[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

254802

 
 

909

 
 

198617

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 7916 Download | Alert*

~/.config/apport/settings parsing is vulnerable to "billion laughs" attack

is_closing_session() allows users to fill up apport.log

is_closing_session() allows users to create arbitrary tcp dbus connections

is_closing_session() allows users to consume RAM in the Apport process

Apport does not disable python crash handler before entering chroot

Apport argument parsing mishandles filename splitting on older kernels resulting in argument spoofing

A memory corruption issue was addressed with improved validation. This issue is fixed in macOS Monterey 12.5. Processing a maliciously crafted tiff file may lead to arbitrary code execution.

An information disclosure issue was addressed by removing the vulnerable code. This issue is fixed in macOS Monterey 12.5. A website may be able to track the websites a user visited in Safari private browsing mode.

An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.5. Processing an AppleScript may result in unexpected termination or disclosure of process memory.

An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13. An app may be able to break out of its sandbox.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   791

© SecPod Technologies