### [CVE-2021-30785](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30785) ![](https://img.shields.io/static/v1?label=Product&message=Security%20Update%20-%20Catalina&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=iOS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=macOS&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2011.5%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2014.7%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3C%202021%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3C%207.6%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Processing%20a%20maliciously%20crafted%20image%20may%20lead%20to%20arbitrary%20code%20execution&color=brighgreen) ### Description A buffer overflow was addressed with improved bounds checking. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7, Security Update 2021-004 Catalina. Processing a maliciously crafted image may lead to arbitrary code execution. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon