mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-08 03:26:30 +00:00
32 lines
1.7 KiB
Markdown
32 lines
1.7 KiB
Markdown
![]() |
### [CVE-2019-6207](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6207)
|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed with improved input validation. This issue is fixed in iOS 12.2, macOS Mojave 10.14.4, tvOS 12.2, watchOS 5.2. A malicious application may be able to determine kernel memory layout.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
No PoCs from references.
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0xT11/CVE-POC
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/DimitriFourny/cve-2019-6207
|
||
|
- https://github.com/alphaSeclab/sec-daily-2019
|
||
|
- https://github.com/developer3000S/PoC-in-GitHub
|
||
|
- https://github.com/dothanthitiendiettiende/CVE-2019-6207
|
||
|
- https://github.com/hectorgie/PoC-in-GitHub
|
||
|
- https://github.com/maldiohead/CVE-2019-6207
|
||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||
|
|