![]() This issue was addressed with improved bounds checking.ĬVE-2021-1778: Xingwei Lin of Ant Security Light-Year LabĪvailable for: macOS Catalina 10.15.7, macOS Big Sur 11.0.1ĬVE-2021-1736: Xingwei Lin of Ant Security Light-Year LabĬVE-2021-1785: Xingwei Lin of Ant Security Light-Year LabĬVE-2021-1766: Danny Rosseau of Carve Systems Impact: Processing a maliciously crafted image may lead to a denial of serviceĬVE-2021-1773: Xingwei Lin of Ant Security Light-Year Labĭescription: An out-of-bounds read issue existed in the curl. Impact: A remote attacker may be able to leak memoryĬVE-2020-29608: Xingwei Lin of Ant Security Light-Year LabĪvailable for: macOS Big Sur 11.0.1 and macOS Catalina 10.15.7ĭescription: An access issue was addressed with improved memory management.ĬVE-2021-1783: Xingwei Lin of Ant Security Light-Year LabĬVE-2021-1741: Xingwei Lin of Ant Security Light-Year LabĬVE-2021-1743: Mickey Jin & Junzhi Lu of Trend Micro working with Trend Micro’s Zero Day Initiative, Xingwei Lin of Ant Security Light-Year Lab Impact: Processing a maliciously crafted font may lead to arbitrary code executionĬVE-2021-1790: Peter Nguyen Vu Hoang of STAR Labsĭescription: This issue was addressed by removing the vulnerable code.ĬVE-2021-1775: Mickey Jin and Qi Sun of Trend Micro working with Trend Micro’s Zero Day Initiative This was addressed with improved input validation.ĬVE-2021-1791: Junzhi Lu Qi Sun & Mickey Jin of Trend Micro working with Trend Micro’s Zero Day Initiative Impact: A malicious application may be able to disclose kernel memoryĭescription: An out-of-bounds read issue existed that led to the disclosure of kernel memory. Impact: A malicious application may be able to access private informationĬVE-2020-27937: Wojciech Reguła of SecuRingĬVE-2021-1802: Zhongcheng Li of WPS Security Response Center ![]() Impact: A local user may be able to create or modify system filesĭescription: A logic issue was addressed with improved state management.ĬVE-2021-1786: Csaba Fitzl of Offensive Security Impact: A local attacker may be able to elevate their privilegesĭescription: Multiple issues were addressed with improved logic. Impact: A remote attacker may be able to cause arbitrary code executionĭescription: An out-of-bounds read was addressed with improved bounds checking.ĬVE-2021-1792: Mickey Jin & Junzhi Lu of Trend Micro working with Trend Micro’s Zero Day Initiative Impact: Processing a maliciously crafted text file may lead to arbitrary code executionĭescription: A stack overflow was addressed with improved input validation.ĬVE-2021-1772: Mickey Jin of Trend Micro working with Trend Micro’s Zero Day Initiative ![]() Impact: Processing a maliciously crafted image may lead to arbitrary code executionĭescription: An out-of-bounds read was addressed with improved input validation.ĬVE-2021-1759: Hou JingYi of Qihoo 360 CERT Impact: Processing a maliciously crafted font file may lead to arbitrary code executionĭescription: An out-of-bounds write issue was addressed with improved bounds checking.ĬVE-2021-1776: Ivan Fratric of Google Project Zero Impact: Processing maliciously crafted web content may lead to code executionĭescription: An out-of-bounds write was addressed with improved input validation.ĬVE-2021-1747: JunDong Xie of Ant Security Light-Year LabĪvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: A malicious application could execute arbitrary code leading to compromise of user informationĭescription: A memory corruption issue was addressed with improved state management. Impact: Processing maliciously crafted web content may lead to arbitrary code executionĭescription: An integer overflow was addressed with improved input validation.ĬVE-2020-27945: Zhuo Liang of Qihoo 360 Vulcan Team Impact: A local user may be able to read arbitrary filesĭescription: The issue was addressed with improved permissions logic.Īvailable for: macOS Catalina 10.15.7 and macOS Mojave 10.14.6 Impact: A remote attacker may be able to cause a denial of serviceĭescription: This issue was addressed with improved checks. Available for: macOS Big Sur 11.0.1, macOS Catalina 10.15.7, and macOS Mojave 10.14.6
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |