[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-DEBIAN-CVE-2023-28205":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-07T21:11:43.830Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":16,"duplicates":23,"related":24,"reserved_at":9,"published_at":25,"modified_at":26,"state":9,"summary":27,"references_raw":29,"kevs":36,"epss":9,"epss_history":37,"metrics":38,"affected":45},"DEBIAN-CVE-2023-28205","A use after free issue was addressed with improved memory management. This issue is fixed in Safari 16.4.1, iOS 15.7.5 and iPadOS 15.7.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.",null,[],[],[],[14],{"_key":15},"CVE-2023-28205",[17,19,21],{"_key":18},"DLA-3419-1",{"_key":20},"DSA-5396-1",{"_key":22},"DSA-5397-1",[],[],"2023-04-10T19:15:07.237Z","2025-11-20T10:16:34.984976Z",{"cisa_kev":28,"cisa_ransomware":28,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[30],{"url":31,"sources":32,"tags":34},"https://security-tracker.debian.org/tracker/CVE-2023-28205",[33],"osv_debian",[35],"Advisory",[],[],[39],{"source":33,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":40,"cvss_v4_0":9},{"baseScore":41,"baseSeverity":9,"vectorString":42,"impactScore":43,"exploitabilityScore":44},8.8,"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",9.8,7.2,[46,63],{"ecosystem":47,"name":48,"vendor":49,"product":48,"cpe_part":9,"purl_type":50,"purl_namespace":49,"purl_name":48,"source":9,"versions":51},"Debian","webkit2gtk","debian","deb",[52,58,61,62],{"version":53,"is_range":54,"range_type":55,"version_start":9,"version_start_type":9,"version_end":56,"version_end_type":57,"fixed_in":9},"lt2_40_1_1~deb11u1",true,"ecosystem","2.40.1-1~deb11u1","excluding",{"version":59,"is_range":54,"range_type":55,"version_start":9,"version_start_type":9,"version_end":60,"version_end_type":57,"fixed_in":9},"lt2_40_1_1","2.40.1-1",{"version":59,"is_range":54,"range_type":55,"version_start":9,"version_start_type":9,"version_end":60,"version_end_type":57,"fixed_in":9},{"version":59,"is_range":54,"range_type":55,"version_start":9,"version_start_type":9,"version_end":60,"version_end_type":57,"fixed_in":9},{"ecosystem":47,"name":64,"vendor":49,"product":64,"cpe_part":9,"purl_type":50,"purl_namespace":49,"purl_name":64,"source":9,"versions":65},"wpewebkit",[66,69,72,73],{"version":67,"is_range":54,"range_type":55,"version_start":9,"version_start_type":9,"version_end":68,"version_end_type":57,"fixed_in":9},"lt2_38_6_1~deb11u1","2.38.6-1~deb11u1",{"version":70,"is_range":54,"range_type":55,"version_start":9,"version_start_type":9,"version_end":71,"version_end_type":57,"fixed_in":9},"lt2_38_6_1","2.38.6-1",{"version":70,"is_range":54,"range_type":55,"version_start":9,"version_start_type":9,"version_end":71,"version_end_type":57,"fixed_in":9},{"version":70,"is_range":54,"range_type":55,"version_start":9,"version_start_type":9,"version_end":71,"version_end_type":57,"fixed_in":9}]