Posted by Apple Product Security via Fulldisclosure on Jul 25
APPLE-SA-2023-07-24-5 macOS Monterey 12.6.8Posted by Apple Product Security via Fulldisclosure on Jul 25
APPLE-SA-2023-07-24-6 macOS Big Sur 11.7.9Posted by Apple Product Security via Fulldisclosure on Jul 25
APPLE-SA-2023-07-24-7 tvOS 16.6Posted by Apple Product Security via Fulldisclosure on Jul 25
APPLE-SA-2023-07-24-8 watchOS 9.6Posted by Apple Product Security via Fulldisclosure on Jul 25
APPLE-SA-2023-07-24-4 macOS Ventura 13.5Posted by Andrey Stoykov on Jul 25
# Exploit Title: Availability Booking Calendar PHP - Multiple IssuesPosted by Apple Product Security via Fulldisclosure on Jul 25
APPLE-SA-2023-07-24-1 Safari 16.6Posted by Apple Product Security via Fulldisclosure on Jul 25
APPLE-SA-2023-07-24-3 iOS 15.7.8 and iPadOS 15.7.8Posted by Apple Product Security via Fulldisclosure on Jul 25
APPLE-SA-2023-07-24-2 iOS 16.6 and iPadOS 16.6Posted by Deven Kishore via Fulldisclosure on Jul 24
APPLE-SA-2023-07-24-1 Safari 16.6Posted by Matthias Deeg via Fulldisclosure on Jul 21
Advisory ID: SYSS-2023-006Posted by Matthias Deeg via Fulldisclosure on Jul 21
Advisory ID: SYSS-2023-005Posted by info () vulnerability-lab com on Jul 19
Document Title:Posted by info () vulnerability-lab com on Jul 19
Document Title:Posted by info () vulnerability-lab com on Jul 19
Document Title:Posted by info () vulnerability-lab com on Jul 19
Document Title:Posted by info () vulnerability-lab com on Jul 19
Document Title:Posted by info () vulnerability-lab com on Jul 19
Document Title:Posted by info () vulnerability-lab com on Jul 19
Document Title:Posted by info () vulnerability-lab com on Jul 19
Document Title:Posted by Qualys Security Advisory via Fulldisclosure on Jul 19
Qualys Security AdvisoryPosted by Jeffrey Walton on Jul 19
There's also https://en.wikipedia.org/wiki/Session_hijacking#PreventionPosted by RedTeam Pentesting GmbH on Jul 19
Advisory: Session Token Enumeration in RWS WorldServerPosted by Andrey Stoykov on Jul 16
# Exploit Title: WBCE - Stored XSSPosted by Jens Timmerman on Jul 16
Hi,Posted by Andrey Stoykov on Jul 11
# Exploit Title: XAMPP 8.2.4 - Unquoted PathPosted by Apple Product Security via Fulldisclosure on Jul 11
APPLE-SA-2023-07-10-1 Safari 16.5.2Posted by Apple Product Security via Fulldisclosure on Jul 11
APPLE-SA-2023-07-10-2 Rapid Security Responses for iOS 16.5.1 and iPadOS 16.5.1Posted by Apple Product Security via Fulldisclosure on Jul 11
APPLE-SA-2023-07-10-3 Rapid Security Responses for macOS Ventura 13.4.1Posted by bo0od via Fulldisclosure on Jul 11
I didnt see worst than this app to use for anonymity like this one:Posted by Asterisk Development Team via Fulldisclosure on Jul 11
The Asterisk Development Team would like to announce security releasePosted by Asterisk Development Team via Fulldisclosure on Jul 11
The Asterisk Development Team would like to announce security releasePosted by malvuln on Jul 11
*** Correction: should have been CRYPTSP.dll ***Posted by Asterisk Development Team via Fulldisclosure on Jul 11
The Asterisk Development Team would like to announce security releasePosted by Asterisk Development Team via Fulldisclosure on Jul 11
The Asterisk Development Team would like to announce security releasePosted by Asterisk Development Team via Fulldisclosure on Jul 11
The Asterisk Development Team would like to announce security releasePosted by SEC Consult Vulnerability Lab, Research via Fulldisclosure on Jul 07
SEC Consult Vulnerability Lab Security Advisory < 20230628-0 >Posted by SEC Consult Vulnerability Lab, Research via Fulldisclosure on Jul 07
SEC Consult Vulnerability Lab Security Advisory < 20230705-0 >Posted by SEC Consult Vulnerability Lab, Research via Fulldisclosure on Jul 07
SEC Consult Vulnerability Lab Security Advisory < 20230703-0 >Posted by SEC Consult Vulnerability Lab, Research via Fulldisclosure on Jul 07
SEC Consult Vulnerability Lab Whitepaper < 20230629-0 >Posted by pesco on Jun 21
C. W. Schech on Sat, Jun 17 2023:Posted by jvoisin via Fulldisclosure on Jun 21
I'm unsure I understand the threat model here: an attacker with rootPosted by Martin Heiland via Fulldisclosure on Jun 21
Dear subscribers,Posted by Schech, C. W. ("Connor") on Jun 19
The automatic and mandatory-by-default reordering of OpenBSD kernelsPosted by BUG on Jun 19
Microsoftยฎ Lyncโข Better Together over Ethernet (BToE) feature onPosted by hyp3rlinx on Jun 09
Hi,Posted by Stefan Kanthak on Jun 07
Hi @ll,Posted by Qualys Security Advisory via Fulldisclosure on Jun 07
Qualys Security AdvisoryPosted by Julien Ahrens (RCE Security) on Jun 02
RCE Security AdvisoryPosted by RedTeam Pentesting GmbH on Jun 01
Advisory: STARFACE: Authentication with Password Hash PossiblePosted by Cyber Intel Security on May 30
1. INFORMATIONPosted by Cyber Intel Security on May 30
1. INFORMATIONPosted by Cyber Intel Security on May 30
1. INFORMATIONPosted by Cyber Intel Security on May 30
1. INFORMATIONPosted by Cyber Intel Security on May 30
1. INFORMATIONPosted by Cyber Intel Security on May 30
1. INFORMATIONPosted by Lennert Preuth via Fulldisclosure on May 30
TitlePosted by RedTeam Pentesting GmbH on May 30
For longer running processes, Pydio Cells allows for the creation ofPosted by RedTeam Pentesting GmbH on May 30
Advisory: Pydio Cells: Cross-Site Scripting via File DownloadPosted by RedTeam Pentesting GmbH on May 30
Advisory: Pydio Cells: Unauthorised Role Assignments