Vulnerabilities > Apple > Ipados > 16.7.9
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-05-07 | CVE-2024-4558 | Use After Free vulnerability in multiple products Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 9.6 |
2024-04-24 | CVE-2024-23228 | Unspecified vulnerability in Apple Ipados This issue was addressed through improved state management. | 3.3 |
2024-04-24 | CVE-2024-23271 | Unspecified vulnerability in Apple products A logic issue was addressed with improved checks. | 6.5 |
2024-03-08 | CVE-2024-23201 | Incorrect Default Permissions vulnerability in Apple products A permissions issue was addressed with additional restrictions. | 5.5 |
2024-03-08 | CVE-2024-23287 | Unspecified vulnerability in Apple products A privacy issue was addressed with improved handling of temporary files. | 5.5 |
2024-03-08 | CVE-2024-23288 | Unspecified vulnerability in Apple products This issue was addressed by removing the vulnerable code. | 7.8 |
2024-03-08 | CVE-2024-23290 | Unspecified vulnerability in Apple products A logic issue was addressed with improved restrictions. | 5.5 |
2024-03-08 | CVE-2024-23291 | Unspecified vulnerability in Apple products A privacy issue was addressed with improved private data redaction for log entries. | 3.3 |
2024-03-08 | CVE-2024-23292 | Unspecified vulnerability in Apple Iphone OS This issue was addressed with improved data protection. | 3.3 |
2023-12-08 | CVE-2023-45866 | Improper Authentication vulnerability in multiple products Bluetooth HID Hosts in BlueZ may permit an unauthenticated Peripheral role HID Device to initiate and establish an encrypted connection, and accept HID keyboard reports, potentially permitting injection of HID messages when no user interaction has occurred in the Central role to authorize such access. | 6.3 |