Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-32373


A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.


Published

2023-06-23T18:15:12.007

Last Modified

2025-10-23T18:48:21.113

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 8.8 (HIGH)

Weaknesses
  • Type: Primary
    CWE-416
  • Type: Secondary
    CWE-416

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application apple safari < 16.5 Yes
Operating System apple ipados < 15.7.6 Yes
Operating System apple ipados < 16.5 Yes
Operating System apple iphone_os < 15.7.6 Yes
Operating System apple iphone_os < 16.5 Yes
Operating System apple macos < 13.4 Yes
Operating System apple tvos < 16.5 Yes
Operating System apple watchos < 9.5 Yes
Operating System redhat enterprise_linux 6.0 Yes
Operating System redhat enterprise_linux 7.0 Yes
Operating System redhat enterprise_linux 8.0 Yes
Operating System redhat enterprise_linux 9.0 Yes
Application webkitgtk webkitgtk\+ < 2.42.3 Yes

References