![]() Impact: Processing web content may lead to arbitrary code executionĬVE-2023-32393: Francisco Alonso added June 28, 2023 Impact: An app may be able to access information about a user’s contactsĭescription: A privacy issue was addressed with improved private data redaction for log entries.ĬVE-2023-23505: Wojciech Reguła of SecuRing (wojciechregula.blog) and Csaba Fitzl of Offensive Securityĭescription: A use after free issue was addressed with improved memory management.ĬVE-2023-23511: Wojciech Regula of SecuRing (wojciechregula.blog), an anonymous researcher Impact: Visiting a website may lead to an app denial-of-serviceĭescription: The issue was addressed with improved handling of caches. Impact: An app may be able to access a user’s Safari historyĬVE-2023-23510: Guilherme Rambo of Best Buddy Apps (des) Impact: An app may be able to gain root privilegesĬVE-2023-23497: Mickey Jin for: macOS Ventura Impact: An app may be able to bypass Privacy preferences Impact: The quoted original message may be selected from the wrong email when forwarding an email from an Exchange account for: macOS Venturaĭescription: A permissions issue was addressed with improved validation.ĬVE-2023-23506: Guilherme Rambo of Best Buddy Apps (des) ![]() Impact: An app may be able to determine kernel memory layoutĭescription: An information disclosure issue was addressed by removing the vulnerable code.ĬVE-2023-23502: Pan ZhenPeng of STAR Labs SG Pte. Impact: An app may be able to leak sensitive kernel stateĬVE-2023-23500: Pan ZhenPeng of STAR Labs SG Pte. Impact: An app may be able to execute arbitrary code with kernel privilegesĭescription: The issue was addressed with improved bounds checks.ĬVE-2023-23516: Jordy Zomer added May 1, 2023 Impact: Processing an image may lead to a denial-of-serviceĭescription: A memory corruption issue was addressed with improved state management.ĬVE-2023-23519: Meysam Firouzi of Mbition mercedes-benz innovation lab and Yiğit Can YILMAZ updated May 1, 2023 Impact: An app may be able to execute arbitrary code out of its sandbox or with certain elevated privilegesĭescription: The issue was addressed with improved memory handling.ĬVE-2023-23530: Austin Emmitt Senior Security Researcher at Trellix Advanced Research CenterĮntry added February 20, 2023, updated May 1, 2023ĬVE-2023-23531: Austin Emmitt Senior Security Researcher at Trellix Advanced Research Center Impact: An encrypted volume may be unmounted and remounted by a different user without prompting for the passwordĭescription: A logic issue was addressed with improved state management.ĬVE-2023-23493: Oliver Norpoth of KLIXX GmbH () ![]() ![]() Impact: Mounting a maliciously crafted Samba network share may lead to arbitrary code executionĭescription: A buffer overflow issue was addressed with improved memory handling.ĬVE-2023-23539: Aleksandar Nikolic and Dimitrios Tatsis of Cisco TalosĬVE-2023-23513: Dimitrios Tatsis and Aleksandar Nikolic of Cisco Talos Impact: A user may be able to read arbitrary files as rootĭescription: A race condition was addressed with additional validation.ĭescription: Multiple issues were addressed by updating to curl version 7.86.0. Impact: An app may be able to access user-sensitive dataĭescription: This issue was addressed by enabling hardened runtime.ĬVE-2023-23499: Wojciech Reguła of SecuRing (wojciechregula.blog)
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |