Vulnerabilities > Apple > Ipados > 16.7.9

DATE CVE VULNERABILITY TITLE RISK
2024-05-07 CVE-2024-4558 Use After Free vulnerability in multiple products
Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
network
low complexity
google fedoraproject apple CWE-416
critical
9.6
2024-04-24 CVE-2024-23228 Unspecified vulnerability in Apple Ipados
This issue was addressed through improved state management.
local
low complexity
apple
3.3
2024-04-24 CVE-2024-23271 Unspecified vulnerability in Apple products
A logic issue was addressed with improved checks.
network
low complexity
apple
6.5
2024-03-08 CVE-2024-23201 Incorrect Default Permissions vulnerability in Apple products
A permissions issue was addressed with additional restrictions.
local
low complexity
apple CWE-276
5.5
2024-03-08 CVE-2024-23287 Unspecified vulnerability in Apple products
A privacy issue was addressed with improved handling of temporary files.
local
low complexity
apple
5.5
2024-03-08 CVE-2024-23288 Unspecified vulnerability in Apple products
This issue was addressed by removing the vulnerable code.
local
low complexity
apple
7.8
2024-03-08 CVE-2024-23290 Unspecified vulnerability in Apple products
A logic issue was addressed with improved restrictions.
local
low complexity
apple
5.5
2024-03-08 CVE-2024-23291 Unspecified vulnerability in Apple products
A privacy issue was addressed with improved private data redaction for log entries.
local
low complexity
apple
3.3
2024-03-08 CVE-2024-23292 Unspecified vulnerability in Apple Iphone OS
This issue was addressed with improved data protection.
local
low complexity
apple
3.3
2023-12-08 CVE-2023-45866 Improper Authentication vulnerability in multiple products
Bluetooth HID Hosts in BlueZ may permit an unauthenticated Peripheral role HID Device to initiate and establish an encrypted connection, and accept HID keyboard reports, potentially permitting injection of HID messages when no user interaction has occurred in the Central role to authorize such access.
6.3