![]() This was addressed with improved input validation.ĬVE-2018-4253: shrek_wzw of Qihoo 360 Nirvan Teamĭescription: An out-of-bounds read was addressed with improved input validation.ĬVE-2018-4256: shrek_wzw of Qihoo 360 Nirvan TeamĬVE-2018-4255: shrek_wzw of Qihoo 360 Nirvan TeamĮntry added October 18, 2018, updated December 14, 2018 ![]() Impact: A local user may be able to read kernel memoryĭescription: An out-of-bounds read issue existed that led to the disclosure of kernel memory. This issue was addressed with improved memory management.ĬVE-2018-4196: Alex Plaskett, Georgi Geshev and Fabian Beterke of MWR Labs working with Trend Micro’s Zero Day Initiative, and WanderingGlitch of Trend Micro Zero Day Initiative Impact: A malicious application may be able to execute arbitrary code with system privilegesĭescription: An information disclosure issue existed in Accessibility Framework.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |