### [CVE-2023-41993](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993) ![](https://img.shields.io/static/v1?label=Product&message=macOS&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%2014%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Processing%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20actively%20exploited%20against%20versions%20of%20iOS%20before%20iOS%2016.7.&color=brighgreen) ### Description The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7. ### POC #### Reference No PoCs from references. #### Github - https://github.com/0x06060606/CVE-2023-41993 - https://github.com/Ibinou/Ty - https://github.com/IvanIVGrozny/IvanIVGrozny.github.io - https://github.com/J3Ss0u/CVE-2023-41993 - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/ZonghaoLi777/githubTrending - https://github.com/aneasystone/github-trending - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/hrtowii/cve-2023-41993-test - https://github.com/jafshare/GithubTrending - https://github.com/johe123qwe/github-trending - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/po6ix/POC-for-CVE-2023-41993 - https://github.com/sampsonv/github-trending