This issue was addressed with improved path sanitization.ĬVE-2020-10003: Tim Michaud of Leviathan Impact: A local attacker may be able to elevate their privilegesĭescription: An issue existed within the path validation logic for symlinks. Impact: Processing a maliciously crafted image may lead to arbitrary code executionĬVE-2020-9883: an anonymous researcher, Mickey Jin of Trend Micro of ZecOps Mobile XDR, an anonymous researcher Impact: Processing a maliciously crafted PDF may lead to arbitrary code executionĬVE-2020-9897: S.Y. Impact: An application may be able to execute arbitrary code with kernel privilegesĭescription: A use after free issue was addressed with improved memory management. Impact: Processing maliciously crafted web content may lead to arbitrary code executionĭescription: An integer overflow was addressed with improved input validation.ĬVE-2020-27945: Zhuo Liang of Qihoo 360 Vulcan TeamĬVE-2020-27908: JunDong Xie and Xingwei Lin of Ant Security Light-Year LabĬVE-2020-27909: Anonymous working with Trend Micro Zero Day Initiative, JunDong Xie and Xingwei Lin of Ant Security Light-Year LabĬVE-2020-9960: JunDong Xie and Xingwei Lin of Ant Security Light-Year LabĬVE-2020-10017: Francis working with Trend Micro Zero Day Initiative, JunDong Xie of Ant Security Light-Year Lab Impact: A remote attacker may be able to cause unexpected application termination or heap corruptionĭescription: Multiple integer overflows were addressed with improved input validation.ĬVE-2020-27906: Zuozhi Fan of Ant Group Tianqiong Security Lab Impact: An application may be able to read restricted memoryĬVE-2020-9944: JunDong Xie of Ant Group Light-Year Security Lab Impact: A malicious application may be able to read restricted memoryĭescription: An out-of-bounds read was addressed with improved bounds checking.ĬVE-2020-9943: JunDong Xie of Ant Group Light-Year Security Lab Impact: Processing a maliciously crafted audio file may lead to arbitrary code executionĭescription: An out-of-bounds read was addressed with improved input validation.ĬVE-2020-27910: JunDong Xie and XingWei Lin of Ant Security Light-Year Labĭescription: An out-of-bounds write was addressed with improved input validation.ĬVE-2020-27916: JunDong Xie of Ant Security Light-Year Lab Impact: An application may be able to gain elevated privilegesĭescription: This issue was addressed by removing the vulnerable code.ĬVE-2020-27903: Zhipeng Huo of Tencent Security Xuanwu Lab Impact: A malicious application may be able to execute arbitrary code with system privilegesĭescription: A memory corruption issue was addressed with improved input validation.ĬVE-2020-27914: Yu Wang of Didi Research AmericaĬVE-2020-27915: Yu Wang of Didi Research America Available for: Mac Pro (2013 and later), MacBook Air (2013 and later), MacBook Pro (Late 2013 and later), Mac mini (2014 and later), iMac (2014 and later), MacBook (2015 and later), iMac Pro (all models)
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |