exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Apple Security Advisory 2022-02-10-3

Apple Security Advisory 2022-02-10-3
Posted Feb 11, 2022
Authored by Apple | Site apple.com

Apple Security Advisory 2022-02-10-3 - Safari 15.3 addresses code execution and use-after-free vulnerabilities.

tags | advisory, vulnerability, code execution
systems | apple
advisories | CVE-2022-22620
SHA-256 | 9aff010cc56a76b1b22923fd7d12695f4a47ceb08cf3182a39a9c990d7386dc7

Apple Security Advisory 2022-02-10-3

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2022-02-10-3 Safari 15.3

Safari 15.3 addresses the following issues.
Information about the security content is alsoavailable at
https://support.apple.com/HT213091.

WebKit
Available for: macOS Big Sur and macOS Catalina
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution. Apple is aware of a report that this issue
may have been actively exploited.
Description: A use after free issue was addressed with improved
memory management.
CVE-2022-22620: an anonymous researcher

Installation note:

This update may be obtained from the Mac App Store.

Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
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=VhPA
-----END PGP SIGNATURE-----



Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    23 Files
  • 18
    Oct 18th
    10 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    5 Files
  • 22
    Oct 22nd
    12 Files
  • 23
    Oct 23rd
    23 Files
  • 24
    Oct 24th
    9 Files
  • 25
    Oct 25th
    10 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close