Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-38592

Опубликовано: 28 июл. 2023
Источник: debian
EPSS Низкий

Описание

A logic issue was addressed with improved restrictions. This issue is fixed in iOS 16.6 and iPadOS 16.6, watchOS 9.6, tvOS 16.6, macOS Ventura 13.5. Processing web content may lead to arbitrary code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
webkit2gtkfixed2.40.5-1package
webkit2gtkend-of-lifebusterpackage
wpewebkitfixed2.40.5-1package
wpewebkitignoredbookwormpackage
wpewebkitignoredbullseyepackage

Примечания

  • https://webkitgtk.org/security/WSA-2023-0007.html

EPSS

Процентиль: 72%
0.00727
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 2 лет назад

A logic issue was addressed with improved restrictions. This issue is fixed in iOS 16.6 and iPadOS 16.6, watchOS 9.6, tvOS 16.6, macOS Ventura 13.5. Processing web content may lead to arbitrary code execution.

CVSS3: 8.8
redhat
больше 2 лет назад

A logic issue was addressed with improved restrictions. This issue is fixed in iOS 16.6 and iPadOS 16.6, watchOS 9.6, tvOS 16.6, macOS Ventura 13.5. Processing web content may lead to arbitrary code execution.

CVSS3: 8.8
nvd
больше 2 лет назад

A logic issue was addressed with improved restrictions. This issue is fixed in iOS 16.6 and iPadOS 16.6, watchOS 9.6, tvOS 16.6, macOS Ventura 13.5. Processing web content may lead to arbitrary code execution.

CVSS3: 8.8
github
больше 2 лет назад

A logic issue was addressed with improved restrictions. This issue is fixed in iOS 16.6 and iPadOS 16.6, watchOS 9.6, tvOS 16.6, macOS Ventura 13.5. Processing web content may lead to arbitrary code execution.

CVSS3: 8.8
fstec
больше 2 лет назад

Уязвимость модулей отображения веб-страниц WebKitGTK и WPE WebKit, вызванная переполнением буфера, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 72%
0.00727
Низкий