FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Today β€” September 16th 2025Full Disclosure

APPLE-SA-09-15-2025-12 Xcode 26

Posted by Apple Product Security via Fulldisclosure on Sep 15

APPLE-SA-09-15-2025-12 Xcode 26

Xcode 26 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/125117.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

Dev Tools
Available for: macOS Sequoia 15.6 and later
Impact: Processing an overly large path value may crash a process
Description: A path...

APPLE-SA-09-15-2025-11 Safari 26

Posted by Apple Product Security via Fulldisclosure on Sep 15

APPLE-SA-09-15-2025-11 Safari 26

Safari 26 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/125113.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

Safari
Available for: macOS Sonoma and macOS Sequoia
Impact: Visiting a malicious website may lead to address bar spoofing
Description: The...

APPLE-SA-09-15-2025-10 visionOS 26

Posted by Apple Product Security via Fulldisclosure on Sep 15

APPLE-SA-09-15-2025-10 visionOS 26

visionOS 26 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/125115.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

AppleMobileFileIntegrity
Available for: Apple Vision Pro
Impact: An app may be able to access sensitive user data
Description: A...

APPLE-SA-09-15-2025-9 watchOS 26

Posted by Apple Product Security via Fulldisclosure on Sep 15

APPLE-SA-09-15-2025-9 watchOS 26

watchOS 26 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/125116.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

Apple Neural Engine
Available for: Apple Watch Series 9 and later, Apple Watch SE 2nd
generation, Apple Watch Ultra (all models)
Impact:...

APPLE-SA-09-15-2025-8 tvOS 26

Posted by Apple Product Security via Fulldisclosure on Sep 15

APPLE-SA-09-15-2025-8 tvOS 26

tvOS 26 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/125114.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

Apple Neural Engine
Available for: Apple TV 4K (2nd generation and later)
Impact: An app may be able to cause unexpected system termination...

APPLE-SA-09-15-2025-7 macOS Sonoma 14.8

Posted by Apple Product Security via Fulldisclosure on Sep 15

APPLE-SA-09-15-2025-7 macOS Sonoma 14.8

macOS Sonoma 14.8 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/125112.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

AMD
Available for: macOS Sonoma
Impact: An app may be able to cause unexpected system termination
Description: A buffer...

APPLE-SA-09-15-2025-6 macOS Sequoia 15.7

Posted by Apple Product Security via Fulldisclosure on Sep 15

APPLE-SA-09-15-2025-6 macOS Sequoia 15.7

macOS Sequoia 15.7 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/125111.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

AMD
Available for: macOS Sequoia
Impact: An app may be able to cause unexpected system termination
Description: A buffer...

APPLE-SA-09-15-2025-5 macOS Tahoe 26

Posted by Apple Product Security via Fulldisclosure on Sep 15

APPLE-SA-09-15-2025-5 macOS Tahoe 26

macOS Tahoe 26 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/125110.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

Airport
Available for: Mac Studio (2022 and later), iMac (2020 and later), Mac
Pro (2019 and later), Mac mini (2020 and later),...

APPLE-SA-09-15-2025-4 iOS 15.8.5 and iPadOS 15.8.5

Posted by Apple Product Security via Fulldisclosure on Sep 15

APPLE-SA-09-15-2025-4 iOS 15.8.5 and iPadOS 15.8.5

iOS 15.8.5 and iPadOS 15.8.5 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/125142.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

ImageIO
Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE
(1st generation), iPad...

APPLE-SA-09-15-2025-3 iOS 16.7.12 and iPadOS 16.7.12

Posted by Apple Product Security via Fulldisclosure on Sep 15

APPLE-SA-09-15-2025-3 iOS 16.7.12 and iPadOS 16.7.12

iOS 16.7.12 and iPadOS 16.7.12 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/125141.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

ImageIO
Available for: iPhone 8, iPhone 8 Plus, iPhone X, iPad 5th generation,
iPad Pro 9.7-inch,...

APPLE-SA-09-15-2025-2 iOS 18.7 and iPadOS 18.7

Posted by Apple Product Security via Fulldisclosure on Sep 15

APPLE-SA-09-15-2025-2 iOS 18.7 and iPadOS 18.7

iOS 18.7 and iPadOS 18.7 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/125109.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

Audio
Available for: iPhone XS and later, iPad Pro 13-inch, iPad Pro 12.9-inch
3rd generation and later, iPad...

APPLE-SA-09-15-2025-1 iOS 26 and iPadOS 26

Posted by Apple Product Security via Fulldisclosure on Sep 15

APPLE-SA-09-15-2025-1 iOS 26 and iPadOS 26

iOS 26 and iPadOS 26 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/125108.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

Apple Neural Engine
Available for: iPhone 11 and later, iPad Pro 12.9-inch 3rd generation
and later, iPad Pro 11-inch...

libwmf v0.2.13 Integer Overflow in libwmf Left-Shift Operations (wmf.c, fig.c, svg.c)

Posted by Ron E on Sep 15

libwmf is vulnerable to an integer overflow / undefined behavior condition
in multiple code paths. The affected source files (wmf.c, fig.c, svg.c) use
left-shift operations on signed integers that shift into the sign bit
(e.g., 1 << 31). According to the C standard, shifting a signed integer
into the sign bit is undefined behavior and may lead to incorrect values or
unexpected execution paths. When a crafted WMF file is processed with tools...

CHMLib 0.40a Integer Overflow in _unmarshal_int32 / _unmarshal_uint32 During CHM Header Parsing

Posted by Ron E on Sep 15

A vulnerability exists in CHMLib (latest release 0.40) when parsing
malformed CHM (Compiled HTML Help) files. The functions _unmarshal_int32
and _unmarshal_uint32 reconstruct 32-bit values using left shifts on signed
integers without proper type casting: *dest = (*pData)[0] | (*pData)[1]<<8
| (*pData)[2]<<16 | (*pData)[3]<<24; If an attacker supplies crafted input
such that the most significant byte is 0xFF, this triggers a left...

CHMLIB 0.40a Integer Overflow in LZX Decompression of CHMLib

Posted by Ron E on Sep 15

An integer overflow vulnerability exists in the LZX decompression routines
of CHMLib (tested in version 0.40, latest release as of 2025). The issue
occurs within lzx.c during bitstream parsing (lzx_read_lens and
LZXdecompress), where crafted CHM files can supply values that cause
left-shift operations to exceed the representable range of 32-bit signed
integers. When processing malformed compressed blocks, operations such as:
leaf = pos >>...

libvips v8.18.0 Function Pointer Type Confusion in libvips Callback Dispatch

Posted by Ron E on Sep 15

Multiple functions in libvips invoke callbacks through incorrectly cast
function pointers, resulting in Undefined Behavior (UB). During
runtime, callbacks
such as search_package, vips_class_map_all, vips_foreign_find_load_sub,
vips_object_real_postbuild, and vips_area_free_cb are called through
function pointer types that do not match their actual signatures. This is
benign on x86-64, where calling conventions tolerate mismatches, but on
stricter...

gbsplay 0.0.100-18 Heap Buffer Overflow in update_status_on_subsong_change in gbsplay

Posted by Ron E on Sep 15

A heap buffer overflow vulnerability exists in gbsplay 0.0.100-18-g50352f3
(latest development snapshot at the time of testing). When opening a
crafted GBS file with inconsistent subsong metadata, the function
update_status_on_subsong_change (gbs.c:501) reads past the bounds of a
heap-allocated structure. The bug is triggered during subsong status update
when the reported total_songs or subsong indices are malformed.
AddressSanitizer (ASan)...

libicns v0.8.1 Out-of-Bounds Read in libicns icns_family.c when parsing malformed .icns files

Posted by Ron E on Sep 15

libicns fails to validate element size fields in .icns files properly. A
crafted file can cause the library to allocate insufficient memory for an
icns_family_t structure. When icns_family.c treats this undersized memory
as a complete struct, it dereferences members that lie beyond the allocated
space. This results in an Out-of-Bounds Read (CWE-125). Depending on
subsequent code paths, these invalid member references may also be written
to,...

libicns v0.8.1 Signed Integer Overflow in libicns during .icns file parsing

Posted by Ron E on Sep 15

libicns incorrectly handles certain byte values when parsing .icns files.
Specifically, shifting a byte with value 255 by 24 bits in a signed 32-bit
integer causes an integer overflow, as the resulting value exceeds the
maximum representable value for a signed int.

*Impact:*

- Applications using libicns may crash or terminate parsing when
processing a malicious .icns file.
- Overflow may propagate to other computations or data...

libicns v0.8.1 Heap Buffer Overflow in libicns ICNS Parsing (icns2png)

Posted by Ron E on Sep 15

libicns, a library used for parsing Apple ICNS image files, contains a
heap-based buffer overflow in the icns2png utility and associated library
components (icns_image.c). The vulnerability occurs when parsing malformed
ICNS files where element sizes are crafted to exceed the allocated heap
buffer. Specifically, the function icns_get_image_from_element() performs a
memcpy() using a length field read from the ICNS element without proper
bounds...

SEC Consult SA-20250911-0 :: Unauthenticated SQL Injection Vulnerability in Shibboleth Service Provider (SP) (ODBC interface)

Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Sep 15

SEC Consult Vulnerability Lab Security Advisory < 20250911-0 >
=======================================================================
title: Unauthenticated SQL Injection Vulnerability
product: Shibboleth Service Provider (SP) (ODBC interface)
vulnerable version: <=3.5.0
fixed version: 3.5.1
CVE number: CVE-2025-9943
impact: High
homepage:...
Before yesterdayFull Disclosure

User Enumeration in IServ Schoolserver Web Login

Posted by naphthalin via Fulldisclosure on Sep 10

β€œI know where your children go to school.”
The web front end of the IServ school server from IServ GmbH allows user
enumeration. Responses during failed login attempts differ, depending on
if the user account exists, does not exist and other conditions. While
this does not pose a security risk in many applications, it has to be
considered extremely problematic in software designed for schools. Due
to the widespread use of IServ in...

Re: Apple’s A17 Pro Chip: Critical Flaw Causes Dual Subsystem Failure & Forensic Log Loss

Posted by Matthew Fernandez on Sep 10

Can you elaborate on why you consider this high severity? From the
description, it sounds as if this behaviour is fail-closed. That is, the
effects are limited to DoS, with security properties preserved.

Defense in depth -- the Microsoft way (part 92): more stupid blunders of Windows' File Explorer

Posted by Stefan Kanthak via Fulldisclosure on Sep 08

Hi @ll,

this extends the two previous posts titled Defense in depth --
the Microsoft way (part 90): "Digital Signature" property sheet
missing without "Read Extended Attributes" access permission
<https://seclists.org/fulldisclosure/2025/Jul/39> and Defense
in depth -- the Microsoft way (part 91): yet another 30 year
old bug of the "Properties" shell extension
<https://seclists.org/fulldisclosure/2025/Aug/2...

Critical Security Report – Remote Code Execution via Persistent Discord WebRTC Automation

Posted by Taylor Newsome on Sep 08

Reporter: [Taylor Christian Newsome / SleepRaps () gmail com]
Date: [8/21/2025]
Target: Discord WebRTC / Voice Gateway API
Severity: Critical

1. Executive Summary
A proof-of-concept (PersistentRTC) demonstrates remote code execution (RCE)
capability against Discord users. The PoC enables
Arbitrary JavaScript execution in a victim’s browser context via WebRTC
automation.
Persistent access to Discord voice channels without user consent.
Optional...

Submission of Critical Firmware Parameters – PCIe HCA Cards

Posted by Taylor Newsome on Sep 08

*To:* support () mellanox com, networking-support () nvidia com

*From:* Taylor Christian Newsome

*Date:* August 20, 2025

*Dear Mellanox/NVIDIA Networking Support Team,*

I am writing to formally submit the critical firmware parameters for
Mellanox PCI Express Host Channel Adapter (HCA) cards, as detailed in the
official documentation available here:
https://content.mellanox.com/firmware/critical_params.txt.

This document specifies essential...

SEC Consult SA-20250908-0 :: NFC Card Vulnerability Exploitation Leading to Free Top-Up in KioSoft "Stored Value" Unattended Payment Solution (Mifare)

Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Sep 08

SEC Consult Vulnerability Lab Security Advisory < 20250908-0 >
=======================================================================
title: NFC Card Vulnerability Exploitation Leading to Free Top-Up
product: KioSoft "Stored Value" Unattended Payment Solution (Mifare)
vulnerable version: Current firmware/hardware as of Q2/2025
fixed version: No version numbers available
CVE number:...

FFmpeg 7.0+ Integer Overflow in FFmpeg cache: Protocol (CacheEntry::size)

Posted by Ron E on Sep 08

An integer overflow vulnerability exists in the FFmpeg cache: URL protocol
implementation. The CacheEntry structure uses a 32-bit signed integer to
store cache entry sizes (int size), but the cache layer can accumulate
cached data exceeding 2 GB. Once entry->size grows beyond INT_MAX and new
data is appended, an overflow occurs. This results in corrupted cache
metadata and can lead to logic errors, incorrect data reads, and possible...

FFmpeg 7.0+ Integer Overflow in DSCP Option Handling of FFmpeg UDP Protocol

Posted by Ron E on Sep 08

A vulnerability exists in the FFmpeg UDP protocol implementation (
libavformat/udp.c) where the dscp parameter is parsed from a URI and
left-shifted without bounds checking. Supplying a maximum 32-bit signed
integer (2147483647) triggers undefined behavior due to a left shift that
exceeds the representable range of int. This results in abnormal process
termination (DoS) and may lead to miscompiled logic or further memory
corruption depending on...

FFmpeg 7.0+ Integer Overflow in UDP Protocol Handler (fifo_size option)

Posted by Ron E on Sep 08

A signed integer overflow exists in FFmpeg’s udp.c implementation when
parsing the fifo_size option from a user-supplied UDP URL. The overflow
occurs during multiplication, which is used to compute the size of the
circular receive buffer. This can result in undefined behavior, allocation
failures, or potentially memory corruption depending on compiler
optimizations and downstream usage. (FFmpeg 7.0-8.0))
*Impact:*

-

Denial of Service...

FFmpeg 7.0+ LADSPA Filter Arbitrary Shared Object Loading via Unsanitized Environment Variables

Posted by Ron E on Sep 08

The ladspa audio filter implementation (libavfilter/af_ladspa.c) in FFmpeg
allows unsanitized environment variables to influence dynamic library
loading. Specifically, the filter uses getenv("LADSPA_PATH") and
getenv("HOME") when resolving the plugin shared object (.so) name provided
through the file option. These values are concatenated into a filesystem
path and passed directly into dlopen() without validation or...

FFmpeg 7.0+ NULL Pointer Dereference in FFmpeg String Handling (avstring.c)

Posted by Ron E on Sep 08

Improper validation in libavutil/avstring.c allows a NULL pointer
dereference when processing certain strings in HLS contexts. UBSan reports
"applying zero offset to null pointer." Triggers denial of service (DoS)
when FFmpeg processes malicious playlists or malformed URLs. (FFmpeg 7.0 –
8.0)

*Impact:*

-

Consistently crashes the process (DoS).
-

Exploitation beyond denial of service is unlikely on modern OSes.

*Proof...

FFmpeg 7.0+ Type Confusion in FFmpeg Function Pointer Calls (libavformat/utils.c)

Posted by Ron E on Sep 08

FFmpeg invokes function pointers through incorrect type casting, leading to
type confusion. UndefinedBehaviorSanitizer logs mismatched signatures in
utils.c:528. Crafted inputs can cause UB, misaligned function dispatch, and
possible arbitrary code execution depending on platform ABI. (FFmpeg 7.0 –
8.0)

*Impact:*

-

DoS in normal builds.
-

Potential information disclosure or RCE under certain
compilers/architectures.

*Proof...

FFmpeg 7.0+ Integer Overflow in FFmpeg yuvcmp Tool Leads to Out-of-Bounds Allocation

Posted by Ron E on Sep 08

The FFmpeg tools/yuvcmp utility is vulnerable to an integer overflow when
large width and height parameters are supplied. The overflow occurs during
buffer size calculations (width * height) leading to incorrect allocation
sizes and subsequent memory corruption. An attacker controlling input
dimensions can trigger large or invalid memory allocations, leading to
denial of service (DoS), memory exhaustion, or potential heap corruption.
(FFmpeg...

FFmpeg 7.0+ Heap Use-After-Free in FFmpeg HLS Demuxer (libavformat/utils.c)

Posted by Ron E on Sep 08

Malformed .m3u8 playlists can trigger a heap use-after-free when the HLS
demuxer handles segment references. ASan reports access to freed memory
inside libavformat/utils.c:528. A crafted .m3u8 could allow remote
attackers to achieve denial of service (DoS), information disclosure, or
potentially remote code execution depending on heap state. (FFmpeg 7.0-8.0)

*Impact:*

-

Remote attackers can crash the transcoder with a malicious playlist....

DjVuLibre 3.5.29 ZPCodec Unsigned Integer Overflow in Arithmetic Encoding

Posted by Ron E on Sep 08

The DjVuLibre document compression library (tested version 3.5.29) contains
multiple instances of unsigned integer overflow in the ZPCodec.cpp
component. During arithmetic encoding operations (e.g., zemit, encode_lps,
encode_lps_simple, eflush), crafted input can cause arithmetic wraparound
(0-1, 1-2, or value+UINT_MAX). These operations rely on precise probability
modeling for entropy encoding, and wraparound corrupts encoder state. An
attacker...

DjVuLibre 3.5.29 IW44EncodeCodec Integer Overflow (Negative Left Shift in IW44Image::Map::Encode)

Posted by Ron E on Sep 08

The DjVuLibre document compression library (tested version 3.5.29) is
vulnerable to an integer overflow caused by a left shift of a negative
signed integer in the IW44EncodeCodec.cpp component. When processing
crafted PPM input passed through the c44 utility, negative pixel values are
left-shifted in functions such as filter_fh, filter_fv, and
IW44Image::Map::Encode::create. This results in undefined behavior and
corrupted intermediate state...

libheif v1.21.0 Integer Overflow in Y4M Loader leading to Uncontrolled Memory Allocation

Posted by Ron E on Sep 08

An integer overflow vulnerability exists in the Y4M input loader (loadY4M
in decoder_y4m.cc) of libheif. The loader fails to properly validate the
width and height values declared in the Y4M file header. Supplying a
crafted .y4m file with extremely large dimensions (e.g., W2147483647
H2147483647) causes integer overflow during buffer size calculations. This
results in uncontrolled memory allocation requests that exceed supported
limits. Depending...

libheif v1.21.0 Null Pointer Dereference in std::vector<unsigned>::empty

Posted by Ron E on Sep 08

During construction of a Track_Visual object, corrupted sequence metadata
can leave a std::vector<unsigned> uninitialized. When .empty() is called,
it attempts to dereference a null object.

*Root Cause:*

-

Missing input validation when constructing vectors from parsed boxes.

*Impact:*

-

Application crash (DoS).
-

Not exploitable for code execution.

*Evidence:*

==1174955==ERROR: AddressSanitizer: SEGV in...

libheif v1.21.0 Null Pointer Dereference in Box_hdlr::get_handler_type

Posted by Ron E on Sep 08

Box_hdlr::get_handler_type() (libheif/box.h:487) is called even when the
hdlr box has not been properly initialized due to malformed input. This
leads to dereferencing a null object pointer.

*Root Cause:*

-

No validation of hdlr box presence before accessing handler fields.

*Impact:*

-

Application crash only (DoS).
-

No memory corruption or exploitability.

*Evidence:*==2436988==ERROR: AddressSanitizer: SEGV on unknown...

libheif v1.21.0 Out-of-Bounds Read in FullBox::get_flags

Posted by Ron E on Sep 08

The FullBox::get_flags() method retrieves 24-bit flags from the underlying
box header. When a malformed box truncates the field, the function still
attempts to read three bytes. With insufficient data, this reads past valid
memory into uninitialized or out-of-bounds memory.

*Root Cause:*

-

No length validation before reading flag fields.

*Impact:*

-

Crash due to invalid memory access.
-

Potential leakage of heap memory...

libheif v1.21.0 Out-of-Bounds Read in Box_stts::get_sample_duration

Posted by Ron E on Sep 08

The Box_stts structure defines decoding time to sample mapping. In
Box_stts::get_sample_duration(unsigned), the requested index is assumed
valid. A crafted file can set entry_count inconsistently with the actual
buffer size, leading to access beyond the bounds of the parsed vector.

*Root Cause:*

-

Lack of bounds checks on entry_count and indexing operations.
-

Blind trust in stts box metadata.

*Impact:*

-

Invalid memory...

libheif 1.21.0 Use-After-Free / Dangling shared_ptr in Track Chunk Handling

Posted by Ron E on Sep 08

The Track::init_sample_timing_table logic manages a
std::vector<std::shared_ptr<Chunk>> representing parsed sequence chunks.
With malformed HEIF sequence files, corrupted chunk tables may cause
premature destruction of Chunk objects while references remain in the
vector. Later accesses via std::__shared_ptr<Chunk>::get() return a
dangling pointer.

ASan reports these as heap-buffer-overflows because the stale pointer still...

libheif v1.21.0 Heap Buffer Overflow in Chunk::Chunk

Posted by Ron E on Sep 08

The vulnerability resides in the constructor Chunk::Chunk (
libheif/sequences/chunk.cc:89). When parsing the Sample Size Box (stsz) of
a HEIF sequence track, the code allocates a std::vector<unsigned int> and
then appends entries for each sample size. The count used for allocation
and iteration is taken directly from the bitstream (Box_stsz::parse)
without verifying consistency between declared count and available data.

When the stsz box...

CVE-2024-45438 - SpamTitan Unauthenticated User Creation

Posted by Seralys Research Team via Fulldisclosure on Sep 08

Seralys Security Advisory | https://www.seralys.com/research

======================================================================
Title: Unauthenticated User Creation
Product: SpamTitan Email Security Gateway
Affected: Confirmed on 8.00.95
Fixed in: 8.00.101 and 8.01.14
Vendor: TitanHQ
Discovered: May 2024
Severity: HIGH
CWE: CWE-306: Missing Authentication for Critical Function
CVE:...

APPLE-SA-08-20-2025-5 macOS Ventura 13.7.8

Posted by Apple Product Security via Fulldisclosure on Sep 08

APPLE-SA-08-20-2025-5 macOS Ventura 13.7.8

macOS Ventura 13.7.8 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/124929.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

ImageIO
Available for: macOS Ventura
Impact: Processing a malicious image file may result in memory
corruption. Apple...

APPLE-SA-08-20-2025-4 macOS Sonoma 14.7.8

Posted by Apple Product Security via Fulldisclosure on Sep 08

APPLE-SA-08-20-2025-4 macOS Sonoma 14.7.8

macOS Sonoma 14.7.8 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/124928.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

ImageIO
Available for: macOS Sonoma
Impact: Processing a malicious image file may result in memory
corruption. Apple is...

APPLE-SA-08-20-2025-3 macOS Sequoia 15.6.1

Posted by Apple Product Security via Fulldisclosure on Sep 08

APPLE-SA-08-20-2025-3 macOS Sequoia 15.6.1

macOS Sequoia 15.6.1 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/124927.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

ImageIO
Available for: macOS Sequoia
Impact: Processing a malicious image file may result in memory
corruption. Apple...

APPLE-SA-08-20-2025-2 iPadOS 17.7.10

Posted by Apple Product Security via Fulldisclosure on Sep 08

APPLE-SA-08-20-2025-2 iPadOS 17.7.10

iPadOS 17.7.10 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/124926.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

ImageIO
Available for: iPad Pro 12.9-inch 2nd generation, iPad Pro 10.5-inch,
and iPad 6th generation
Impact: Processing a...

Asterisk Security Release 20.15.2

Posted by Asterisk Development Team via Fulldisclosure on Sep 08

The Asterisk Development Team would like to announce security release
Asterisk 20.15.2.

The release artifacts are available for immediate download at
https://github.com/asterisk/asterisk/releases/tag/20.15.2
and
https://downloads.asterisk.org/pub/telephony/asterisk

Repository: https://github.com/asterisk/asterisk
Tag: 20.15.2

## Change Log for Release asterisk-20.15.2

### Links:

- [Full ChangeLog](...

Asterisk Security Release 21.10.2

Posted by Asterisk Development Team via Fulldisclosure on Sep 08

The Asterisk Development Team would like to announce security release
Asterisk 21.10.2.

The release artifacts are available for immediate download at
https://github.com/asterisk/asterisk/releases/tag/21.10.2
and
https://downloads.asterisk.org/pub/telephony/asterisk

Repository: https://github.com/asterisk/asterisk
Tag: 21.10.2

## Change Log for Release asterisk-21.10.2

### Links:

- [Full ChangeLog](...

Asterisk Security Release 18.26.4

Posted by Asterisk Development Team via Fulldisclosure on Sep 08

The Asterisk Development Team would like to announce security release
Asterisk 18.26.4.

The release artifacts are available for immediate download at
https://github.com/asterisk/asterisk/releases/tag/18.26.4
and
https://downloads.asterisk.org/pub/telephony/asterisk

Repository: https://github.com/asterisk/asterisk
Tag: 18.26.4

## Change Log for Release asterisk-18.26.4

### Links:

- [Full ChangeLog](...

Apple’s A17 Pro Chip: Critical Flaw Causes Dual Subsystem Failure & Forensic Log Loss

Posted by Joseph Goydish II via Fulldisclosure on Sep 08

TITLE:
APPLE'S A17 PRO SILICON FLAW: SHARED IΒ²C4 BUS BETWEEN SECURE ENCLAVE AND DIGITIZER CAUSES CASCADING SYSTEM FAILURE

SUMMARY:
This report discloses a CRITICAL HARDWARE FLAW in Apple’s A17 Pro chip (D84AP), affecting retail iPhone 15 Pro Max
devices. The flaw results from a SHARED IΒ²C4 BUS used by TWO CRITICAL SUBSYSTEMS:

- THE SECURE ENCLAVE PROCESSOR (SPU) – responsible for cryptographic operations and secure boot
- THE...

Multi-Protocol Traceroute

Posted by Usman Saeed via Fulldisclosure on Aug 18

#!/usr/bin/env python3
"""
Adaptive Multi-Protocol Traceroute

Author: Usman Saeed
email: u () defzero net<mailto:u () defzero net>
Website: www.defzero.net<http://www.defzero.net>

Description:
This script is a TTL-based path mapper that reveals routes even when classic traceroute is
filtered. The idea was that it would run in passes: first a conventional trace (ICMP Echo and
rotating TCP SYN ports) to capture the...

SEC Consult SA-20250728-0 :: Stored Cross-Site-Scripting in Optimizely Episerver CMS

Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Aug 18

Confidentiality class: Internal & Partner

SEC Consult Vulnerability Lab Security Advisory < publishing date 20250728-0 >
=======================================================================
title: Multiple Stored Cross-Site Scripting Vulnerabilities
product: Optimizely Episerver Content Management System (EPiServer.CMS.Core)
vulnerable version: Version 11.X: <11.21.4
Version 12.X:...

SEC Consult SA-20250807-0 :: Race Condition in Shopware Voucher Submission

Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Aug 18

Confidentiality class: Internal & Partner

SEC Consult Vulnerability Lab Security Advisory < publishing date 20250807-0 >
=======================================================================
title: Race Condition in Shopware Voucher Submission
product: Shopware 6
vulnerable version: v6.6.10.4
fixed version: No fixed version available yet
CVE number: CVE-2025-7954
impact: medium...

Insufficient Resource Allocation Limits in nopCommerce v4.10 and v4.80.3 Excel Import Functionality

Posted by Ron E on Aug 18

nopCommerce is vulnerable to Insufficient Resource Allocation Limits when
handling large Excel file imports. Although the application provides a
warning message recommending that users avoid importing more than 500–1,000
records at once due to memory constraints, the system does not enforce hard
limits on file size, record count, or concurrent imports.

An attacker can exploit this by uploading excessively large Excel files or
automating...

CSV Injection in nopcommerce v4.10 and 4.80.3

Posted by Ron E on Aug 18

nopCommerce versions v4.10 and v4.80.3 are vulnerable to *C*SV Injection
(Formula Injection) when exporting data to CSV. The application does not
properly sanitize user-supplied input before including it in CSV export
files.

An attacker can inject malicious spreadsheet formulas into fields that will
later be exported (for example, order details, product names, or customer
information). When the exported file is opened in spreadsheet software...

Insufficient Session Cookie Invalidation in nopCommerce v4.10 and 4.80.3

Posted by Ron E on Aug 18

nopCommerce v4.10 and 4.80.3 is vulnerable to Insufficient Invalidation of
Session Cookies. The application does not properly invalidate or expire
authentication cookies after logout or session termination.

An attacker who obtains a valid session cookie (e.g., via network
interception, XSS, or system compromise) can continue to use the cookie to
access privileged endpoints (such as /Admin) even after the legitimate user
has logged out. This flaw...
❌