![]() ![]() ![]() Impact: Parsing a maliciously crafted dictionary file may lead to disclosure of user informationĭescription: A validation issue existed which allowed local file access. ![]() Impact: An attacker in a privileged position may be able to perform a denial of service attackĭescription: A denial of service issue was addressed with improved validation.ĬVE-2018-4406: Michael Hanselmann of hansmi.ch Impact: In certain configurations, a remote attacker may be able to replace the message content from the print server with arbitrary contentĭescription: An injection issue was addressed with improved validation.ĬVE-2018-4153: Michael Hanselmann of hansmi.ch ![]() This issue was addressed by using pseudorandom bases for testing of primes.ĬVE-2018-4398: Martin Albrecht, Jake Massimo and Kenny Paterson of Royal Holloway, University of London, and Juraj Somorovsky of Ruhr University, BochumĬVE-2018-4412: The UK's National Cyber Security Centre (NCSC) Impact: An attacker may be able to exploit a weakness in the Miller-Rabin primality test to incorrectly identify prime numbersĭescription: An issue existed in the method for determining prime numbers. Impact: A malicious application may be able to access restricted filesĭescription: This issue was addressed by removing additional entitlements.ĬVE-2018-4468: Jeff Johnson of ĭescription: A memory corruption issue was addressed with improved memory handling.ĬVE-2018-4126: Bruno Keith working with Trend Micro's Zero Day InitiativeĬVE-2018-4415: Liang Zhuo working with Beyond Security’s SecuriTeam Secure Disclosure Impact: A malicious application may be able to elevate privilegesĬVE-2018-4411: lilang wu moony Li of Trend Micro working with Trend Micro's Zero Day Initiativeĭescription: An out-of-bounds read was addressed with improved bounds checking.ĬVE-2018-4308: Mohamed Ghannam for: macOS Mojave 10.14 Impact: Multiple buffer overflow issues existed in Perlĭescription: Multiple issues in Perl were addressed with improved memory handling.ĬVE-2017-12613: Craig Young of Tripwire VERTĬVE-2017-12618: Craig Young of Tripwire VERT Impact: An application may be able to read restricted memoryĭescription: A validation issue was addressed with improved input sanitization.ĬVE-2018-4417: Lee of the Information Security Lab Yonsei University working with Trend Micro's Zero Day Initiative Forbes macos mojave 10.14.1 code#Impact: An application may be able to execute arbitrary code with system privilegesĭescription: A memory corruption issue was addressed with improved input validation.ĬVE-2018-4410: an anonymous researcher working with Trend Micro's Zero Day Initiative Impact: A remote attacker may be able to attack AFP servers through HTTP clientsĭescription: An input validation issue was addressed with improved input validation.ĬVE-2018-4295: Jianjun Chen from Tsinghua University and UC BerkeleyĪvailable for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14 Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6 ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |