![]() ![]() Impact: A remote attacker may be able to cause a denial of serviceĭescription: This issue was addressed by updating expat to version 2.4.1. Impact: A malicious application may be able to execute arbitrary code with kernel privilegesĭescription: A race condition was addressed with improved locking.ĬVE-2021-30857: Manish Bhatt of Red Team X Zweig of Kunlun LabĮntry added September 20, 2021, updated May 25, 2022ĭescription: A type confusion issue was addressed with improved state handling. Impact: Processing maliciously crafted web content may lead to arbitrary code executionĭescription: A type confusion issue was addressed with improved memory handling.ĬVE-2021-30852: Yinyi Wu of Ant Security Light-Year Lab Impact: Processing a maliciously crafted dfont file may lead to arbitrary code executionĭescription: This issue was addressed with improved checks.ĬVE-2021-30841: Xingwei Lin of Ant Security Light-Year LabĬVE-2021-30843: Xingwei Lin of Ant Security Light-Year LabĬVE-2021-30842: Xingwei Lin of Ant Security Light-Year Lab Impact: A sandboxed process may be able to circumvent sandbox restrictions. Apple was aware of a report that this issue may have been actively exploited at the time of release.ĭescription: A deserialization issue was addressed through improved validation.ĬVE-2021-31010: Citizen Lab and Google Project Zero ![]() ![]() Impact: A sandboxed process may be able to circumvent sandbox restrictionsĬVE-2021-30864: Ron Hass of Perception Point, Ron Waisberg added May 25, 2022 Apple is aware of a report that this issue may have been actively exploited.ĭescription: An integer overflow was addressed with improved input validation.Īvailable for: Available for devices with Apple Neural Engine: iPhone 8 and later, iPad Pro (3rd generation) and later, iPad Air (3rd generation) and later, and iPad mini (5th generation) Impact: Processing a maliciously crafted PDF may lead to arbitrary code execution. Impact: Processing a maliciously crafted image may lead to arbitrary code executionĭescription: A memory corruption issue was addressed with improved input validation.ĬVE-2021-30928: Mickey Jin of Trend Micro Impact: Processing a malicious audio file may result in unexpected application termination or arbitrary code executionĬVE-2021-30834: JunDong Xie of Ant Security Light-Year Lab Impact: Processing a maliciously crafted file may disclose user informationĭescription: An out-of-bounds read was addressed with improved bounds checking.ĬVE-2021-30905: Mickey Jin of Trend Micro Impact: A remote attacker may be able to cause arbitrary code executionĭescription: A logic issue was addressed with improved state management.ĬVE-2021-30820: Jianjun Dai of Qihoo 360 Alpha Lab Impact: A malicious application may be able to execute arbitrary code with system privilegesĭescription: A memory corruption issue was addressed with improved memory handling.Īvailable for: iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation) ![]() For more information, see Plan an upgrade from older versions of Office to Microsoft 365 Apps.Available for devices with Apple Neural Engine: iPhone 8 and later, iPad Pro (3rd generation) and later, iPad Air (3rd generation) and later, and iPad mini (5th generation) If you haven't already begun to upgrade your Office 2013 environment to a newer version of Office, we recommend that you start now. Support for Office 2013 ended on April 11, 2023. ![]()
0 Comments
Leave a Reply. |