Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-38592

Опубликовано: 28 июл. 2023
Источник: debian
EPSS Низкий

Описание

A logic issue was addressed with improved restrictions. This issue is fixed in iOS 16.6 and iPadOS 16.6, watchOS 9.6, tvOS 16.6, macOS Ventura 13.5. Processing web content may lead to arbitrary code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
webkit2gtkfixed2.40.5-1package
webkit2gtkend-of-lifebusterpackage
wpewebkitfixed2.40.5-1package
wpewebkitignoredbookwormpackage
wpewebkitignoredbullseyepackage

Примечания

  • https://webkitgtk.org/security/WSA-2023-0007.html

EPSS

Процентиль: 74%
0.00872
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 2 лет назад

A logic issue was addressed with improved restrictions. This issue is fixed in iOS 16.6 and iPadOS 16.6, watchOS 9.6, tvOS 16.6, macOS Ventura 13.5. Processing web content may lead to arbitrary code execution.

CVSS3: 8.8
redhat
около 2 лет назад

A logic issue was addressed with improved restrictions. This issue is fixed in iOS 16.6 and iPadOS 16.6, watchOS 9.6, tvOS 16.6, macOS Ventura 13.5. Processing web content may lead to arbitrary code execution.

CVSS3: 8.8
nvd
около 2 лет назад

A logic issue was addressed with improved restrictions. This issue is fixed in iOS 16.6 and iPadOS 16.6, watchOS 9.6, tvOS 16.6, macOS Ventura 13.5. Processing web content may lead to arbitrary code execution.

CVSS3: 8.8
github
около 2 лет назад

A logic issue was addressed with improved restrictions. This issue is fixed in iOS 16.6 and iPadOS 16.6, watchOS 9.6, tvOS 16.6, macOS Ventura 13.5. Processing web content may lead to arbitrary code execution.

CVSS3: 8.8
fstec
около 2 лет назад

Уязвимость модулей отображения веб-страниц WebKitGTK и WPE WebKit, вызванная переполнением буфера, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 74%
0.00872
Низкий