Gentoo Linux Security Advisory 202202-1 - Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code. Versions less than 2.34.4 are affected.
d7b81acd976ea4556319720db72f4fff64adcb599b6250a5fa8a28bd2243c7c4
Red Hat Security Advisory 2021-4381-05 - GNOME is the default desktop environment of Red Hat Enterprise Linux. Issues addressed include buffer overflow, code execution, cross site scripting, information leakage, integer overflow, traversal, and use-after-free vulnerabilities.
6b31628ab9f29a4bc05026050453104d1b307494f816a809a4f05f5a2949608c
Debian Linux Security Advisory 4945-1 - Vulnerabilities have been discovered in the webkit2gtk web engine.
db3773c5f5bf9c0bc82d8e7414f94ae18cb4a5da421a3c58bb325df00ee051bf
Apple Security Advisory 2021-05-25-6 - watchOS 7.5 addresses buffer overflow, code execution, cross site scripting, denial of service, out of bounds read, and use-after-free vulnerabilities.
bf5980198ddb010accfb5c43551d1ca9d78cd0ef77f89bcf61101d0efc901f78
Apple Security Advisory 2021-05-25-2 - macOS Big Sur 11.4 addresses buffer overflow, bypass, code execution, cross site scripting, denial of service, information leakage, null pointer, out of bounds read, out of bounds write, path sanitization, and use-after-free vulnerabilities.
b7bacb029f8caaf126c79185f04a21c9db5d08fb8a900666c62f076ff293a421
Apple Security Advisory 2021-05-25-7 - tvOS 14.6 addresses buffer overflow, code execution, cross site scripting, denial of service, integer overflow, out of bounds read, and use-after-free vulnerabilities.
6b67770482452432db54af4fb639291beaebdb13d5e2b7ae9a7eda93e3bac1cd
Apple Security Advisory 2021-05-25-5 - Safari 14.1.1 addresses code execution, cross site scripting, denial of service, integer overflow, null pointer, and use-after-free vulnerabilities.
3d0b1ff9f9087dd22ccc46998ca1a15f487dcd05f2741f6bb0b94f8700702959
Apple Security Advisory 2021-05-25-1 - iOS 14.6 and iPadOS 14.6 addresses buffer overflow, code execution, cross site scripting, denial of service, information leakage, null pointer, out of bounds read, and use-after-free vulnerabilities.
a1a282793028ec06e5f187d3b8d87c8c66f3eec9577f0d3ba5404d89d30ba9e0