cve/2023/CVE-2023-41993.md

34 lines
1.7 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-41993](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993)
![](https://img.shields.io/static/v1?label=Product&message=macOS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2014%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Processing%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20actively%20exploited%20against%20versions%20of%20iOS%20before%20iOS%2016.7.&color=brighgreen)
### Description
The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0x06060606/CVE-2023-41993
- https://github.com/Ibinou/Ty
- https://github.com/IvanIVGrozny/IvanIVGrozny.github.io
- https://github.com/J3Ss0u/CVE-2023-41993
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
2024-08-05 18:41:32 +00:00
- https://github.com/RENANZG/My-Debian-GNU-Linux
2024-06-08 09:32:58 +00:00
- https://github.com/RENANZG/My-Forensics
2024-05-25 21:48:12 +02:00
- https://github.com/ZonghaoLi777/githubTrending
- https://github.com/aneasystone/github-trending
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/hrtowii/cve-2023-41993-test
- https://github.com/jafshare/GithubTrending
- https://github.com/johe123qwe/github-trending
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/po6ix/POC-for-CVE-2023-41993
- https://github.com/sampsonv/github-trending