Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apple | iOS and iPadOS | unspecified ~ 15.7 | - | |
| Apple | Safari | unspecified ~ 16.4 | - | |
| Apple | macOS | unspecified ~ 13.3 | - | |
| Apple | iOS and iPadOS | unspecified ~ 16.4 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | PoC CVE-2023-28205: Apple WebKit Use-After-Free Vulnerability | https://github.com/ntfargo/uaf-2023-28205 | POC Details |
| 2 | PoC CVE-2023-28205: Apple WebKit Use-After-Free Vulnerability | https://github.com/seregonwar/uaf-2023-28205 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-32871 | Apple iOS 安全漏洞 | |
| CVE-2022-42858 | Apple macOS Ventura 缓冲区错误漏洞 | |
| CVE-2022-46703 | Apple iOS 和 iPadOS 安全漏洞 | |
| CVE-2022-46709 | Apple iOS 缓冲区错误漏洞 | |
| CVE-2022-46716 | Apple macOS Ventura 安全漏洞 | |
| CVE-2022-46717 | Apple iOS 和 iPadOS 安全漏洞 | |
| CVE-2023-28206 | Apple macOS Ventura 缓冲区错误漏洞 |
No comments yet