This issue was addressed by removing unsolicited proxy password authentication prompts. Impact: An attacker in a privileged network position may be able to leak sensitive user informationĭescription: A phishing issue existed in the handling of proxy credentials. Impact: A local user may be able to execute arbitrary code with additional privilegesĬVE-2016-4674: Shrek_wzw of Qihoo 360 Nirvan Team Impact: Processing a maliciously crafted font file may lead to arbitrary code executionĭescription: A memory corruption issue was addressed through improved memory handling.ĬVE-2016-4667: Simon Huang of alipay, Moony Li of TrendMicro, updated October 27, 2016 ![]() Impact: A local user may be able to elevate privilegesĭescription: A null pointer dereference was addressed through improved locking.ĬVE-2016-4678: working with Trend Micro's Zero Day Initiative This issue was addressed through additional validation.ĬVE-2016-7584: Mark Mentovai and Boris Vidolov of Google Inc. Impact: A signed executable may substitute code with the same team IDĭescription: A validation issue existed in the handling of code signatures. ![]() Impact: An application may be able to execute arbitrary code with kernel privilegesĭescription: A memory corruption issue was addressed through improved lock state checking. ![]() Available for: OS X Yosemite v10.10.5 and OS X El Capitan v10.11.6
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |