Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-30762

Опубликовано: 08 сент. 2021
Источник: debian
EPSS Низкий

Описание

A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..

Пакеты

ПакетСтатусВерсия исправленияРелизТип
webkit2gtkfixed2.28.0-2package
webkit2gtkignoredstretchpackage
wpewebkitfixed2.28.0-1package

Примечания

  • https://webkitgtk.org/security/WSA-2021-0004.html

EPSS

Процентиль: 28%
0.00097
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 4 года назад

A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..

CVSS3: 8.8
redhat
почти 4 года назад

A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..

CVSS3: 8.8
nvd
почти 4 года назад

A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..

CVSS3: 8.8
github
около 3 лет назад

A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..

CVSS3: 8.8
fstec
около 4 лет назад

Уязвимость модулей отображения веб-страниц WebKitGTK и WPE WebKit операционных систем iOS, связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 28%
0.00097
Низкий