AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Impact: A local user may be able to discover websites a user has visitedĭescription: A consistency issue existed in the handling of application snapshots. Impact: An application may be able to execute arbitrary code with kernel privilegesĭescription: A memory corruption issue was addressed with improved memory handling.ĬVE-2018-4337: Ian Beer of Google Project ZeroĬVE-2018-4340: Mohamed Ghannam The UK's National Cyber Security Centre (NCSC)ĬVE-2018-4425: cc working with Trend Micro's Zero Day Initiative, Juwei Lin of Trend Micro working with Trend Micro's Zero Day Initiative This issue was addressed with improved input validation.ĬVE-2018-4363: Ian Beer of Google Project Zero Impact: An application may be able to read restricted memoryĭescription: An input validation issue existed in the kernel. Impact: An attacker in a privileged network position may be able to spoof password prompts in the iTunes Storeĭescription: An input validation issue was addressed with improved input validation. Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation
0 Comments
Read More
Leave a Reply. |