Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code executionĭescription: An integer overflow issue was addressed with improved input validation.ĬVE-2022-26711: actae0n of Blacksun Hackers Club working with Trend Micro Zero Day Initiativeĭescription: A race condition was addressed with improved locking.ĬVE-2022-26701: chenyuwang of Tencent Security Xuanwu Lab Impact: An app with root privileges may be able to access private informationĭescription: This issue was addressed by enabling hardened runtime.ĬVE-2022-32781: Wojciech Reguła of SecuRingĭescription: A memory corruption issue was addressed with improved state management. Impact: A malicious application may be able to execute arbitrary code with system privilegesĭescription: An out-of-bounds access issue was addressed with improved bounds checking.ĬVE-2022-26763: Linus Henze of Pinauten GmbH () Impact: Processing a maliciously crafted image may lead to arbitrary code executionĭescription: A memory corruption issue was addressed with improved input validation.ĬVE-2022-26751: Michael DePlante of Trend Micro Zero Day Initiativeĭescription: An out-of-bounds write issue was addressed with improved bounds checking. Impact: An application may be able to execute arbitrary code with kernel privilegesĭescription: A use after free issue was addressed with improved memory management.ĬVE-2022-26702: an anonymous researcher, Antonio Zekic and John Aakerblom updated March 16, 2023 Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation)
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |