The remote Redhat Enterprise Linux 6 host has one or more packages installed that are affected by multiple vulnerabilities that have been acknowledged by the vendor but will not be patched.
webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30954)
webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-41993)
WebKitGTK+ before 2.14.0: A use-after-free vulnerability can allow remote attackers to cause a DoS (CVE-2016-4761)
An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the WebKit component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. (CVE-2017-13856, CVE-2017-13866, CVE-2017-13870, CVE-2017-7156, CVE-2017-7157)
WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ versions 2.20.0 and 2.20.1, failed to perform TLS certificate verification for WebSocket connections. (CVE-2018-11712)
WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ prior to version 2.20.0 or without libsoup 2.62.0, unexpectedly failed to use system proxy settings for WebSocket connections. As a result, users could be deanonymized by crafted web sites via a WebSocket connection. (CVE-2018-11713)
An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the WebKit component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. (CVE-2018-4121)
An issue was discovered in certain Apple products. iOS before 11.3.1 is affected. Safari before 11.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the WebKit component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site that triggers a WebCore::jsElementScrollHeightGetter use-after-free. (CVE-2018-4200)
An issue was discovered in certain Apple products. iOS before 11.4 is affected. iOS before 11.3.1 is affected. Safari before 11.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the WebKit component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. (CVE-2018-4204)
WebKitGTK and WPE WebKit prior to version 2.24.1 failed to properly apply configured HTTP proxy settings when downloading livestream video (HLS, DASH, or Smooth Streaming), an error resulting in deanonymization.
This issue was corrected by changing the way livestreams are downloaded. (CVE-2019-11070)
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2019-6237, CVE-2019-8571, CVE-2019-8584, CVE-2019-8586, CVE-2019-8587, CVE-2019-8594, CVE-2019-8595, CVE-2019-8596, CVE-2019-8597, CVE-2019-8608, CVE-2019-8609, CVE-2019-8610, CVE-2019-8611, CVE-2019-8615, CVE-2019-8619)
WebKitGTK and WPE WebKit prior to version 2.24.1 are vulnerable to address bar spoofing upon certain JavaScript redirections. An attacker could cause malicious web content to be displayed as if for a trusted URI. This is similar to the CVE-2018-8383 issue in Microsoft Edge. (CVE-2019-6251)
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2019-7285)
A validation issue was addressed with improved logic. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may result in the disclosure of process memory. (CVE-2019-7292)
A logic issue was addressed with improved validation. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. A malicious website may be able to execute scripts in the context of another website. (CVE-2019-8503)
A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2019-8506)
A cross-origin issue existed with the fetch API. This was addressed with improved input validation. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11.
Processing maliciously crafted web content may disclose sensitive user information. (CVE-2019-8515)
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2019-8518, CVE-2019-8558, CVE-2019-8559, CVE-2019-8563)
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2019-8523, CVE-2019-8524)
A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2019-8535)
A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2019-8536, CVE-2019-8544)
A logic issue was addressed with improved validation. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to universal cross site scripting. (CVE-2019-8551)
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
(CVE-2019-8583, CVE-2019-8601, CVE-2019-8622, CVE-2019-8623)
An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may result in the disclosure of process memory.
(CVE-2019-8607)
A logic issue was addressed with improved state management. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to universal cross site scripting. (CVE-2019-8625, CVE-2019-8719)
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
(CVE-2019-8644, CVE-2019-8666, CVE-2019-8671, CVE-2019-8673, CVE-2019-8677, CVE-2019-8678, CVE-2019-8679, CVE-2019-8680, CVE-2019-8681, CVE-2019-8686, CVE-2019-8687)
A logic issue existed in the handling of synchronous page loads. This issue was addressed with improved state management. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to universal cross site scripting. (CVE-2019-8649)
A logic issue was addressed with improved state management. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to universal cross site scripting.
(CVE-2019-8658)
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2019-8669, CVE-2019-8672, CVE-2019-8676, CVE-2019-8683, CVE-2019-8684, CVE-2019-8688, CVE-2019-8689)
A logic issue was addressed with improved state management. This issue is fixed in iOS 13, Safari 13.
Processing maliciously crafted web content may lead to universal cross site scripting. (CVE-2019-8674)
A logic issue existed in the handling of document loads. This issue was addressed with improved state management. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to universal cross site scripting. (CVE-2019-8690)
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2019-8707, CVE-2019-8726, CVE-2019-8733, CVE-2019-8735)
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iCloud for Windows 11.0. Processing maliciously crafted web content may lead to arbitrary code execution.
(CVE-2019-8710)
A vulnerability was found in WebKit. The flaw is triggered when processing maliciously crafted web content that may lead to arbitrary code execution. Improved memory handling addresses the multiple memory corruption issues. (CVE-2019-8720)
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 6.1. Processing maliciously crafted web content may lead to arbitrary code execution.
(CVE-2019-8743, CVE-2019-8765)
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.1 and iPadOS 13.1, tvOS 13, Safari 13.0.1, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to arbitrary code execution.
(CVE-2019-8763)
A logic issue was addressed with improved state management. This issue is fixed in watchOS 6.1. Processing maliciously crafted web content may lead to universal cross site scripting. (CVE-2019-8764)
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 6.1, iCloud for Windows 11.0. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2019-8766)
Clear History and Website Data did not clear the history. The issue was addressed with improved data deletion. This issue is fixed in macOS Catalina 10.15. A user may be unable to delete browsing history items. (CVE-2019-8768)
An issue existed in the drawing of web page elements. The issue was addressed with improved logic. This issue is fixed in iOS 13.1 and iPadOS 13.1, macOS Catalina 10.15. Visiting a maliciously crafted website may reveal browsing history. (CVE-2019-8769)
This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in Safari 13.0.1, iOS 13. Maliciously crafted web content may violate iframe sandboxing policy. (CVE-2019-8771)
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2019-8782)
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
(CVE-2019-8783, CVE-2019-8814, CVE-2019-8815, CVE-2019-8819, CVE-2019-8821, CVE-2019-8822, CVE-2019-8823)
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2019-8808, CVE-2019-8812)
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2019-8811, CVE-2019-8816, CVE-2019-8820)
A logic issue was addressed with improved state management. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0. Processing maliciously crafted web content may lead to universal cross site scripting. (CVE-2019-8813)
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13.3, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may lead to arbitrary code execution.
(CVE-2019-8835)
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13.3, watchOS 6.1.1, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2019-8844)
A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 13.3, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may lead to arbitrary code execution.
(CVE-2019-8846)
WebKitGTK through 2.26.4 and WPE WebKit through 2.26.4 (which are the versions right before 2.28.0) contains a memory corruption issue (use-after-free) that may lead to arbitrary code execution. This issue has been fixed in 2.28.0 with improved memory handling. (CVE-2020-10018)
A use-after-free issue exists in WebKitGTK before 2.28.1 and WPE WebKit before 2.28.1 via crafted web content that allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash). (CVE-2020-11793)
A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability. (CVE-2020-13543)
A code execution vulnerability exists in the AudioSourceProviderGStreamer functionality of Webkit WebKitGTK 2.30.1. A specially crafted web page can lead to a use after free. (CVE-2020-13558)
An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The victim needs to visit a malicious web site to trigger this vulnerability. (CVE-2020-13584)
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 14.2 and iPadOS 14.2, iCloud for Windows 11.5, Safari 14.0.1, tvOS 14.2, iTunes 12.11 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.
(CVE-2020-27918)
Clear History and Website Data did not clear the history. The issue was addressed with improved data deletion. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, tvOS 14.3. A user may be unable to fully delete browsing history. (CVE-2020-29623)
A denial of service issue was addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. A malicious website may be able to cause a denial of service. (CVE-2020-3862)
A logic issue was addressed with improved validation. This issue is fixed in iCloud for Windows 7.17, iTunes 12.10.4 for Windows, iCloud for Windows 10.9.2, tvOS 13.3.1, Safari 13.0.5, iOS 13.3.1 and iPadOS 13.3.1. A DOM object context may not have had a unique security origin. (CVE-2020-3864)
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. Processing maliciously crafted web content may lead to arbitrary code execution.
(CVE-2020-3865, CVE-2020-3868)
A logic issue was addressed with improved state management. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. Processing maliciously crafted web content may lead to universal cross site scripting.
(CVE-2020-3867)
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. A file URL may be incorrectly processed. (CVE-2020-3885)
A race condition was addressed with additional validation. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. An application may be able to read restricted memory. (CVE-2020-3894)
A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. Processing maliciously crafted web content may lead to arbitrary code execution.
(CVE-2020-3895, CVE-2020-3900)
A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. A remote attacker may be able to cause arbitrary code execution. (CVE-2020-3897)
A memory consumption issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. A remote attacker may be able to cause arbitrary code execution.
(CVE-2020-3899)
A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. Processing maliciously crafted web content may lead to arbitrary code execution.
(CVE-2020-3901)
An input validation issue was addressed with improved input validation. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. Processing maliciously crafted web content may lead to a cross site scripting attack.
(CVE-2020-3902)
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution.
(CVE-2020-9802)
A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2020-9803)
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to universal cross site scripting.
(CVE-2020-9805)
A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2020-9806, CVE-2020-9807)
An input validation issue was addressed with improved input validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to a cross site scripting attack. (CVE-2020-9843)
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. A remote attacker may be able to cause arbitrary code execution. (CVE-2020-9850)
A command injection issue existed in Web Inspector. This issue was addressed with improved escaping. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Copying a URL from Web Inspector may lead to command injection. (CVE-2020-9862)
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. A remote attacker may be able to cause unexpected application termination or arbitrary code execution. (CVE-2020-9893, CVE-2020-9895)
An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. A remote attacker may be able to cause unexpected application termination or arbitrary code execution. (CVE-2020-9894)
An access issue existed in Content Security Policy. This issue was addressed with improved access restrictions. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may prevent Content Security Policy from being enforced. (CVE-2020-9915)
A logic issue was addressed with improved state management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may lead to universal cross site scripting. (CVE-2020-9925)
A use after free issue was addressed with improved memory management. This issue is fixed in watchOS 7.0, iOS 14.0 and iPadOS 14.0, iTunes for Windows 12.10.9, iCloud for Windows 11.5, tvOS 14.0, Safari 14.0.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2020-9947)
A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 14.0.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2020-9948)
A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.0.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2020-9951)
An input validation issue was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0, watchOS 7.0, Safari 14.0, iCloud for Windows 11.4, iCloud for Windows 7.21.
Processing maliciously crafted web content may lead to a cross site scripting attack. (CVE-2020-9952)
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to code execution. (CVE-2020-9983)
This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave. Maliciously crafted web content may violate iframe sandboxing policy. (CVE-2021-1765)
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-1788)
A type confusion issue was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-1789)
A port redirection issue was addressed with additional port validation. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. A malicious website may be able to access restricted ports on arbitrary servers. (CVE-2021-1799)
This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Maliciously crafted web content may violate iframe sandboxing policy. (CVE-2021-1801)
A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-1817)
A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may result in the disclosure of process memory. (CVE-2021-1820)
An input validation issue was addressed with improved input validation. This issue is fixed in iTunes 12.11.3 for Windows, iCloud for Windows 12.3, macOS Big Sur 11.3, Safari 14.1, watchOS 7.4, tvOS 14.5, iOS 14.5 and iPadOS 14.5. Processing maliciously crafted web content may lead to a cross site scripting attack. (CVE-2021-1825)
A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to universal cross site scripting. (CVE-2021-1826)
A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 14.4.1 and iPadOS 14.4.1, Safari 14.0.3 (v. 14610.4.3.1.7 and 15610.4.3.1.7), watchOS 7.3.2, macOS Big Sur 11.2.3.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-1844)
A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of Webkit WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. In order to trigger the vulnerability, a victim must be tricked into visiting a malicious webpage. (CVE-2021-21775)
A use-after-free vulnerability exists in the way Webkit’s GraphicsContext handles certain events in WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability.
(CVE-2021-21779)
An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.3 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in remote code execution. The victim needs to visit a malicious web site to trigger the vulnerability. (CVE-2021-21806)
A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious application may be able to leak sensitive user information. (CVE-2021-30682)
A logic issue was addressed with improved state management. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting. (CVE-2021-30689)
A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious website may be able to access restricted ports on arbitrary servers. (CVE-2021-30720)
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30734, CVE-2021-30749)
Description: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.
(CVE-2021-30744)
A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30758)
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.5.4.
Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited… (CVE-2021-30762)
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30795)
This issue was addressed with improved checks. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to code execution.
(CVE-2021-30797)
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30799)
A use after free issue was addressed with improved memory management. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30809)
A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, tvOS 15, iOS 15 and iPadOS 15, Safari 15, watchOS 8. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30818)
A logic issue was addressed with improved restrictions. This issue is fixed in macOS Monterey 12.0.1, iOS 14.8 and iPadOS 14.8, tvOS 15, Safari 15, watchOS 8. An attacker in a privileged network position may be able to bypass HSTS. (CVE-2021-30823)
An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 14.8 and iPadOS 14.8, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing a maliciously crafted audio file may disclose restricted memory. (CVE-2021-30836)
A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, watchOS 8. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30846)
A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution. (CVE-2021-30848)
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, watchOS 8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, iTunes 12.12 for Windows.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30849)
A memory corruption vulnerability was addressed with improved locking. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution. (CVE-2021-30851)
The issue was resolved with additional restrictions on CSS compositing. This issue is fixed in tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Visiting a maliciously crafted website may reveal a user’s browsing history. (CVE-2021-30884)
A logic issue was addressed with improved restrictions. This issue is fixed in macOS Monterey 12.0.1, iOS 15.1 and iPadOS 15.1, watchOS 8.1, tvOS 15.1. Processing maliciously crafted web content may lead to unexpectedly unenforced Content Security Policy. (CVE-2021-30887)
An information leakage issue was addressed. This issue is fixed in iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1, iOS 14.8.1 and iPadOS 14.8.1, tvOS 15.1, watchOS 8.1. A malicious website using Content Security Policy reports may be able to leak information via redirect behavior . (CVE-2021-30888)
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.0.1, iOS 15.1 and iPadOS 15.1, watchOS 8.1, tvOS 15.1. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30889)
A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.0.1, iOS 15.1 and iPadOS 15.1, watchOS 8.1, tvOS 15.1. Processing maliciously crafted web content may lead to universal cross site scripting. (CVE-2021-30890)
An issue existed in the specification for the resource timing API. The specification was updated and the updated specification was implemented. This issue is fixed in macOS Monterey 12.0.1. A malicious website may exfiltrate data cross-origin. (CVE-2021-30897)
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30934)
A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30936, CVE-2021-30951)
An integer overflow was addressed with improved input validation. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30952)
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30953)
A race condition was addressed with improved state handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30984)
In WebKitGTK before 2.32.4, there is incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create, leading to a segmentation violation and application crash, a different vulnerability than CVE-2021-30889. (CVE-2021-45481)
In WebKitGTK before 2.32.4, there is a use-after-free in WebCore::ContainerNode::firstChild, a different vulnerability than CVE-2021-30889. (CVE-2021-45482)
In WebKitGTK before 2.32.4, there is a use-after-free in WebCore::Frame::page, a different vulnerability than CVE-2021-30889. (CVE-2021-45483)
A validation issue was addressed with improved input sanitization. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. Processing a maliciously crafted mail message may lead to running arbitrary javascript. (CVE-2022-22589)
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2022-22590)
A logic issue was addressed with improved state management. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. Processing maliciously crafted web content may prevent Content Security Policy from being enforced. (CVE-2022-22592)
A cross-origin issue in the IndexDB API was addressed with improved input validation. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. A website may be able to track sensitive user information. (CVE-2022-22594)
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.3, iOS 15.4 and iPadOS 15.4, tvOS 15.4, Safari 15.4. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2022-22624)
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2022-22628)
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iTunes 12.12.3 for Windows, iOS 15.4 and iPadOS 15.4, tvOS 15.4.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2022-22629)
A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. A malicious website may cause unexpected cross-origin behavior. (CVE-2022-22637)
A cookie management issue was addressed with improved state management. This issue is fixed in Security Update 2022-003 Catalina, macOS Big Sur 11.6.5. Processing maliciously crafted web content may disclose sensitive user information. (CVE-2022-22662)
A memory corruption issue was addressed with improved state management. This issue is fixed in tvOS 15.5, watchOS 8.6, iOS 15.5 and iPadOS 15.5, macOS Monterey 12.4, Safari 15.5. Processing maliciously crafted web content may lead to code execution. (CVE-2022-26700)
A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, watchOS 8.6, macOS Monterey 12.4, Safari 15.5. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2022-26709)
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 15.5 and iPadOS 15.5, macOS Monterey 12.4, tvOS 15.5, watchOS 8.6. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2022-26710)
A memory corruption issue was addressed with improved state management. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, watchOS 8.6, macOS Monterey 12.4, Safari 15.5. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2022-26716, CVE-2022-26719)
A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.5, watchOS 8.6, iOS 15.5 and iPadOS 15.5, macOS Monterey 12.4, Safari 15.5, iTunes 12.12.4 for Windows.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2022-26717)
An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Safari 15.6. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2022-32792)
The issue was addressed with improved UI handling. This issue is fixed in watchOS 8.7, tvOS 15.6, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. Visiting a website that frames malicious content may lead to UI spoofing. (CVE-2022-32816)
A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5, Safari 15.6. Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32885)
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in Safari 16, iOS 16, iOS 15.7 and iPadOS 15.7. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2022-32886)
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.7, macOS Ventura 13, iOS 16, iOS 15.7 and iPadOS 15.7, watchOS 9, macOS Monterey 12.6, tvOS 16.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2022-32888)
The issue was addressed with improved UI handling. This issue is fixed in Safari 16, tvOS 16, watchOS 9, iOS 16. Visiting a website that frames malicious content may lead to UI spoofing. (CVE-2022-32891)
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.6.1 and iPadOS 15.6.1, macOS Monterey 12.5.1, Safari 15.6.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. (CVE-2022-32893)
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in Safari 16, iOS 16, iOS 15.7 and iPadOS 15.7. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2022-32912)
The issue was addressed with improved UI handling. This issue is fixed in iOS 16.2 and iPadOS 16.2, macOS Ventura 13.1. Visiting a website that frames malicious content may lead to UI spoofing. (CVE-2022-32919)
A correctness issue in the JIT was addressed with improved checks. This issue is fixed in tvOS 16.1, iOS 15.7.1 and iPadOS 15.7.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Processing maliciously crafted web content may disclose internal states of the app. (CVE-2022-32923)
An information disclosure issue was addressed by removing the vulnerable code. (CVE-2022-32933)
The issue was addressed with improved UI handling. This issue is fixed in tvOS 16.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Visiting a malicious website may lead to user interface spoofing. (CVE-2022-42799)
A type confusion issue was addressed with improved memory handling. This issue is fixed in tvOS 16.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2022-42823)
A logic issue was addressed with improved state management. This issue is fixed in tvOS 16.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Processing maliciously crafted web content may disclose sensitive user information. (CVE-2022-42824)
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13, iOS 16.1 and iPadOS 16, Safari 16.1. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2022-42826)
The issue was addressed with improved memory handling. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may result in the disclosure of process memory. (CVE-2022-42852)
A type confusion issue was addressed with improved state handling. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.1.2. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.1… (CVE-2022-42856)
A memory corruption issue was addressed with improved state management. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2022-42863, CVE-2022-46699)
A use after free issue was addressed with improved memory management. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2022-42867)
A memory consumption issue was addressed with improved memory handling. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2022-46691)
A logic issue was addressed with improved state management. This issue is fixed in Safari 16.2, tvOS 16.2, iCloud for Windows 14.1, iOS 15.7.2 and iPadOS 15.7.2, macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may bypass Same Origin Policy. (CVE-2022-46692)
A logic issue was addressed with improved checks. This issue is fixed in Safari 16.2, tvOS 16.2, iCloud for Windows 14.1, macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may disclose sensitive user information. (CVE-2022-46698)
A memory corruption issue was addressed with improved input validation. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2022-46700)
A spoofing issue existed in the handling of URLs. This issue was addressed with improved input validation.
This issue is fixed in iOS 16.2 and iPadOS 16.2, macOS Ventura 13.1, Safari 16.2. Visiting a malicious website may lead to address bar spoofing. (CVE-2022-46705)
A spoofing issue existed in the handling of URLs. This issue was addressed with improved input validation.
This issue is fixed in iOS 16.4 and iPadOS 16.4. Visiting a malicious website may lead to address bar spoofing. (CVE-2022-46725)
The issue was addressed with improved bounds checks. This issue is fixed in tvOS 15.6, watchOS 8.7, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5, Safari 15.6. Processing web content may lead to arbitrary code execution. (CVE-2022-48503)
The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.6.3, macOS Ventura 13.2, watchOS 9.3, macOS Big Sur 11.7.3, Safari 16.3, tvOS 16.3, iOS 16.3 and iPadOS 16.3.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2023-23517, CVE-2023-23518)
A type confusion issue was addressed with improved checks. This issue is fixed in iOS 15.7.4 and iPadOS 15.7.4, iOS 16.3.1 and iPadOS 16.3.1, macOS Ventura 13.2.1, Safari 16.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. (CVE-2023-23529)
A use-after-free vulnerability in WebCore::RenderLayer::addChild in WebKitGTK before 2.36.8 allows attackers to execute code remotely. (CVE-2023-25358)
A use-after-free vulnerability in WebCore::RenderLayer::renderer in WebKitGTK before 2.36.8 allows attackers to execute code remotely. (CVE-2023-25360)
A use-after-free vulnerability in WebCore::RenderLayer::setNextSibling in WebKitGTK before 2.36.8 allows attackers to execute code remotely. (CVE-2023-25361)
A use-after-free vulnerability in WebCore::RenderLayer::repaintBlockSelectionGaps in WebKitGTK before 2.36.8 allows attackers to execute code remotely. (CVE-2023-25362)
A use-after-free vulnerability in WebCore::RenderLayer::updateDescendantDependentFlags in WebKitGTK before 2.36.8 allows attackers to execute code remotely. (CVE-2023-25363)
This issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.3, Safari 16.4, iOS 16.4 and iPadOS 16.4, tvOS 16.4, watchOS 9.4. Processing maliciously crafted web content may bypass Same Origin Policy. (CVE-2023-27932)
The issue was addressed by removing origin information. This issue is fixed in macOS Ventura 13.3, Safari 16.4, iOS 16.4 and iPadOS 16.4, iOS 15.7.4 and iPadOS 15.7.4, tvOS 16.4, watchOS 9.4. A website may be able to track sensitive user information. (CVE-2023-27954)
A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 16.4 and iPadOS 16.4, macOS Ventura 13.3. Processing web content may lead to arbitrary code execution.
(CVE-2023-28198)
An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5.
Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been actively exploited. (CVE-2023-28204)
A use after free issue was addressed with improved memory management. This issue is fixed in Safari 16.4.1, iOS 15.7.5 and iPadOS 15.7.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. (CVE-2023-28205)
This issue was addressed with improved redaction of sensitive information. This issue is fixed in iOS 16.7.2 and iPadOS 16.7.2. A user’s password may be read aloud by VoiceOver. (CVE-2023-32359)
A logic issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.3. Content Security Policy to block domains with wildcards may fail. (CVE-2023-32370)
A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5.
Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. (CVE-2023-32373)
The issue was addressed with improved memory handling. This issue is fixed in watchOS 9.3, tvOS 16.3, macOS Ventura 13.2, iOS 16.3 and iPadOS 16.3. Processing web content may lead to arbitrary code execution.
(CVE-2023-32393)
The issue was addressed with improved bounds checks. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.8 and iPadOS 15.7.8, Safari 16.5, iOS 16.5 and iPadOS 16.5. A remote attacker may be able to break out of Web Content sandbox. Apple is aware of a report that this issue may have been actively exploited. (CVE-2023-32409)
A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.3, Safari 16.4, iOS 16.4 and iPadOS 16.4, iOS 15.7.7 and iPadOS 15.7.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7. (CVE-2023-32435)
A type confusion issue was addressed with improved checks. This issue is fixed in iOS 16.5.1 and iPadOS 16.5.1, iOS 15.7.7 and iPadOS 15.7.7, macOS Ventura 13.4.1, Safari 16.5.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. (CVE-2023-32439)
The issue was addressed with improved memory handling. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.
(CVE-2023-35074)
The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, Safari 16.5.2, tvOS 16.6, macOS Ventura 13.5, watchOS 9.6. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. (CVE-2023-37450)
The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may disclose sensitive information. (CVE-2023-38133)
The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. A website may be able to bypass Same Origin Policy. (CVE-2023-38572)
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 16.6 and iPadOS 16.6, watchOS 9.6, tvOS 16.6, macOS Ventura 13.5. Processing web content may lead to arbitrary code execution.
(CVE-2023-38592)
The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution. (CVE-2023-38594)
The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution.
(CVE-2023-38595, CVE-2023-38600)
The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5, Safari 16.6. Processing web content may lead to arbitrary code execution. (CVE-2023-38597)
A logic issue was addressed with improved state management. This issue is fixed in Safari 16.6, watchOS 9.6, iOS 15.7.8 and iPadOS 15.7.8, tvOS 16.6, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. A website may be able to track sensitive user information. (CVE-2023-38599)
The issue was addressed with improved memory handling. This issue is fixed in iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution. (CVE-2023-38611)
A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.
(CVE-2023-39434)
A use-after-free vulnerability exists in the MediaRecorder API of Webkit WebKitGTK 2.40.5. A specially crafted web page can abuse this vulnerability to cause memory corruption and potentially arbitrary code execution. A user would need to to visit a malicious webpage to trigger this vulnerability.
(CVE-2023-39928)
The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.5. A remote attacker may be able to cause arbitrary javascript code execution. (CVE-2023-40397)
A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 10, iOS 17 and iPadOS 17, tvOS 17, macOS Sonoma 14, Safari 17. Processing web content may lead to arbitrary code execution. (CVE-2023-40414)
This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in Safari 17. An attacker with JavaScript execution may be able to execute arbitrary code. (CVE-2023-40451)
The issue was addressed with improved checks. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.
(CVE-2023-41074)
The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.1, Safari 17.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1. Processing web content may lead to a denial- of-service. (CVE-2023-41983)
A correctness issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14, Safari 17, iOS 17 and iPadOS 17. Processing web content may lead to arbitrary code execution. (CVE-2023-42833)
A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution. (CVE-2023-42852)
The issue was addressed with improved memory handling. This issue is fixed in Safari 17.2, macOS Sonoma 14.2, iOS 17.2 and iPadOS 17.2, watchOS 10.2, tvOS 17.2, iOS 16.7.3 and iPadOS 16.7.3. Processing an image may lead to a denial-of-service. (CVE-2023-42883)
The issue was addressed with improved memory handling. This issue is fixed in Safari 17.2, macOS Sonoma 14.2, watchOS 10.2, iOS 17.2 and iPadOS 17.2, tvOS 17.2. Processing web content may lead to arbitrary code execution. (CVE-2023-42890)
An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1. (CVE-2023-42916)
A memory corruption vulnerability was addressed with improved locking. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1. (CVE-2023-42917)
An access issue was addressed with improved access restrictions. This issue is fixed in watchOS 10.3, tvOS 17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, Safari 17.3. A maliciously crafted webpage may be able to fingerprint the user. (CVE-2024-23206)
The issue was addressed with improved memory handling. This issue is fixed in watchOS 10.3, tvOS 17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, Safari 17.3. Processing web content may lead to arbitrary code execution. (CVE-2024-23213)
A type confusion issue was addressed with improved checks. This issue is fixed in iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, tvOS 17.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited. (CVE-2024-23222)
Note that Nessus has not tested for these issues but has instead relied on the package manager’s report that the package is installed.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Red Hat Security Advisory webkitgtk. The text
# itself is copyright (C) Red Hat, Inc.
##
include('compat.inc');
if (description)
{
script_id(196345);
script_version("1.1");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/05/13");
script_cve_id(
"CVE-2016-4761",
"CVE-2017-7156",
"CVE-2017-7157",
"CVE-2017-13856",
"CVE-2017-13866",
"CVE-2017-13870",
"CVE-2018-4121",
"CVE-2018-4200",
"CVE-2018-4204",
"CVE-2018-11712",
"CVE-2018-11713",
"CVE-2019-6237",
"CVE-2019-6251",
"CVE-2019-7285",
"CVE-2019-7292",
"CVE-2019-8503",
"CVE-2019-8506",
"CVE-2019-8515",
"CVE-2019-8518",
"CVE-2019-8523",
"CVE-2019-8524",
"CVE-2019-8535",
"CVE-2019-8536",
"CVE-2019-8544",
"CVE-2019-8551",
"CVE-2019-8558",
"CVE-2019-8559",
"CVE-2019-8563",
"CVE-2019-8571",
"CVE-2019-8583",
"CVE-2019-8584",
"CVE-2019-8586",
"CVE-2019-8587",
"CVE-2019-8594",
"CVE-2019-8595",
"CVE-2019-8596",
"CVE-2019-8597",
"CVE-2019-8601",
"CVE-2019-8607",
"CVE-2019-8608",
"CVE-2019-8609",
"CVE-2019-8610",
"CVE-2019-8611",
"CVE-2019-8615",
"CVE-2019-8619",
"CVE-2019-8622",
"CVE-2019-8623",
"CVE-2019-8625",
"CVE-2019-8644",
"CVE-2019-8649",
"CVE-2019-8658",
"CVE-2019-8666",
"CVE-2019-8669",
"CVE-2019-8671",
"CVE-2019-8672",
"CVE-2019-8673",
"CVE-2019-8674",
"CVE-2019-8676",
"CVE-2019-8677",
"CVE-2019-8678",
"CVE-2019-8679",
"CVE-2019-8680",
"CVE-2019-8681",
"CVE-2019-8683",
"CVE-2019-8684",
"CVE-2019-8686",
"CVE-2019-8687",
"CVE-2019-8688",
"CVE-2019-8689",
"CVE-2019-8690",
"CVE-2019-8707",
"CVE-2019-8710",
"CVE-2019-8719",
"CVE-2019-8720",
"CVE-2019-8726",
"CVE-2019-8733",
"CVE-2019-8735",
"CVE-2019-8743",
"CVE-2019-8763",
"CVE-2019-8764",
"CVE-2019-8765",
"CVE-2019-8766",
"CVE-2019-8768",
"CVE-2019-8769",
"CVE-2019-8771",
"CVE-2019-8782",
"CVE-2019-8783",
"CVE-2019-8808",
"CVE-2019-8811",
"CVE-2019-8812",
"CVE-2019-8813",
"CVE-2019-8814",
"CVE-2019-8815",
"CVE-2019-8816",
"CVE-2019-8819",
"CVE-2019-8820",
"CVE-2019-8821",
"CVE-2019-8822",
"CVE-2019-8823",
"CVE-2019-8835",
"CVE-2019-8844",
"CVE-2019-8846",
"CVE-2019-11070",
"CVE-2020-3862",
"CVE-2020-3864",
"CVE-2020-3865",
"CVE-2020-3867",
"CVE-2020-3868",
"CVE-2020-3885",
"CVE-2020-3894",
"CVE-2020-3895",
"CVE-2020-3897",
"CVE-2020-3899",
"CVE-2020-3900",
"CVE-2020-3901",
"CVE-2020-3902",
"CVE-2020-9802",
"CVE-2020-9803",
"CVE-2020-9805",
"CVE-2020-9806",
"CVE-2020-9807",
"CVE-2020-9843",
"CVE-2020-9850",
"CVE-2020-9862",
"CVE-2020-9893",
"CVE-2020-9894",
"CVE-2020-9895",
"CVE-2020-9915",
"CVE-2020-9925",
"CVE-2020-9947",
"CVE-2020-9948",
"CVE-2020-9951",
"CVE-2020-9952",
"CVE-2020-9983",
"CVE-2020-10018",
"CVE-2020-11793",
"CVE-2020-13543",
"CVE-2020-13558",
"CVE-2020-13584",
"CVE-2020-27918",
"CVE-2020-29623",
"CVE-2021-1765",
"CVE-2021-1788",
"CVE-2021-1789",
"CVE-2021-1799",
"CVE-2021-1801",
"CVE-2021-1817",
"CVE-2021-1820",
"CVE-2021-1825",
"CVE-2021-1826",
"CVE-2021-1844",
"CVE-2021-21775",
"CVE-2021-21779",
"CVE-2021-21806",
"CVE-2021-30682",
"CVE-2021-30689",
"CVE-2021-30720",
"CVE-2021-30734",
"CVE-2021-30744",
"CVE-2021-30749",
"CVE-2021-30758",
"CVE-2021-30762",
"CVE-2021-30795",
"CVE-2021-30797",
"CVE-2021-30799",
"CVE-2021-30809",
"CVE-2021-30818",
"CVE-2021-30823",
"CVE-2021-30836",
"CVE-2021-30846",
"CVE-2021-30848",
"CVE-2021-30849",
"CVE-2021-30851",
"CVE-2021-30884",
"CVE-2021-30887",
"CVE-2021-30888",
"CVE-2021-30889",
"CVE-2021-30890",
"CVE-2021-30897",
"CVE-2021-30934",
"CVE-2021-30936",
"CVE-2021-30951",
"CVE-2021-30952",
"CVE-2021-30953",
"CVE-2021-30954",
"CVE-2021-30984",
"CVE-2021-45481",
"CVE-2021-45482",
"CVE-2021-45483",
"CVE-2022-22589",
"CVE-2022-22590",
"CVE-2022-22592",
"CVE-2022-22594",
"CVE-2022-22624",
"CVE-2022-22628",
"CVE-2022-22629",
"CVE-2022-22637",
"CVE-2022-22662",
"CVE-2022-26700",
"CVE-2022-26709",
"CVE-2022-26710",
"CVE-2022-26716",
"CVE-2022-26717",
"CVE-2022-26719",
"CVE-2022-32792",
"CVE-2022-32816",
"CVE-2022-32885",
"CVE-2022-32886",
"CVE-2022-32888",
"CVE-2022-32891",
"CVE-2022-32893",
"CVE-2022-32912",
"CVE-2022-32919",
"CVE-2022-32923",
"CVE-2022-32933",
"CVE-2022-42799",
"CVE-2022-42823",
"CVE-2022-42824",
"CVE-2022-42826",
"CVE-2022-42852",
"CVE-2022-42856",
"CVE-2022-42863",
"CVE-2022-42867",
"CVE-2022-46691",
"CVE-2022-46692",
"CVE-2022-46698",
"CVE-2022-46699",
"CVE-2022-46700",
"CVE-2022-46705",
"CVE-2022-46725",
"CVE-2022-48503",
"CVE-2023-23517",
"CVE-2023-23518",
"CVE-2023-23529",
"CVE-2023-25358",
"CVE-2023-25360",
"CVE-2023-25361",
"CVE-2023-25362",
"CVE-2023-25363",
"CVE-2023-27932",
"CVE-2023-27954",
"CVE-2023-28198",
"CVE-2023-28204",
"CVE-2023-28205",
"CVE-2023-32359",
"CVE-2023-32370",
"CVE-2023-32373",
"CVE-2023-32393",
"CVE-2023-32409",
"CVE-2023-32435",
"CVE-2023-32439",
"CVE-2023-35074",
"CVE-2023-37450",
"CVE-2023-38133",
"CVE-2023-38572",
"CVE-2023-38592",
"CVE-2023-38594",
"CVE-2023-38595",
"CVE-2023-38597",
"CVE-2023-38599",
"CVE-2023-38600",
"CVE-2023-38611",
"CVE-2023-39434",
"CVE-2023-39928",
"CVE-2023-40397",
"CVE-2023-40414",
"CVE-2023-40451",
"CVE-2023-41074",
"CVE-2023-41983",
"CVE-2023-41993",
"CVE-2023-42833",
"CVE-2023-42852",
"CVE-2023-42883",
"CVE-2023-42890",
"CVE-2023-42916",
"CVE-2023-42917",
"CVE-2024-23206",
"CVE-2024-23213",
"CVE-2024-23222"
);
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2021/11/17");
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2022/05/25");
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2022/06/13");
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2022/09/08");
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2023/01/04");
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2023/03/07");
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2023/05/01");
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2023/06/12");
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2023/07/14");
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2023/08/03");
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2023/10/16");
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2023/12/25");
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2024/02/13");
script_name(english:"RHEL 6 : webkitgtk (Unpatched Vulnerability)");
script_set_attribute(attribute:"synopsis", value:
"The remote Red Hat 6 host is affected by multiple vulnerabilities that will not be patched.");
script_set_attribute(attribute:"description", value:
"The remote Redhat Enterprise Linux 6 host has one or more packages installed that are affected by multiple
vulnerabilities that have been acknowledged by the vendor but will not be patched.
- webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution
(CVE-2021-30954)
- webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-41993)
- WebKitGTK+ before 2.14.0: A use-after-free vulnerability can allow remote attackers to cause a DoS
(CVE-2016-4761)
- An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is
affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS
before 11.2 is affected. The issue involves the WebKit component. It allows remote attackers to execute
arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web
site. (CVE-2017-13856, CVE-2017-13866, CVE-2017-13870, CVE-2017-7156, CVE-2017-7157)
- WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as
used in WebKitGTK+ versions 2.20.0 and 2.20.1, failed to perform TLS certificate verification for
WebSocket connections. (CVE-2018-11712)
- WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as
used in WebKitGTK+ prior to version 2.20.0 or without libsoup 2.62.0, unexpectedly failed to use system
proxy settings for WebSocket connections. As a result, users could be deanonymized by crafted web sites
via a WebSocket connection. (CVE-2018-11713)
- An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is
affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS
before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the WebKit component. It
allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and
application crash) via a crafted web site. (CVE-2018-4121)
- An issue was discovered in certain Apple products. iOS before 11.3.1 is affected. Safari before 11.1 is
affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS
before 11.4 is affected. The issue involves the WebKit component. It allows remote attackers to execute
arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web
site that triggers a WebCore::jsElementScrollHeightGetter use-after-free. (CVE-2018-4200)
- An issue was discovered in certain Apple products. iOS before 11.4 is affected. iOS before 11.3.1 is
affected. Safari before 11.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5
on Windows is affected. tvOS before 11.4 is affected. The issue involves the WebKit component. It allows
remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application
crash) via a crafted web site. (CVE-2018-4204)
- WebKitGTK and WPE WebKit prior to version 2.24.1 failed to properly apply configured HTTP proxy settings
when downloading livestream video (HLS, DASH, or Smooth Streaming), an error resulting in deanonymization.
This issue was corrected by changing the way livestreams are downloaded. (CVE-2019-11070)
- Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS
12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2019-6237,
CVE-2019-8571, CVE-2019-8584, CVE-2019-8586, CVE-2019-8587, CVE-2019-8594, CVE-2019-8595, CVE-2019-8596,
CVE-2019-8597, CVE-2019-8608, CVE-2019-8609, CVE-2019-8610, CVE-2019-8611, CVE-2019-8615, CVE-2019-8619)
- WebKitGTK and WPE WebKit prior to version 2.24.1 are vulnerable to address bar spoofing upon certain
JavaScript redirections. An attacker could cause malicious web content to be displayed as if for a trusted
URI. This is similar to the CVE-2018-8383 issue in Microsoft Edge. (CVE-2019-6251)
- A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.2,
tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted
web content may lead to arbitrary code execution. (CVE-2019-7285)
- A validation issue was addressed with improved logic. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS
5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web
content may result in the disclosure of process memory. (CVE-2019-7292)
- A logic issue was addressed with improved validation. This issue is fixed in iOS 12.2, tvOS 12.2, Safari
12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. A malicious website may be able to execute
scripts in the context of another website. (CVE-2019-8503)
- A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS
12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously
crafted web content may lead to arbitrary code execution. (CVE-2019-8506)
- A cross-origin issue existed with the fetch API. This was addressed with improved input validation. This
issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11.
Processing maliciously crafted web content may disclose sensitive user information. (CVE-2019-8515)
- Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS
12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing
maliciously crafted web content may lead to arbitrary code execution. (CVE-2019-8518, CVE-2019-8558,
CVE-2019-8559, CVE-2019-8563)
- Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS
12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously
crafted web content may lead to arbitrary code execution. (CVE-2019-8523, CVE-2019-8524)
- A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 12.2,
tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted
web content may lead to arbitrary code execution. (CVE-2019-8535)
- A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.2,
tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing
maliciously crafted web content may lead to arbitrary code execution. (CVE-2019-8536, CVE-2019-8544)
- A logic issue was addressed with improved validation. This issue is fixed in iOS 12.2, tvOS 12.2, Safari
12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may
lead to universal cross site scripting. (CVE-2019-8551)
- Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS
12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for
Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
(CVE-2019-8583, CVE-2019-8601, CVE-2019-8622, CVE-2019-8623)
- An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 12.3, macOS
Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows
7.12. Processing maliciously crafted web content may result in the disclosure of process memory.
(CVE-2019-8607)
- A logic issue was addressed with improved state management. This issue is fixed in tvOS 13, iTunes for
Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web
content may lead to universal cross site scripting. (CVE-2019-8625, CVE-2019-8719)
- Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS
12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13,
iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
(CVE-2019-8644, CVE-2019-8666, CVE-2019-8671, CVE-2019-8673, CVE-2019-8677, CVE-2019-8678, CVE-2019-8679,
CVE-2019-8680, CVE-2019-8681, CVE-2019-8686, CVE-2019-8687)
- A logic issue existed in the handling of synchronous page loads. This issue was addressed with improved
state management. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes
for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web
content may lead to universal cross site scripting. (CVE-2019-8649)
- A logic issue was addressed with improved state management. This issue is fixed in iOS 12.4, macOS Mojave
10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud
for Windows 10.6. Processing maliciously crafted web content may lead to universal cross site scripting.
(CVE-2019-8658)
- Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS
12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for
Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary
code execution. (CVE-2019-8669, CVE-2019-8672, CVE-2019-8676, CVE-2019-8683, CVE-2019-8684, CVE-2019-8688,
CVE-2019-8689)
- A logic issue was addressed with improved state management. This issue is fixed in iOS 13, Safari 13.
Processing maliciously crafted web content may lead to universal cross site scripting. (CVE-2019-8674)
- A logic issue existed in the handling of document loads. This issue was addressed with improved state
management. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for
Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web
content may lead to universal cross site scripting. (CVE-2019-8690)
- Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in
tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing
maliciously crafted web content may lead to arbitrary code execution. (CVE-2019-8707, CVE-2019-8726,
CVE-2019-8733, CVE-2019-8735)
- Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in
iCloud for Windows 11.0. Processing maliciously crafted web content may lead to arbitrary code execution.
(CVE-2019-8710)
- A vulnerability was found in WebKit. The flaw is triggered when processing maliciously crafted web content
that may lead to arbitrary code execution. Improved memory handling addresses the multiple memory
corruption issues. (CVE-2019-8720)
- Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in
watchOS 6.1. Processing maliciously crafted web content may lead to arbitrary code execution.
(CVE-2019-8743, CVE-2019-8765)
- Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS
13.1 and iPadOS 13.1, tvOS 13, Safari 13.0.1, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud
for Windows 7.14. Processing maliciously crafted web content may lead to arbitrary code execution.
(CVE-2019-8763)
- A logic issue was addressed with improved state management. This issue is fixed in watchOS 6.1. Processing
maliciously crafted web content may lead to universal cross site scripting. (CVE-2019-8764)
- Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in
watchOS 6.1, iCloud for Windows 11.0. Processing maliciously crafted web content may lead to arbitrary
code execution. (CVE-2019-8766)
- Clear History and Website Data did not clear the history. The issue was addressed with improved data
deletion. This issue is fixed in macOS Catalina 10.15. A user may be unable to delete browsing history
items. (CVE-2019-8768)
- An issue existed in the drawing of web page elements. The issue was addressed with improved logic. This
issue is fixed in iOS 13.1 and iPadOS 13.1, macOS Catalina 10.15. Visiting a maliciously crafted website
may reveal browsing history. (CVE-2019-8769)
- This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in Safari 13.0.1,
iOS 13. Maliciously crafted web content may violate iframe sandboxing policy. (CVE-2019-8771)
- Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS
13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2019-8782)
- Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS
13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0,
iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
(CVE-2019-8783, CVE-2019-8814, CVE-2019-8815, CVE-2019-8819, CVE-2019-8821, CVE-2019-8822, CVE-2019-8823)
- Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS
13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2. Processing
maliciously crafted web content may lead to arbitrary code execution. (CVE-2019-8808, CVE-2019-8812)
- Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS
13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for
Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary
code execution. (CVE-2019-8811, CVE-2019-8816, CVE-2019-8820)
- A logic issue was addressed with improved state management. This issue is fixed in iOS 13.2 and iPadOS
13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0. Processing
maliciously crafted web content may lead to universal cross site scripting. (CVE-2019-8813)
- Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in
tvOS 13.3, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows,
iCloud for Windows 7.16. Processing maliciously crafted web content may lead to arbitrary code execution.
(CVE-2019-8835)
- Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in
tvOS 13.3, watchOS 6.1.1, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3
for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may lead to arbitrary
code execution. (CVE-2019-8844)
- A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 13.3,
iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for
Windows 7.16. Processing maliciously crafted web content may lead to arbitrary code execution.
(CVE-2019-8846)
- WebKitGTK through 2.26.4 and WPE WebKit through 2.26.4 (which are the versions right before 2.28.0)
contains a memory corruption issue (use-after-free) that may lead to arbitrary code execution. This issue
has been fixed in 2.28.0 with improved memory handling. (CVE-2020-10018)
- A use-after-free issue exists in WebKitGTK before 2.28.1 and WPE WebKit before 2.28.1 via crafted web
content that allows remote attackers to execute arbitrary code or cause a denial of service (memory
corruption and application crash). (CVE-2020-11793)
- A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A
specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code
execution. An attacker can get a user to visit a webpage to trigger this vulnerability. (CVE-2020-13543)
- A code execution vulnerability exists in the AudioSourceProviderGStreamer functionality of Webkit
WebKitGTK 2.30.1. A specially crafted web page can lead to a use after free. (CVE-2020-13558)
- An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially
crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The
victim needs to visit a malicious web site to trigger this vulnerability. (CVE-2020-13584)
- A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur
11.0.1, watchOS 7.1, iOS 14.2 and iPadOS 14.2, iCloud for Windows 11.5, Safari 14.0.1, tvOS 14.2, iTunes
12.11 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.
(CVE-2020-27918)
- Clear History and Website Data did not clear the history. The issue was addressed with improved data
deletion. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update
2020-007 Mojave, iOS 14.3 and iPadOS 14.3, tvOS 14.3. A user may be unable to fully delete browsing
history. (CVE-2020-29623)
- A denial of service issue was addressed with improved memory handling. This issue is fixed in iOS 13.3.1
and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud
for Windows 7.17. A malicious website may be able to cause a denial of service. (CVE-2020-3862)
- A logic issue was addressed with improved validation. This issue is fixed in iCloud for Windows 7.17,
iTunes 12.10.4 for Windows, iCloud for Windows 10.9.2, tvOS 13.3.1, Safari 13.0.5, iOS 13.3.1 and iPadOS
13.3.1. A DOM object context may not have had a unique security origin. (CVE-2020-3864)
- Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS
13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0,
iCloud for Windows 7.17. Processing maliciously crafted web content may lead to arbitrary code execution.
(CVE-2020-3865, CVE-2020-3868)
- A logic issue was addressed with improved state management. This issue is fixed in iOS 13.3.1 and iPadOS
13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for
Windows 7.17. Processing maliciously crafted web content may lead to universal cross site scripting.
(CVE-2020-3867)
- A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.4 and iPadOS 13.4,
tvOS 13.4, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. A
file URL may be incorrectly processed. (CVE-2020-3885)
- A race condition was addressed with additional validation. This issue is fixed in iOS 13.4 and iPadOS
13.4, tvOS 13.4, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows
7.18. An application may be able to read restricted memory. (CVE-2020-3894)
- A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and
iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3,
iCloud for Windows 7.18. Processing maliciously crafted web content may lead to arbitrary code execution.
(CVE-2020-3895, CVE-2020-3900)
- A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and
iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3,
iCloud for Windows 7.18. A remote attacker may be able to cause arbitrary code execution. (CVE-2020-3897)
- A memory consumption issue was addressed with improved memory handling. This issue is fixed in iOS 13.4
and iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows
10.9.3, iCloud for Windows 7.18. A remote attacker may be able to cause arbitrary code execution.
(CVE-2020-3899)
- A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and
iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3,
iCloud for Windows 7.18. Processing maliciously crafted web content may lead to arbitrary code execution.
(CVE-2020-3901)
- An input validation issue was addressed with improved input validation. This issue is fixed in iOS 13.4
and iPadOS 13.4, tvOS 13.4, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for
Windows 7.18. Processing maliciously crafted web content may lead to a cross site scripting attack.
(CVE-2020-3902)
- A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5,
tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for
Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution.
(CVE-2020-9802)
- A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 13.5 and
iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows
11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code
execution. (CVE-2020-9803)
- A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5,
tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for
Windows 7.19. Processing maliciously crafted web content may lead to universal cross site scripting.
(CVE-2020-9805)
- A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 13.5
and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows
11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code
execution. (CVE-2020-9806, CVE-2020-9807)
- An input validation issue was addressed with improved input validation. This issue is fixed in iOS 13.5
and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows
11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to a cross site
scripting attack. (CVE-2020-9843)
- A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5,
tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for
Windows 7.19. A remote attacker may be able to cause arbitrary code execution. (CVE-2020-9850)
- A command injection issue existed in Web Inspector. This issue was addressed with improved escaping. This
issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for
Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Copying a URL from Web Inspector may lead to
command injection. (CVE-2020-9862)
- A use after free issue was addressed with improved memory management. This issue is fixed in iOS 13.6 and
iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows
11.3, iCloud for Windows 7.20. A remote attacker may be able to cause unexpected application termination
or arbitrary code execution. (CVE-2020-9893, CVE-2020-9895)
- An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 13.6 and
iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows
11.3, iCloud for Windows 7.20. A remote attacker may be able to cause unexpected application termination
or arbitrary code execution. (CVE-2020-9894)
- An access issue existed in Content Security Policy. This issue was addressed with improved access
restrictions. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2,
iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously
crafted web content may prevent Content Security Policy from being enforced. (CVE-2020-9915)
- A logic issue was addressed with improved state management. This issue is fixed in iOS 13.6 and iPadOS
13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3,
iCloud for Windows 7.20. Processing maliciously crafted web content may lead to universal cross site
scripting. (CVE-2020-9925)
- A use after free issue was addressed with improved memory management. This issue is fixed in watchOS 7.0,
iOS 14.0 and iPadOS 14.0, iTunes for Windows 12.10.9, iCloud for Windows 11.5, tvOS 14.0, Safari 14.0.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2020-9947)
- A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 14.0.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2020-9948)
- A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.0.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2020-9951)
- An input validation issue was addressed with improved input validation. This issue is fixed in iOS 14.0
and iPadOS 14.0, tvOS 14.0, watchOS 7.0, Safari 14.0, iCloud for Windows 11.4, iCloud for Windows 7.21.
Processing maliciously crafted web content may lead to a cross site scripting attack. (CVE-2020-9952)
- An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Safari
14.0. Processing maliciously crafted web content may lead to code execution. (CVE-2020-9983)
- This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in macOS Big Sur
11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave. Maliciously crafted web content
may violate iframe sandboxing policy. (CVE-2021-1765)
- A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur
11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4
and iPadOS 14.4, Safari 14.0.3. Processing maliciously crafted web content may lead to arbitrary code
execution. (CVE-2021-1788)
- A type confusion issue was addressed with improved state handling. This issue is fixed in macOS Big Sur
11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4
and iPadOS 14.4, Safari 14.0.3. Processing maliciously crafted web content may lead to arbitrary code
execution. (CVE-2021-1789)
- A port redirection issue was addressed with additional port validation. This issue is fixed in macOS Big
Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS
14.4 and iPadOS 14.4, Safari 14.0.3. A malicious website may be able to access restricted ports on
arbitrary servers. (CVE-2021-1799)
- This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in macOS Big Sur
11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4
and iPadOS 14.4. Maliciously crafted web content may violate iframe sandboxing policy. (CVE-2021-1801)
- A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big
Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may
lead to arbitrary code execution. (CVE-2021-1817)
- A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS
Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content
may result in the disclosure of process memory. (CVE-2021-1820)
- An input validation issue was addressed with improved input validation. This issue is fixed in iTunes
12.11.3 for Windows, iCloud for Windows 12.3, macOS Big Sur 11.3, Safari 14.1, watchOS 7.4, tvOS 14.5, iOS
14.5 and iPadOS 14.5. Processing maliciously crafted web content may lead to a cross site scripting
attack. (CVE-2021-1825)
- A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.3, iOS
14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to
universal cross site scripting. (CVE-2021-1826)
- A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 14.4.1 and
iPadOS 14.4.1, Safari 14.0.3 (v. 14610.4.3.1.7 and 15610.4.3.1.7), watchOS 7.3.2, macOS Big Sur 11.2.3.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-1844)
- A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of
Webkit WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further
memory corruption. In order to trigger the vulnerability, a victim must be tricked into visiting a
malicious webpage. (CVE-2021-21775)
- A use-after-free vulnerability exists in the way Webkit's GraphicsContext handles certain events in
WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory
corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability.
(CVE-2021-21779)
- An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.3 x64. A specially
crafted HTML web page can cause a use-after-free condition, resulting in remote code execution. The victim
needs to visit a malicious web site to trigger the vulnerability. (CVE-2021-21806)
- A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and
iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious application may be able to leak
sensitive user information. (CVE-2021-30682)
- A logic issue was addressed with improved state management. This issue is fixed in tvOS 14.6, iOS 14.6 and
iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content
may lead to universal cross site scripting. (CVE-2021-30689)
- A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and
iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious website may be able to access
restricted ports on arbitrary servers. (CVE-2021-30720)
- Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in
tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing
maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30734, CVE-2021-30749)
- Description: A cross-origin issue with iframe elements was addressed with improved tracking of security
origins. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4,
watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.
(CVE-2021-30744)
- A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 14.7, Safari
14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to
arbitrary code execution. (CVE-2021-30758)
- A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.5.4.
Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a
report that this issue may have been actively exploited.. (CVE-2021-30762)
- A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.7,
Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may
lead to arbitrary code execution. (CVE-2021-30795)
- This issue was addressed with improved checks. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big
Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to code execution.
(CVE-2021-30797)
- Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS
14.7, macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. Processing
maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30799)
- A use after free issue was addressed with improved memory management. This issue is fixed in Safari 15,
tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to arbitrary
code execution. (CVE-2021-30809)
- A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 14.8 and
iPadOS 14.8, tvOS 15, iOS 15 and iPadOS 15, Safari 15, watchOS 8. Processing maliciously crafted web
content may lead to arbitrary code execution. (CVE-2021-30818)
- A logic issue was addressed with improved restrictions. This issue is fixed in macOS Monterey 12.0.1, iOS
14.8 and iPadOS 14.8, tvOS 15, Safari 15, watchOS 8. An attacker in a privileged network position may be
able to bypass HSTS. (CVE-2021-30823)
- An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 14.8 and
iPadOS 14.8, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing a maliciously crafted audio file may
disclose restricted memory. (CVE-2021-30836)
- A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and
iPadOS 14.8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, watchOS 8. Processing maliciously crafted web
content may lead to arbitrary code execution. (CVE-2021-30846)
- A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and
iPadOS 14.8, Safari 15, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code
execution. (CVE-2021-30848)
- Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS
14.8 and iPadOS 14.8, watchOS 8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, iTunes 12.12 for Windows.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2021-30849)
- A memory corruption vulnerability was addressed with improved locking. This issue is fixed in Safari 15,
tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code
execution. (CVE-2021-30851)
- The issue was resolved with additional restrictions on CSS compositing. This issue is fixed in tvOS 15,
watchOS 8, iOS 15 and iPadOS 15. Visiting a maliciously crafted website may reveal a user's browsing
history. (CVE-2021-30884)
- A logic issue was addressed with improved restrictions. This issue is fixed in macOS Monterey 12.0.1, iOS
15.1 and iPadOS 15.1, watchOS 8.1, tvOS 15.1. Processing maliciously crafted web content may lead to
unexpectedly unenforced Content Security Policy. (CVE-2021-30887)
- An information leakage issue was addressed. This issue is fixed in iOS 15.1 and iPadOS 15.1, macOS
Monterey 12.0.1, iOS 14.8.1 and iPadOS 14.8.1, tvOS 15.1, watchOS 8.1. A malicious website using Content
Security Policy reports may be able to leak information via redirect behavior . (CVE-2021-30888)
- A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Monterey
12.0.1, iOS 15.1 and iPadOS 15.1, watchOS 8.1, tvOS 15.1. Processing maliciously crafted web content may
lead to arbitrary code execution. (CVE-2021-30889)
- A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.0.1,
iOS 15.1 and iPadOS 15.1, watchOS 8.1, tvOS 15.1. Processing maliciously crafted web content may lead to
universal cross site scripting. (CVE-2021-30890)
- An issue existed in the specification for the resource timing API. The specification was updated and the
updated specification was implemented. This issue is fixed in macOS Monterey 12.0.1. A malicious website
may exfiltrate data cross-origin. (CVE-2021-30897)
- A buffer overflow issue was addressed with improved memory handling. This issue is fixed in tvOS 15.2,
macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted
web content may lead to arbitrary code execution. (CVE-2021-30934)
- A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.2,
macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted
web content may lead to arbitrary code execution. (CVE-2021-30936, CVE-2021-30951)
- An integer overflow was addressed with improved input validation. This issue is fixed in tvOS 15.2, macOS
Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web
content may lead to arbitrary code execution. (CVE-2021-30952)
- An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in tvOS 15.2, macOS
Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web
content may lead to arbitrary code execution. (CVE-2021-30953)
- A race condition was addressed with improved state handling. This issue is fixed in tvOS 15.2, macOS
Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web
content may lead to arbitrary code execution. (CVE-2021-30984)
- In WebKitGTK before 2.32.4, there is incorrect memory allocation in
WebCore::ImageBufferCairoImageSurfaceBackend::create, leading to a segmentation violation and application
crash, a different vulnerability than CVE-2021-30889. (CVE-2021-45481)
- In WebKitGTK before 2.32.4, there is a use-after-free in WebCore::ContainerNode::firstChild, a different
vulnerability than CVE-2021-30889. (CVE-2021-45482)
- In WebKitGTK before 2.32.4, there is a use-after-free in WebCore::Frame::page, a different vulnerability
than CVE-2021-30889. (CVE-2021-45483)
- A validation issue was addressed with improved input sanitization. This issue is fixed in iOS 15.3 and
iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. Processing a maliciously crafted
mail message may lead to running arbitrary javascript. (CVE-2022-22589)
- A use after free issue was addressed with improved memory management. This issue is fixed in iOS 15.3 and
iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. Processing maliciously crafted web
content may lead to arbitrary code execution. (CVE-2022-22590)
- A logic issue was addressed with improved state management. This issue is fixed in iOS 15.3 and iPadOS
15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. Processing maliciously crafted web content
may prevent Content Security Policy from being enforced. (CVE-2022-22592)
- A cross-origin issue in the IndexDB API was addressed with improved input validation. This issue is fixed
in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. A website may be
able to track sensitive user information. (CVE-2022-22594)
- A use after free issue was addressed with improved memory management. This issue is fixed in macOS
Monterey 12.3, iOS 15.4 and iPadOS 15.4, tvOS 15.4, Safari 15.4. Processing maliciously crafted web
content may lead to arbitrary code execution. (CVE-2022-22624)
- A use after free issue was addressed with improved memory management. This issue is fixed in macOS
Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously
crafted web content may lead to arbitrary code execution. (CVE-2022-22628)
- A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Monterey
12.3, Safari 15.4, watchOS 8.5, iTunes 12.12.3 for Windows, iOS 15.4 and iPadOS 15.4, tvOS 15.4.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2022-22629)
- A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.3,
Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. A malicious website may cause unexpected
cross-origin behavior. (CVE-2022-22637)
- A cookie management issue was addressed with improved state management. This issue is fixed in Security
Update 2022-003 Catalina, macOS Big Sur 11.6.5. Processing maliciously crafted web content may disclose
sensitive user information. (CVE-2022-22662)
- A memory corruption issue was addressed with improved state management. This issue is fixed in tvOS 15.5,
watchOS 8.6, iOS 15.5 and iPadOS 15.5, macOS Monterey 12.4, Safari 15.5. Processing maliciously crafted
web content may lead to code execution. (CVE-2022-26700)
- A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.5,
iOS 15.5 and iPadOS 15.5, watchOS 8.6, macOS Monterey 12.4, Safari 15.5. Processing maliciously crafted
web content may lead to arbitrary code execution. (CVE-2022-26709)
- A use after free issue was addressed with improved memory management. This issue is fixed in iOS 15.5 and
iPadOS 15.5, macOS Monterey 12.4, tvOS 15.5, watchOS 8.6. Processing maliciously crafted web content may
lead to arbitrary code execution. (CVE-2022-26710)
- A memory corruption issue was addressed with improved state management. This issue is fixed in tvOS 15.5,
iOS 15.5 and iPadOS 15.5, watchOS 8.6, macOS Monterey 12.4, Safari 15.5. Processing maliciously crafted
web content may lead to arbitrary code execution. (CVE-2022-26716, CVE-2022-26719)
- A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.5,
watchOS 8.6, iOS 15.5 and iPadOS 15.5, macOS Monterey 12.4, Safari 15.5, iTunes 12.12.4 for Windows.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2022-26717)
- An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in iOS 15.6
and iPadOS 15.6, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Safari 15.6. Processing maliciously crafted
web content may lead to arbitrary code execution. (CVE-2022-32792)
- The issue was addressed with improved UI handling. This issue is fixed in watchOS 8.7, tvOS 15.6, iOS 15.6
and iPadOS 15.6, macOS Monterey 12.5. Visiting a website that frames malicious content may lead to UI
spoofing. (CVE-2022-32816)
- A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 15.6 and
iPadOS 15.6, macOS Monterey 12.5, Safari 15.6. Processing maliciously crafted web content may lead to
arbitrary code execution (CVE-2022-32885)
- A buffer overflow issue was addressed with improved memory handling. This issue is fixed in Safari 16, iOS
16, iOS 15.7 and iPadOS 15.7. Processing maliciously crafted web content may lead to arbitrary code
execution. (CVE-2022-32886)
- An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big
Sur 11.7, macOS Ventura 13, iOS 16, iOS 15.7 and iPadOS 15.7, watchOS 9, macOS Monterey 12.6, tvOS 16.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2022-32888)
- The issue was addressed with improved UI handling. This issue is fixed in Safari 16, tvOS 16, watchOS 9,
iOS 16. Visiting a website that frames malicious content may lead to UI spoofing. (CVE-2022-32891)
- An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS
15.6.1 and iPadOS 15.6.1, macOS Monterey 12.5.1, Safari 15.6.1. Processing maliciously crafted web content
may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively
exploited. (CVE-2022-32893)
- An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in Safari 16, iOS
16, iOS 15.7 and iPadOS 15.7. Processing maliciously crafted web content may lead to arbitrary code
execution. (CVE-2022-32912)
- The issue was addressed with improved UI handling. This issue is fixed in iOS 16.2 and iPadOS 16.2, macOS
Ventura 13.1. Visiting a website that frames malicious content may lead to UI spoofing. (CVE-2022-32919)
- A correctness issue in the JIT was addressed with improved checks. This issue is fixed in tvOS 16.1, iOS
15.7.1 and iPadOS 15.7.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Processing
maliciously crafted web content may disclose internal states of the app. (CVE-2022-32923)
- An information disclosure issue was addressed by removing the vulnerable code. (CVE-2022-32933)
- The issue was addressed with improved UI handling. This issue is fixed in tvOS 16.1, macOS Ventura 13,
watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Visiting a malicious website may lead to user interface
spoofing. (CVE-2022-42799)
- A type confusion issue was addressed with improved memory handling. This issue is fixed in tvOS 16.1,
macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Processing maliciously crafted web
content may lead to arbitrary code execution. (CVE-2022-42823)
- A logic issue was addressed with improved state management. This issue is fixed in tvOS 16.1, macOS
Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Processing maliciously crafted web content
may disclose sensitive user information. (CVE-2022-42824)
- A use after free issue was addressed with improved memory management. This issue is fixed in macOS Ventura
13, iOS 16.1 and iPadOS 16, Safari 16.1. Processing maliciously crafted web content may lead to arbitrary
code execution. (CVE-2022-42826)
- The issue was addressed with improved memory handling. This issue is fixed in Safari 16.2, tvOS 16.2,
macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing
maliciously crafted web content may result in the disclosure of process memory. (CVE-2022-42852)
- A type confusion issue was addressed with improved state handling. This issue is fixed in Safari 16.2,
tvOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.1.2. Processing maliciously crafted
web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been
actively exploited against versions of iOS released before iOS 15.1.. (CVE-2022-42856)
- A memory corruption issue was addressed with improved state management. This issue is fixed in Safari
16.2, tvOS 16.2, macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted
web content may lead to arbitrary code execution. (CVE-2022-42863, CVE-2022-46699)
- A use after free issue was addressed with improved memory management. This issue is fixed in Safari 16.2,
tvOS 16.2, macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web
content may lead to arbitrary code execution. (CVE-2022-42867)
- A memory consumption issue was addressed with improved memory handling. This issue is fixed in Safari
16.2, tvOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2022-46691)
- A logic issue was addressed with improved state management. This issue is fixed in Safari 16.2, tvOS 16.2,
iCloud for Windows 14.1, iOS 15.7.2 and iPadOS 15.7.2, macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2,
watchOS 9.2. Processing maliciously crafted web content may bypass Same Origin Policy. (CVE-2022-46692)
- A logic issue was addressed with improved checks. This issue is fixed in Safari 16.2, tvOS 16.2, iCloud
for Windows 14.1, macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously
crafted web content may disclose sensitive user information. (CVE-2022-46698)
- A memory corruption issue was addressed with improved input validation. This issue is fixed in Safari
16.2, tvOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2022-46700)
- A spoofing issue existed in the handling of URLs. This issue was addressed with improved input validation.
This issue is fixed in iOS 16.2 and iPadOS 16.2, macOS Ventura 13.1, Safari 16.2. Visiting a malicious
website may lead to address bar spoofing. (CVE-2022-46705)
- A spoofing issue existed in the handling of URLs. This issue was addressed with improved input validation.
This issue is fixed in iOS 16.4 and iPadOS 16.4. Visiting a malicious website may lead to address bar
spoofing. (CVE-2022-46725)
- The issue was addressed with improved bounds checks. This issue is fixed in tvOS 15.6, watchOS 8.7, iOS
15.6 and iPadOS 15.6, macOS Monterey 12.5, Safari 15.6. Processing web content may lead to arbitrary code
execution. (CVE-2022-48503)
- The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.6.3, macOS
Ventura 13.2, watchOS 9.3, macOS Big Sur 11.7.3, Safari 16.3, tvOS 16.3, iOS 16.3 and iPadOS 16.3.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2023-23517,
CVE-2023-23518)
- A type confusion issue was addressed with improved checks. This issue is fixed in iOS 15.7.4 and iPadOS
15.7.4, iOS 16.3.1 and iPadOS 16.3.1, macOS Ventura 13.2.1, Safari 16.3. Processing maliciously crafted
web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been
actively exploited. (CVE-2023-23529)
- A use-after-free vulnerability in WebCore::RenderLayer::addChild in WebKitGTK before 2.36.8 allows
attackers to execute code remotely. (CVE-2023-25358)
- A use-after-free vulnerability in WebCore::RenderLayer::renderer in WebKitGTK before 2.36.8 allows
attackers to execute code remotely. (CVE-2023-25360)
- A use-after-free vulnerability in WebCore::RenderLayer::setNextSibling in WebKitGTK before 2.36.8 allows
attackers to execute code remotely. (CVE-2023-25361)
- A use-after-free vulnerability in WebCore::RenderLayer::repaintBlockSelectionGaps in WebKitGTK before
2.36.8 allows attackers to execute code remotely. (CVE-2023-25362)
- A use-after-free vulnerability in WebCore::RenderLayer::updateDescendantDependentFlags in WebKitGTK before
2.36.8 allows attackers to execute code remotely. (CVE-2023-25363)
- This issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.3, Safari
16.4, iOS 16.4 and iPadOS 16.4, tvOS 16.4, watchOS 9.4. Processing maliciously crafted web content may
bypass Same Origin Policy. (CVE-2023-27932)
- The issue was addressed by removing origin information. This issue is fixed in macOS Ventura 13.3, Safari
16.4, iOS 16.4 and iPadOS 16.4, iOS 15.7.4 and iPadOS 15.7.4, tvOS 16.4, watchOS 9.4. A website may be
able to track sensitive user information. (CVE-2023-27954)
- A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 16.4 and
iPadOS 16.4, macOS Ventura 13.3. Processing web content may lead to arbitrary code execution.
(CVE-2023-28198)
- An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 9.5,
tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5.
Processing web content may disclose sensitive information. Apple is aware of a report that this issue may
have been actively exploited. (CVE-2023-28204)
- A use after free issue was addressed with improved memory management. This issue is fixed in Safari
16.4.1, iOS 15.7.5 and iPadOS 15.7.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1. Processing
maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this
issue may have been actively exploited. (CVE-2023-28205)
- This issue was addressed with improved redaction of sensitive information. This issue is fixed in iOS
16.7.2 and iPadOS 16.7.2. A user's password may be read aloud by VoiceOver. (CVE-2023-32359)
- A logic issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.3. Content
Security Policy to block domains with wildcards may fail. (CVE-2023-32370)
- A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 9.5,
tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5.
Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a
report that this issue may have been actively exploited. (CVE-2023-32373)
- The issue was addressed with improved memory handling. This issue is fixed in watchOS 9.3, tvOS 16.3,
macOS Ventura 13.2, iOS 16.3 and iPadOS 16.3. Processing web content may lead to arbitrary code execution.
(CVE-2023-32393)
- The issue was addressed with improved bounds checks. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS
Ventura 13.4, iOS 15.7.8 and iPadOS 15.7.8, Safari 16.5, iOS 16.5 and iPadOS 16.5. A remote attacker may
be able to break out of Web Content sandbox. Apple is aware of a report that this issue may have been
actively exploited. (CVE-2023-32409)
- A memory corruption issue was addressed with improved state management. This issue is fixed in macOS
Ventura 13.3, Safari 16.4, iOS 16.4 and iPadOS 16.4, iOS 15.7.7 and iPadOS 15.7.7. Processing web content
may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively
exploited against versions of iOS released before iOS 15.7. (CVE-2023-32435)
- A type confusion issue was addressed with improved checks. This issue is fixed in iOS 16.5.1 and iPadOS
16.5.1, iOS 15.7.7 and iPadOS 15.7.7, macOS Ventura 13.4.1, Safari 16.5.1. Processing maliciously crafted
web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been
actively exploited. (CVE-2023-32439)
- The issue was addressed with improved memory handling. This issue is fixed in tvOS 17, Safari 17, watchOS
10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.
(CVE-2023-35074)
- The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, Safari
16.5.2, tvOS 16.6, macOS Ventura 13.5, watchOS 9.6. Processing web content may lead to arbitrary code
execution. Apple is aware of a report that this issue may have been actively exploited. (CVE-2023-37450)
- The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS
16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may
disclose sensitive information. (CVE-2023-38133)
- The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS
16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. A website may be able to
bypass Same Origin Policy. (CVE-2023-38572)
- A logic issue was addressed with improved restrictions. This issue is fixed in iOS 16.6 and iPadOS 16.6,
watchOS 9.6, tvOS 16.6, macOS Ventura 13.5. Processing web content may lead to arbitrary code execution.
(CVE-2023-38592)
- The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS
16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may
lead to arbitrary code execution. (CVE-2023-38594)
- The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, tvOS 16.6,
macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution.
(CVE-2023-38595, CVE-2023-38600)
- The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS
16.6 and iPadOS 16.6, macOS Ventura 13.5, Safari 16.6. Processing web content may lead to arbitrary code
execution. (CVE-2023-38597)
- A logic issue was addressed with improved state management. This issue is fixed in Safari 16.6, watchOS
9.6, iOS 15.7.8 and iPadOS 15.7.8, tvOS 16.6, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. A website may
be able to track sensitive user information. (CVE-2023-38599)
- The issue was addressed with improved memory handling. This issue is fixed in iOS 16.6 and iPadOS 16.6,
tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code
execution. (CVE-2023-38611)
- A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and
iPadOS 17, watchOS 10, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.
(CVE-2023-39434)
- A use-after-free vulnerability exists in the MediaRecorder API of Webkit WebKitGTK 2.40.5. A specially
crafted web page can abuse this vulnerability to cause memory corruption and potentially arbitrary code
execution. A user would need to to visit a malicious webpage to trigger this vulnerability.
(CVE-2023-39928)
- The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.5. A remote attacker
may be able to cause arbitrary javascript code execution. (CVE-2023-40397)
- A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 10,
iOS 17 and iPadOS 17, tvOS 17, macOS Sonoma 14, Safari 17. Processing web content may lead to arbitrary
code execution. (CVE-2023-40414)
- This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in Safari 17. An
attacker with JavaScript execution may be able to execute arbitrary code. (CVE-2023-40451)
- The issue was addressed with improved checks. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS
17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.
(CVE-2023-41074)
- The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.1, Safari
17.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1. Processing web content may lead to a denial-
of-service. (CVE-2023-41983)
- A correctness issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14, Safari 17,
iOS 17 and iPadOS 17. Processing web content may lead to arbitrary code execution. (CVE-2023-42833)
- A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS
10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may
lead to arbitrary code execution. (CVE-2023-42852)
- The issue was addressed with improved memory handling. This issue is fixed in Safari 17.2, macOS Sonoma
14.2, iOS 17.2 and iPadOS 17.2, watchOS 10.2, tvOS 17.2, iOS 16.7.3 and iPadOS 16.7.3. Processing an image
may lead to a denial-of-service. (CVE-2023-42883)
- The issue was addressed with improved memory handling. This issue is fixed in Safari 17.2, macOS Sonoma
14.2, watchOS 10.2, iOS 17.2 and iPadOS 17.2, tvOS 17.2. Processing web content may lead to arbitrary code
execution. (CVE-2023-42890)
- An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 17.1.2 and
iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may disclose sensitive
information. Apple is aware of a report that this issue may have been exploited against versions of iOS
before iOS 16.7.1. (CVE-2023-42916)
- A memory corruption vulnerability was addressed with improved locking. This issue is fixed in iOS 17.1.2
and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may lead to arbitrary code
execution. Apple is aware of a report that this issue may have been exploited against versions of iOS
before iOS 16.7.1. (CVE-2023-42917)
- An access issue was addressed with improved access restrictions. This issue is fixed in watchOS 10.3, tvOS
17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, Safari 17.3. A
maliciously crafted webpage may be able to fingerprint the user. (CVE-2024-23206)
- The issue was addressed with improved memory handling. This issue is fixed in watchOS 10.3, tvOS 17.3, iOS
17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, Safari 17.3. Processing web content
may lead to arbitrary code execution. (CVE-2024-23213)
- A type confusion issue was addressed with improved checks. This issue is fixed in iOS 17.3 and iPadOS
17.3, macOS Sonoma 14.3, tvOS 17.3. Processing maliciously crafted web content may lead to arbitrary code
execution. Apple is aware of a report that this issue may have been exploited. (CVE-2024-23222)
Note that Nessus has not tested for these issues but has instead relied on the package manager's report that the package
is installed.");
script_set_attribute(attribute:"solution", value:
"The vendor has acknowledged the vulnerabilities but no solution has been provided. Refer to the vendor for remediation
guidance.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2021-30954");
script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2023-41993");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploited_by_malware", value:"true");
script_set_attribute(attribute:"metasploit_name", value:'Safari in Operator Side Effect Exploit');
script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
script_set_attribute(attribute:"vendor_unpatched", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2017/12/01");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/05/11");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:webkitgtk");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:webkitgtk3");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:webkitgtk4");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Red Hat Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl", "redhat_repos.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
exit(0);
}
include('rpm.inc');
include('rhel.inc');
if (!get_kb_item("global_settings/vendor_unpatched"))
exit(0, "Unpatched Vulnerabilities Detection not active.");
if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item('Host/RedHat/release');
if (isnull(os_release) || 'Red Hat' >!< os_release) audit(AUDIT_OS_NOT, 'Red Hat');
var os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:os_release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');
os_ver = os_ver[1];
if (!rhel_check_release(operator: 'ge', os_version: os_ver, rhel_version: '6')) audit(AUDIT_OS_NOT, 'Red Hat 6.x', 'Red Hat ' + os_ver);
if (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu && 'ppc' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);
var constraints = [
{
'pkgs': [
{'reference':'webkitgtk', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'unpatched_pkg':'webkitgtk'}
]
}
];
var flag = 0;
foreach var constraint_array ( constraints ) {
var repo_relative_urls = NULL;
var enterprise_linux_flag = rhel_repo_urls_has_content_dist_rhel(repo_urls:repo_relative_urls);
foreach var pkg ( constraint_array['pkgs'] ) {
var unpatched_pkg = NULL;
var _release = NULL;
var sp = NULL;
var el_string = NULL;
var rpm_spec_vers_cmp = NULL;
var exists_check = NULL;
var cves = NULL;
if (!empty_or_null(pkg['unpatched_pkg'])) unpatched_pkg = pkg['unpatched_pkg'];
if (!empty_or_null(pkg['release'])) _release = 'RHEL' + pkg['release'];
if (!empty_or_null(pkg['sp'])) sp = pkg['sp'];
if (!empty_or_null(pkg['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = pkg['rpm_spec_vers_cmp'];
if (!empty_or_null(pkg['exists_check'])) exists_check = pkg['exists_check'];
if (!empty_or_null(pkg['cves'])) cves = pkg['cves'];
if (unpatched_pkg &&
_release &&
(!exists_check || rpm_exists(release:_release, rpm:exists_check)) &&
unpatched_package_exists(release:_release, package:unpatched_pkg, cves: cves)) flag++;
}
}
if (flag)
{
var extra = NULL;
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : unpatched_packages_report()
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'webkitgtk');
}
Vendor | Product | Version | CPE |
---|---|---|---|
redhat | enterprise_linux | webkitgtk3 | p-cpe:/a:redhat:enterprise_linux:webkitgtk3 |
redhat | enterprise_linux | 7 | cpe:/o:redhat:enterprise_linux:7 |
redhat | enterprise_linux | webkitgtk4 | p-cpe:/a:redhat:enterprise_linux:webkitgtk4 |
redhat | enterprise_linux | webkitgtk | p-cpe:/a:redhat:enterprise_linux:webkitgtk |
redhat | enterprise_linux | 6 | cpe:/o:redhat:enterprise_linux:6 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4761
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13856
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13866
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13870
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7156
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7157
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11712
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11713
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4121
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4200
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4204
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11070
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6237
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6251
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7285
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7292
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8503
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8506
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8515
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8518
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8523
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8524
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8535
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8536
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8544
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8551
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8558
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8559
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8563
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8571
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8583
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8584
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8586
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8587
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8594
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8595
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8596
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8597
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8601
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8607
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8608
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8609
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8610
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8611
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8615
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8619
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8622
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8623
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8625
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8710
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8720
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8726
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8735
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8743
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8764
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8766
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8768
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8769
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8771
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8782
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8783
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8808
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8811
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8812
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8813
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8814
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8815
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8816
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8819
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8820
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8823
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8835
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8844
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8846
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10018
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11793
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13558
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3862
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3864
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3865
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3867
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3868
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30762
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30887
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30890
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30897
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26710
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32792
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32816
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32891
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32893
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32912
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23529
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28204
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32373
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32409
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32439
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37450
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42883
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222