![]() Impact: Processing an image may lead to a denial-of-serviceĭescription: A memory corruption issue was addressed with improved state management.ĬVE-2023-23519: Meysam Firouzi of Mbition mercedes-benz innovation lab and Yiğit Can YILMAZ updated May 1, 2023 ![]() Impact: An app may be able to execute arbitrary code out of its sandbox or with certain elevated privilegesĭescription: The issue was addressed with improved memory handling.ĬVE-2023-23530: Austin Emmitt Senior Security Researcher at Trellix Advanced Research CenterĮntry added February 20, 2023, updated May 1, 2023ĬVE-2023-23531: Austin Emmitt Senior Security Researcher at Trellix Advanced Research Center Impact: An encrypted volume may be unmounted and remounted by a different user without prompting for the passwordĭescription: A logic issue was addressed with improved state management.ĬVE-2023-23493: Oliver Norpoth of KLIXX GmbH () Impact: Mounting a maliciously crafted Samba network share may lead to arbitrary code executionĭescription: A buffer overflow issue was addressed with improved memory handling.ĬVE-2023-23539: Aleksandar Nikolic and Dimitrios Tatsis of Cisco TalosĬVE-2023-23513: Dimitrios Tatsis and Aleksandar Nikolic of Cisco Talos ![]() ![]() Impact: A user may be able to read arbitrary files as rootĭescription: A race condition was addressed with additional validation.ĭescription: Multiple issues were addressed by updating to curl version 7.86.0. Impact: An app may be able to access user-sensitive dataĭescription: This issue was addressed by enabling hardened runtime.ĬVE-2023-23499: Wojciech Reguła of SecuRing (wojciechregula.blog) ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |