Advanced Vulnerability Search

CVE-2023-41993

Known Exploited Vulnerability
The issue was addressed with improved checks. This issue is fixed in Safari 17, iOS 16.7 and iPadOS 16.7, macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.
Max Base Score
9.8
Published
2023-09-21
Updated
2023-11-16
EPSS
0.62%
KEV Added
2023-09-25

CVE-2023-41992

Known Exploited Vulnerability
The issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.7, macOS Ventura 13.6, iOS 16.7 and iPadOS 16.7. A local attacker may be able to elevate their privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.
Max Base Score
7.8
Published
2023-09-21
Updated
2023-10-24
EPSS
0.09%
KEV Added
2023-09-25

CVE-2023-41991

Known Exploited Vulnerability
A certificate validation issue was addressed. This issue is fixed in macOS Ventura 13.6, iOS 16.7 and iPadOS 16.7. A malicious app may be able to bypass signature validation. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.
Max Base Score
5.5
Published
2023-09-21
Updated
2023-10-24
EPSS
0.75%
KEV Added
2023-09-25

CVE-2023-41179

Known Exploited Vulnerability
A vulnerability in the 3rd party AV uninstaller module contained in Trend Micro Apex One (on-prem and SaaS), Worry-Free Business Security and Worry-Free Business Security Services could allow an attacker to manipulate the module to execute arbitrary commands on an affected installation. Note that an attacker must first obtain administrative console access on the target system in order to exploit this vulnerability.
Max Base Score
7.2
Published
2023-09-19
Updated
2023-09-22
EPSS
0.82%
KEV Added
2023-09-21
Toggle Search Form
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!