Show filters
3,536 Total Results
Displaying 381-390 of 3,536
Sort by:
Attacker Value
Unknown

CVE-2023-42884

Disclosure Date: December 12, 2023 (last updated December 14, 2023)
This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sonoma 14.2, iOS 17.2 and iPadOS 17.2, macOS Ventura 13.6.3, tvOS 17.2, iOS 16.7.3 and iPadOS 16.7.3. An app may be able to disclose kernel memory.
Attacker Value
Unknown

CVE-2023-42883

Disclosure Date: December 12, 2023 (last updated February 02, 2024)
The issue was addressed with improved memory handling. This issue is fixed in Safari 17.2, macOS Sonoma 14.2, iOS 17.2 and iPadOS 17.2, watchOS 10.2, tvOS 17.2, iOS 16.7.3 and iPadOS 16.7.3. Processing an image may lead to a denial-of-service.
Attacker Value
Unknown

CVE-2023-40446

Disclosure Date: December 12, 2023 (last updated December 14, 2023)
The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.7.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1. Processing maliciously crafted input may lead to arbitrary code execution in user-installed apps.
Attacker Value
Unknown

CVE-2023-45866

Disclosure Date: December 08, 2023 (last updated February 25, 2025)
Bluetooth HID Hosts in BlueZ may permit an unauthenticated Peripheral role HID Device to initiate and establish an encrypted connection, and accept HID keyboard reports, potentially permitting injection of HID messages when no user interaction has occurred in the Central role to authorize such access. An example affected package is bluez 5.64-0ubuntu1 in Ubuntu 22.04LTS. NOTE: in some cases, a CVE-2020-0556 mitigation would have already addressed this Bluetooth HID Hosts issue.
Attacker Value
Unknown

CVE-2023-42917

Disclosure Date: November 30, 2023 (last updated February 25, 2025)
A memory corruption vulnerability was addressed with improved locking. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1.
Attacker Value
Unknown

CVE-2023-42857

Disclosure Date: October 25, 2023 (last updated February 25, 2025)
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.1, iOS 17.1 and iPadOS 17.1. An app may be able to access sensitive user data.
Attacker Value
Unknown

CVE-2023-42852

Disclosure Date: October 25, 2023 (last updated February 17, 2024)
A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.
Attacker Value
Unknown

CVE-2023-42849

Disclosure Date: October 25, 2023 (last updated February 25, 2025)
The issue was addressed with improved memory handling. This issue is fixed in iOS 17.1 and iPadOS 17.1, macOS Monterey 12.7.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Ventura 13.6.1, macOS Sonoma 14.1. An attacker that has already achieved kernel code execution may be able to bypass kernel memory mitigations.
Attacker Value
Unknown

CVE-2023-42847

Disclosure Date: October 25, 2023 (last updated November 03, 2023)
A logic issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.1, iOS 17.1 and iPadOS 17.1. An attacker may be able to access passkeys without authentication.
Attacker Value
Unknown

CVE-2023-42846

Disclosure Date: October 25, 2023 (last updated February 25, 2025)
This issue was addressed by removing the vulnerable code. This issue is fixed in watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, tvOS 17.1, iOS 17.1 and iPadOS 17.1. A device may be passively tracked by its Wi-Fi MAC address.