
8.8
EPSS Score
0.13%
Published
2024-01-23
Updated
2024-01-26
A use after free issue was addressed with improved memory management. This issue is fixed in Safari 17.2, iOS 17.2 and iPadOS 17.2, tvOS 17.2, watchOS 10.2, macOS Sonoma 14.2. Processing maliciously crafted web content may lead to arbitrary code execution.
Source: Apple Inc.
Max CVSS
8.8
EPSS Score
0.09%
Published
2024-03-28
Updated
2024-05-07
A path handling issue was addressed with improved validation. This issue is fixed in macOS Monterey 12.7.2, macOS Ventura 13.6.3, iOS 17.2 and iPadOS 17.2, tvOS 17.2, watchOS 10.2, macOS Sonoma 14.2. An app may be able to break out of its sandbox.
Source: Apple Inc.
Max CVSS
8.6
EPSS Score
0.05%
Published
2024-03-28
Updated
2024-04-08

CVE-2023-42917

Known exploited
A memory corruption vulnerability was addressed with improved locking. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1.
Source: Apple Inc.
Max CVSS
8.8
EPSS Score
0.14%
Published
2023-11-30
Updated
2024-01-26
CISA KEV Added
2023-12-04
This issue was addressed through improved state management. This issue is fixed in macOS Sonoma 14.2. Remote Login sessions may be able to obtain full disk access permissions.
Source: Apple Inc.
Max CVSS
8.8
EPSS Score
0.07%
Published
2024-03-28
Updated
2024-04-08
Multiple memory corruption issues were addressed with improved input validation. This issue is fixed in macOS Sonoma 14.2. Processing a maliciously crafted file may lead to unexpected app termination or arbitrary code execution.
Source: Apple Inc.
Max CVSS
8.8
EPSS Score
0.13%
Published
2023-12-12
Updated
2023-12-13
The issue was addressed with improved memory handling. This issue is fixed in Safari 17.2, macOS Sonoma 14.2, watchOS 10.2, iOS 17.2 and iPadOS 17.2, tvOS 17.2. Processing web content may lead to arbitrary code execution.
Source: Apple Inc.
Max CVSS
8.8
EPSS Score
0.15%
Published
2023-12-12
Updated
2024-02-02
The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.5, iOS 16.6 and iPadOS 16.6, tvOS 16.6, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution.
Source: Apple Inc.
Max CVSS
8.8
EPSS Score
0.09%
Published
2024-01-10
Updated
2024-01-17
A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.
Source: Apple Inc.
Max CVSS
8.8
EPSS Score
0.15%
Published
2023-10-25
Updated
2024-02-16
A correctness issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14, Safari 17, iOS 17 and iPadOS 17. Processing web content may lead to arbitrary code execution.
Source: Apple Inc.
Max CVSS
8.8
EPSS Score
0.09%
Published
2024-01-10
Updated
2024-02-06
A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.
Source: Apple Inc.
Max CVSS
8.8
EPSS Score
0.46%
Published
2023-10-25
Updated
2023-12-07
The issue was addressed with improved checks. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.
Source: Apple Inc.
Max CVSS
8.8
EPSS Score
0.11%
Published
2023-09-27
Updated
2024-01-31
A type confusion issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14, iOS 17 and iPadOS 17. A remote user may be able to cause kernel code execution.
Source: Apple Inc.
Max CVSS
8.8
EPSS Score
0.09%
Published
2024-01-10
Updated
2024-01-16
The issue was addressed with improved handling of protocols. This issue is fixed in tvOS 17, iOS 16.7 and iPadOS 16.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. A remote attacker may be able to break out of Web Content sandbox.
Source: Apple Inc.
Max CVSS
8.6
EPSS Score
0.28%
Published
2023-09-27
Updated
2023-10-12
The issue was addressed with improved memory handling. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.
Source: Apple Inc.
Max CVSS
8.8
EPSS Score
0.11%
Published
2023-10-25
Updated
2023-12-07
A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.
Source: Apple Inc.
Max CVSS
8.8
EPSS Score
0.15%
Published
2023-09-27
Updated
2024-01-31
The issue was addressed with improved memory handling. This issue is fixed in iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution.
Source: Apple Inc.
Max CVSS
8.8
EPSS Score
0.13%
Published
2023-07-27
Updated
2024-01-05
The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution.
Source: Apple Inc.
Max CVSS
8.8
EPSS Score
0.12%
Published
2023-07-27
Updated
2024-01-05
The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5, Safari 16.6. Processing web content may lead to arbitrary code execution.
Source: Apple Inc.
Max CVSS
8.8
EPSS Score
0.11%
Published
2023-07-27
Updated
2024-01-05
The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution.
Source: Apple Inc.
Max CVSS
8.8
EPSS Score
0.13%
Published
2023-07-27
Updated
2024-01-05
The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution.
Source: Apple Inc.
Max CVSS
8.8
EPSS Score
0.12%
Published
2023-07-27
Updated
2024-01-05
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 16.6 and iPadOS 16.6, watchOS 9.6, tvOS 16.6, macOS Ventura 13.5. Processing web content may lead to arbitrary code execution.
Source: Apple Inc.
Max CVSS
8.8
EPSS Score
0.17%
Published
2023-07-28
Updated
2024-01-05
140 vulnerabilities found
1 2 3 4 5 6
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!