![]() Impact: A maliciously crafted ZIP archive may bypass Gatekeeper checksĬVE-2022-22616: Ferdous Saljooki and Jaron Bradley of Jamf Software, Mickey Jin for: macOS Monterey Impact: Processing a maliciously crafted file may lead to arbitrary code executionĭescription: A memory corruption issue was addressed with improved validation.ĬVE-2022-22597: Qi Sun and Robert Ai of Trend Micro Impact: An application may be able to read restricted memoryĭescription: This issue was addressed with improved checks.ĬVE-2022-22648: Mickey Jin of Trend Microĭescription: An out-of-bounds read was addressed with improved bounds checking.ĬVE-2022-22626: Mickey Jin of Trend MicroĬVE-2022-22627: Qi Sun and Robert Ai of Trend Micro Impact: Processing a maliciously crafted AppleScript binary may result in unexpected application termination or disclosure of process memoryĭescription: An out-of-bounds read was addressed with improved input validation.ĬVE-2022-22625: Mickey Jin of Trend Micro Impact: An application may be able to gain elevated privilegesĭescription: An out-of-bounds write issue was addressed with improved bounds checking. Impact: A remote attacker may cause an unexpected app termination or arbitrary code executionĬVE-2022-22630: Jeremy Brown working with Trend Micro Zero Day Initiative Impact: A malicious application may be able to gain root privilegesĭescription: A logic issue was addressed with improved validation. Impact: An application may be able to execute arbitrary code with kernel privilegesĭescription: A use after free issue was addressed with improved memory management. Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code executionĭescription: A memory corruption issue was addressed with improved state management.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |