- Description
- A buffer overflow issue was addressed with improved memory handling. This issue is fixed in Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2. Processing maliciously crafted web content may lead to an unexpected process crash.
- Source
- product-security@apple.com
- NVD status
- Modified
- Products
- safari, ipados, iphone_os, macos, visionos
CVSS 3.1
- Type
- Secondary
- Base score
- 4.3
- Impact score
- 1.4
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
- Severity
- MEDIUM
- Hype score
- Not currently trending
New deep-dive analysis for the #Mageia community. The MGASA-2025-0331 advisory patches critical memory safety bugs in webkit2 (CVE-2025-43501, etc.). Read more: 👉 https://t.co/zmxo7a5TCR #Security https://t.co/UexzDfNUut
@Cezar_H_Linux
21 Dec 2025
56 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[ZDI-25-1126|CVE-2025-43501] Apple Safari JavaScriptCore HashTable Expansion Integer Overflow Remote Code Execution Vulnerability (CVSS 8.8; Credit: Hossein Lotfi (@hosselot) of Trend Zero Day Initiative) https://t.co/MT7wp0QAHI
@TheZDIBugs
17 Dec 2025
577 Impressions
2 Retweets
4 Likes
2 Bookmarks
0 Replies
0 Quotes
Two more vulnerabilities fixed in macOS Tahoe 26.2: https://t.co/G5r8QBLAJD WebKit: CVE-2025-43541 [301257]: RCE CVE-2025-43501 [301371]: RCE
@hosselot
15 Dec 2025
4365 Impressions
5 Retweets
37 Likes
11 Bookmarks
1 Reply
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3ECBF838-536C-47F9-9876-C526B8ED32EC",
"versionEndExcluding": "26.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6547722A-1226-4E23-B3AE-8692B07C2657",
"versionEndExcluding": "18.7.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8B71D919-1AA2-4F17-A834-4B703E36F7E2",
"versionEndExcluding": "26.2",
"versionStartIncluding": "26.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8928A377-93BD-49AD-B4FE-5B2328EBDB70",
"versionEndExcluding": "18.7.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "10FD01C3-D77F-4FE4-8195-F2C59FB1321C",
"versionEndExcluding": "26.2",
"versionStartIncluding": "26.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FBA92B6D-E36C-432B-A041-94D81427CD75",
"versionEndExcluding": "26.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB10D901-4800-4DF9-AB35-48017C178161",
"versionEndExcluding": "26.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]