Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-30734

Опубликовано: 08 сент. 2021
Источник: debian
EPSS Низкий

Описание

Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
webkit2gtkfixed2.32.3-1package
webkit2gtkignoredstretchpackage
wpewebkitfixed2.32.3-1package

Примечания

  • https://webkitgtk.org/security/WSA-2021-0004.html

EPSS

Процентиль: 48%
0.00252
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 4 года назад

Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.

CVSS3: 8.8
redhat
около 4 лет назад

Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.

CVSS3: 8.8
nvd
почти 4 года назад

Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.

CVSS3: 8.8
github
около 3 лет назад

Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.

CVSS3: 8.8
fstec
около 4 лет назад

Уязвимость модулей отображения веб-страниц WebKitGTK, WPE WebKit, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 48%
0.00252
Низкий