Red Hat Security Advisory 2021-1586-01 - GNOME is the default desktop environment of Red Hat Enterprise Linux. Issues addressed include code execution, insecure permissions, out of bounds write, and use-after-free vulnerabilities.
83850ab16175a11b58bb98d158fec9786cbf3c1014ed6eabb5bf6fd703ec9fd0
Gentoo Linux Security Advisory 202012-10 - Multiple vulnerabilities have been found in WebKitGTK+, the worst of which could result in the arbitrary execution of code. Versions less than 2.30.3 are affected.
d721871c2eb810583e54a283bedc9a56e02aeb022bd9927e9feccfcc2d032ae7
Debian Linux Security Advisory 4797-1 - Vulnerabilities have been discovered in the webkit2gtk web engine.
93fd37c701da2126e2aa679ea16d6c5e79d5f32de9b7c7497b5f1edc25c2df16
Apple Security Advisory 2020-11-13-6 - watchOS 7.0 addresses buffer overflow, code execution, cross site scripting, denial of service, information leakage, out of bounds read, out of bounds write, spoofing, and use-after-free vulnerabilities.
14dc6b014dc0f3b7d3798ad9d61d811ea12102e97440362d26de59af4a091a3d
Apple Security Advisory 2020-11-13-5 - Safari 14.0 addresses code execution, cross site scripting, out of bounds write, spoofing, and use-after-free vulnerabilities.
811b88f1e5b3d14923a4580f754ecc56118d06fe6387db59e96f29a0e239ef45
Apple Security Advisory 2020-11-13-4 - tvOS 14.0 addresses buffer overflow, code execution, cross site scripting, denial of service, information leakage, out of bounds read, out of bounds write, and use-after-free vulnerabilities.
666bacc553628fd20f69243b0b028286a17b1810726bb43edf4360c86392749c
Apple Security Advisory 2020-11-13-3 - Updates for iOS 14.0 and iPadOS 14.0 address buffer overflow, code execution, cross site scripting, denial of service, information leakage, out of bounds read, out of bounds write, spoofing, and use-after-free vulnerabilities.
c81b3c771086e19928398506df7470dbd4262700ea21eebb45cfac57931704f0
Apple Security Advisory 2020-09-16-3 - Safari 14.0 is now available and addresses code execution, cross site scripting, out of bounds write, and use-after-free vulnerabilities.
cae12a9373b83d218a96163e66f5f4bf1ba87f98cae36acd07e759d548a83cdb