![]() ![]() Impact: Processing maliciously crafted web content may lead to arbitrary code executionĭescription: Multiple memory corruption issues were addressed through improved memory handling.ĬVE-2017-2354: Neymar of Tencent's Xuanwu Lab () working with Trend Micro's Zero Day InitiativeĬVE-2017-2362: Ivan Fratric of Google Project ZeroĬVE-2017-2373: Ivan Fratric of Google Project Zeroĭescription: A memory initialization issue was addressed through improved memory handling.ĬVE-2017-2355: Team Pangu and lokihardt at PwnFest 2016ĭescription: Multiple memory corruption issues were addressed through improved input validation.ĬVE-2017-2356: Team Pangu and lokihardt at PwnFest 2016ĬVE-2017-2369: Ivan Fratric of Google Project ZeroĬVE-2017-2366: Kai Kang of Tencent's Xuanwu Lab ()ĭescription: A validation issue existed in the handling of page loading. Impact: Processing maliciously crafted web content may exfiltrate data cross-originĭescription: A prototype access issue was addressed through improved exception handling.ĬVE-2017-2350: Gareth Heyes of Portswigger Web Security Impact: Apple Watch may unlock when off the user’s wristĭescription: A logic issue was addressed through improved state management.ĬVE-2017-2352: Ashley Fernandez of raptAware Pty Ltd Impact: Unpacking a maliciously crafted archive may lead to arbitrary code executionĬVE-2016-8687: Agostino Sarubbo of Gentoo Impact: An application may be able to execute arbitrary code with kernel privilegesĭescription: A buffer overflow issue was addressed through improved memory handling.ĬVE-2017-2370: Ian Beer of Google Project Zeroĭescription: A use after free issue was addressed through improved memory management.ĬVE-2017-2360: Ian Beer of Google Project Zero This issue was addressed through improved input validation.ĬVE-2017-2368: Vincent Desmurs (vincedes3) Impact: Processing a maliciously crafted contact card may lead to unexpected application terminationĭescription: An input validation issue existed in the parsing of contact cards. This issue was addressed through improved logic. ![]() Impact: Updates for CallKit call history are sent to iCloudĭescription: An issue existed in preventing the uploading of CallKit call history to iCloud. This issue was addressed through improved certificate handling.ĬVE-2017-2383: Matthias Wachs and Quirin Scheitle of Technical University Munich (TUM) Impact: An attacker in a privileged network position can track a user's activityĭescription: A client certificate was sent in plaintext. Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |