A type confusion issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.2.1, iOS 16.3.1 and iPadOS 16.3.1, Safari 16.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
Attack Vector (AV) | Network | Adjacent | Local | Physical |
---|---|---|---|---|
Attack Complexity (AC) | LOW | High | ||
Privileges Required (PR) | None | Low | High | |
User Interaction (UI) | None | Required | ||
Scope (S) | Unchange | Change | ||
Confidentiality (C) | None | Low | High | |
Integrity (I) | None | Low | High | |
Availability (A) | None | Low | High |
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: Apple(86 tweets) Linux(4 tweets) Windows(1 tweets) iOS(36 tweets)
List of frequently cited URLs
List of frequently cited URLs
URL | Num of Times Referred to |
---|---|
sup | 65 |
cyberiqs.com | 57 |
cvetrends.com | 49 |
securityaffairs.com | 11 |
www.helpnetsecurity.com | 7 |
www.bleepingcomputer.com | 7 |
thehackernews.com | 6 |
www.securityweek.com | 4 |
twitter.com | 3 |
support.apple.com | 3 |
Name | URL |
---|---|
No Data |
Name | URL |
---|---|
No Data |