![]() ![]() This issue is fixed in macOS Ventura 13.3. The issue was addressed with improved checks. An app may be able to access user-sensitive data An app may be able to read sensitive location informationĪ privacy issue was addressed by moving sensitive data to a more secure location. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, macOS Big Sur 11.7.5. An app may be able to disclose kernel memoryĪ permissions issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, iOS 15.7.4 and iPadOS 15.7.4, macOS Big Sur 11.7.5. A remote user may be able to cause unexpected app termination or arbitrary code executionĪ validation issue was addressed with improved input sanitization. This issue is fixed in macOS Ventura 13.3, iOS 15.7.4 and iPadOS 15.7.4, Safari 16.4, iOS 16.4 and iPadOS 16.4. This issue was addressed with improved state management. ![]() Apple is aware of a report that this issue may have been actively exploited. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.Ī use after free issue was addressed with improved memory management. An app may be able to execute arbitrary code with kernel privileges. A local low-privileged user could exploit this vulnerability in an attack chain during the installation process to escalate their privileges to privileges to root.Īn out-of-bounds write issue was addressed with improved input validation. Zoom Client for IT Admin macOS installers before version 5.13.5 contain a local privilege escalation vulnerability. This affects versions 18.12.407 and 18.12.416 of the 3CX DesktopApp Electron Windows application shipped in Update 7, and versions, 18.12.402, 18.12.407, and 18.12.416 of the 3CX DesktopApp Electron macOS application. An issue in the helper tool of Mailbutler GmbH Shimo VPN Client for macOS v5.0.4 allows attackers to bypass authentication via PID re-use.ģCX DesktopApp through 18.12.416 has embedded malicious code, as exploited in the wild in March 2023.
0 Comments
Leave a Reply. |