![]() ![]() Impact: A malicious application may be able to execute arbitrary code with kernel privileges. This issue was addressed with improved path sanitization.ĬVE-2022-22585: Zhipeng Huo of Tencent Security Xuanwu Lab () Impact: An application may be able to access a user's filesĭescription: An issue existed within the path validation logic for symlinks. Impact: Parsing a maliciously crafted audio file may lead to disclosure of user informationĭescription: A buffer overflow issue was addressed with improved memory handling.ĬVE-2021-30960: JunDong Xie of Ant Security Light-Year Lab
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |