![]() Impact: A remote attacker may be able to cause unexpected app termination or arbitrary code execution.Description: A use-after-free issue was addressed with improved memory management.Description: A type confusion issue was addressed with improved checks.Impact: An app may be able to execute arbitrary code with kernel privileges.CVE-2023-32384: Meysam Firouzi working with Trend Micro Zero Day Initiative.Description: A buffer overflow was addressed with improved bounds checking.Impact: Processing an image may lead to arbitrary code execution.Available for: iPhone 8 and later, iPad Pro (all models), iPad Air 3rd generation and later, iPad 5th generation and later, and iPad mini 5th generation and later.CVE-2023-32419: Amat Cama of Vigilant Labs.Description: The issue was addressed with improved bounds checks.Impact: A remote attacker may be able to cause arbitrary code execution.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |