Executive Summary

Informations
Name CVE-2023-23529 First vendor Publication 2023-02-27
Vendor Cve Last vendor Modification 2023-05-30

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Overall CVSS Score 8.8
Base Score 8.8 Environmental Score 8.8
impact SubScore 5.9 Temporal Score 8.8
Exploitabality Sub Score 2.8
 
Attack Vector Network Attack Complexity Low
Privileges Required None User Interaction Required
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

A type confusion issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.2.1, iOS 16.3.1 and iPadOS 16.3.1, Safari 16.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23529

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Application 264
Os 6
Os 173
Os 13
Os 30
Os 1

Sources (Detail)

Source Url
FULLDISC http://seclists.org/fulldisclosure/2023/Mar/20
http://seclists.org/fulldisclosure/2023/May/7
GENTOO https://security.gentoo.org/glsa/202305-32
MISC https://support.apple.com/en-us/HT213633
https://support.apple.com/en-us/HT213635
https://support.apple.com/en-us/HT213638

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
Date Informations
2023-05-31 00:27:41
  • Multiple Updates
2023-05-30 21:26:48
  • Multiple Updates
2023-05-30 13:18:25
  • Multiple Updates
2023-03-28 13:27:27
  • Multiple Updates
2023-03-28 12:27:48
  • Multiple Updates
2023-03-08 21:27:27
  • Multiple Updates
2023-02-28 00:27:13
  • First insertion