{"id":"CVE-2023-41993","details":"The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.","modified":"2026-03-15T22:47:21.626702Z","published":"2023-09-21T19:15:11.660Z","related":["CGA-rgx5-68vx-c6pv","MGASA-2024-0148","SUSE-SU-2023:4209-1","SUSE-SU-2023:4211-1","SUSE-SU-2023:4294-1","SUSE-SU-2023:4339-1"],"references":[{"type":"WEB","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-41993"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202401-33"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20240426-0004/"},{"type":"ADVISORY","url":"https://support.apple.com/en-us/HT213940"},{"type":"ADVISORY","url":"https://support.apple.com/kb/HT213926"},{"type":"ADVISORY","url":"https://support.apple.com/kb/HT213930"},{"type":"ADVISORY","url":"https://webkitgtk.org/security/WSA-2023-0009.html"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"17.0.1"}]},{"events":[{"introduced":"0"},{"fixed":"17.0.1"}]},{"events":[{"introduced":"0"},{"fixed":"14.0"}]},{"events":[{"introduced":"0"},{"last_affected":"37"}]},{"events":[{"introduced":"0"},{"last_affected":"38"}]},{"events":[{"introduced":"0"},{"last_affected":"39"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0"}]},{"events":[{"introduced":"0"},{"last_affected":"20.3.13"}]},{"events":[{"introduced":"0"},{"last_affected":"21.3.9"}]},{"events":[{"introduced":"0"},{"last_affected":"1.8.0-update401"}]},{"events":[{"introduced":"0"},{"last_affected":"1.8.0-update401"}]},{"events":[{"introduced":"0"},{"fixed":"2.42.2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-41993.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}