![]() ![]() Impact: A malicious application may be able to access data about the accounts the user is using Family Sharing withĭescription: A permissions issue was addressed with improved validation.ĬVE-2021-30817: Csaba Fitzl of Offensive SecurityĮntry added December 22, 2022, updated May 2, 2023ĭescription: An integer overflow was addressed through improved input validation.ĬVE-2021-30760: Sunglin of Knownsec 404 team Impact: Processing a maliciously crafted font file may lead to arbitrary code executionĭescription: An out-of-bounds read was addressed with improved input validation.ĬVE-2021-30789: Mickey Jin of Trend Micro, Sunglin of Knownsec 404 teamĬVE-2021-30774: Yizhuo Wang of Group of Software Security In Progress (G.O.S.S.I.P) at Shanghai Jiao Tong Universityĭescription: An out-of-bounds write issue was addressed with improved bounds checking.ĬVE-2021-30780: Tim of Zoom Video CommunicationsĬVE-2021-30768: Linus Henze () Impact: A sandboxed process may be able to circumvent sandbox restrictionsĭescription: An access issue was addressed with improved access restrictions.ĬVE-2021-30783: Ron Waisberg for: macOS Big Surĭescription: An injection issue was addressed with improved validation.ĬVE-2021-30777: Tim of Zoom Video Communications and Gary Nield of ECSC Group plc Impact: A malicious application may be able to gain root privileges Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code executionĭescription: A race condition was addressed with improved state handling. Impact: Playing a malicious audio file may lead to an unexpected application terminationĭescription: A logic issue was addressed with improved validation.ĬVE-2021-30776: JunDong Xie of Ant Security Light-Year Lab ![]() Impact: Processing a maliciously crafted audio file may lead to arbitrary code executionĬVE-2021-30775: JunDong Xie of Ant Security Light-Year Lab ![]() Impact: An application may be able to execute arbitrary code with kernel privilegesĭescription: A memory corruption issue was addressed with improved state management. ![]() Impact: A local attacker may be able to cause unexpected application termination or arbitrary code executionĭescription: This issue was addressed with improved checks. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |