Posted by Apple Product Security via Fulldisclosure on Sep 15
APPLE-SA-09-15-2025-12 Xcode 26Posted by Apple Product Security via Fulldisclosure on Sep 15
APPLE-SA-09-15-2025-11 Safari 26Posted by Apple Product Security via Fulldisclosure on Sep 15
APPLE-SA-09-15-2025-10 visionOS 26Posted by Apple Product Security via Fulldisclosure on Sep 15
APPLE-SA-09-15-2025-9 watchOS 26Posted by Apple Product Security via Fulldisclosure on Sep 15
APPLE-SA-09-15-2025-8 tvOS 26Posted by Apple Product Security via Fulldisclosure on Sep 15
APPLE-SA-09-15-2025-7 macOS Sonoma 14.8Posted by Apple Product Security via Fulldisclosure on Sep 15
APPLE-SA-09-15-2025-6 macOS Sequoia 15.7Posted by Apple Product Security via Fulldisclosure on Sep 15
APPLE-SA-09-15-2025-5 macOS Tahoe 26Posted by Apple Product Security via Fulldisclosure on Sep 15
APPLE-SA-09-15-2025-4 iOS 15.8.5 and iPadOS 15.8.5Posted by Apple Product Security via Fulldisclosure on Sep 15
APPLE-SA-09-15-2025-3 iOS 16.7.12 and iPadOS 16.7.12Posted by Apple Product Security via Fulldisclosure on Sep 15
APPLE-SA-09-15-2025-2 iOS 18.7 and iPadOS 18.7Posted by Apple Product Security via Fulldisclosure on Sep 15
APPLE-SA-09-15-2025-1 iOS 26 and iPadOS 26Posted by Ron E on Sep 15
libwmf is vulnerable to an integer overflow / undefined behavior conditionPosted by Ron E on Sep 15
A vulnerability exists in CHMLib (latest release 0.40) when parsingPosted by Ron E on Sep 15
An integer overflow vulnerability exists in the LZX decompression routinesPosted by Ron E on Sep 15
Multiple functions in libvips invoke callbacks through incorrectly castPosted by Ron E on Sep 15
A heap buffer overflow vulnerability exists in gbsplay 0.0.100-18-g50352f3Posted by Ron E on Sep 15
libicns fails to validate element size fields in .icns files properly. APosted by Ron E on Sep 15
libicns incorrectly handles certain byte values when parsing .icns files.Posted by Ron E on Sep 15
libicns, a library used for parsing Apple ICNS image files, contains aPosted by SEC Consult Vulnerability Lab via Fulldisclosure on Sep 15
SEC Consult Vulnerability Lab Security Advisory < 20250911-0 >Posted by josephgoyd via Fulldisclosure on Sep 15
Posted by naphthalin via Fulldisclosure on Sep 10
βI know where your children go to school.βPosted by Matthew Fernandez on Sep 10
Can you elaborate on why you consider this high severity? From thePosted by Stefan Kanthak via Fulldisclosure on Sep 08
Hi @ll,Posted by Taylor Newsome on Sep 08
Reporter: [Taylor Christian Newsome / SleepRaps () gmail com]Posted by Taylor Newsome on Sep 08
*To:* support () mellanox com, networking-support () nvidia comPosted by SEC Consult Vulnerability Lab via Fulldisclosure on Sep 08
SEC Consult Vulnerability Lab Security Advisory < 20250908-0 >Posted by Ron E on Sep 08
An integer overflow vulnerability exists in the FFmpeg cache: URL protocolPosted by Ron E on Sep 08
A vulnerability exists in the FFmpeg UDP protocol implementation (Posted by Ron E on Sep 08
A signed integer overflow exists in FFmpegβs udp.c implementation whenPosted by Ron E on Sep 08
The ladspa audio filter implementation (libavfilter/af_ladspa.c) in FFmpegPosted by Ron E on Sep 08
Improper validation in libavutil/avstring.c allows a NULL pointerPosted by Ron E on Sep 08
FFmpeg invokes function pointers through incorrect type casting, leading toPosted by Ron E on Sep 08
The FFmpeg tools/yuvcmp utility is vulnerable to an integer overflow whenPosted by Ron E on Sep 08
Malformed .m3u8 playlists can trigger a heap use-after-free when the HLSPosted by Ron E on Sep 08
The DjVuLibre document compression library (tested version 3.5.29) containsPosted by Ron E on Sep 08
The DjVuLibre document compression library (tested version 3.5.29) isPosted by Ron E on Sep 08
An integer overflow vulnerability exists in the Y4M input loader (loadY4MPosted by Ron E on Sep 08
During construction of a Track_Visual object, corrupted sequence metadataPosted by Ron E on Sep 08
Box_hdlr::get_handler_type() (libheif/box.h:487) is called even when thePosted by Ron E on Sep 08
The FullBox::get_flags() method retrieves 24-bit flags from the underlyingPosted by Ron E on Sep 08
The Box_stts structure defines decoding time to sample mapping. InPosted by Ron E on Sep 08
The Track::init_sample_timing_table logic manages aPosted by Ron E on Sep 08
The vulnerability resides in the constructor Chunk::Chunk (Posted by Seralys Research Team via Fulldisclosure on Sep 08
Seralys Security Advisory | https://www.seralys.com/researchPosted by Apple Product Security via Fulldisclosure on Sep 08
APPLE-SA-08-20-2025-5 macOS Ventura 13.7.8Posted by Apple Product Security via Fulldisclosure on Sep 08
APPLE-SA-08-20-2025-4 macOS Sonoma 14.7.8Posted by Apple Product Security via Fulldisclosure on Sep 08
APPLE-SA-08-20-2025-3 macOS Sequoia 15.6.1Posted by Apple Product Security via Fulldisclosure on Sep 08
APPLE-SA-08-20-2025-2 iPadOS 17.7.10Posted by Asterisk Development Team via Fulldisclosure on Sep 08
The Asterisk Development Team would like to announce security releasePosted by Asterisk Development Team via Fulldisclosure on Sep 08
The Asterisk Development Team would like to announce security releasePosted by Asterisk Development Team via Fulldisclosure on Sep 08
The Asterisk Development Team would like to announce security releasePosted by Joseph Goydish II via Fulldisclosure on Sep 08
TITLE:Posted by Usman Saeed via Fulldisclosure on Aug 18
#!/usr/bin/env python3Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Aug 18
Confidentiality class: Internal & PartnerPosted by SEC Consult Vulnerability Lab via Fulldisclosure on Aug 18
Confidentiality class: Internal & PartnerPosted by Ron E on Aug 18
nopCommerce is vulnerable to Insufficient Resource Allocation Limits whenPosted by Ron E on Aug 18
nopCommerce versions v4.10 and v4.80.3 are vulnerable to *C*SV InjectionPosted by Ron E on Aug 18
nopCommerce v4.10 and 4.80.3 is vulnerable to Insufficient Invalidation of