Posted by Dave Aitel via Dailydave on Apr 01
[image: image.png]Posted by Julian Horoszkiewicz via Fulldisclosure on Mar 28
Vulnerability summary: Local Privilege Escalation from regular user to SYSTEM, via conhost.exe hijacking triggered byPosted by Tomi Tuominen via Dailydave on Mar 28
Dear Daily Dave,Posted by YOGESH BHANDAGE on Mar 27
*Vulnerability Name - *Application is Vulnerable to Session FixationPosted by Apple Product Security via Fulldisclosure on Mar 27
APPLE-SA-03-25-2024-1 Safari 17.4.1Posted by Apple Product Security via Fulldisclosure on Mar 27
APPLE-SA-03-25-2024-2 macOS Sonoma 14.4.1Posted by Apple Product Security via Fulldisclosure on Mar 27
APPLE-SA-03-25-2024-3 macOS Ventura 13.6.6Posted by Apple Product Security via Fulldisclosure on Mar 27
APPLE-SA-03-25-2024-4 iOS 17.4.1 and iPadOS 17.4.1Posted by Apple Product Security via Fulldisclosure on Mar 27
APPLE-SA-03-25-2024-5 iOS 16.7.7 and iPadOS 16.7.7Posted by Apple Product Security via Fulldisclosure on Mar 27
APPLE-SA-03-25-2024-6 visionOS 1.1.1Posted by Skyler Ferrante (RIT Student) via Fulldisclosure on Mar 27
Wall-Escape (CVE-2024-28085)Posted by malvuln on Mar 27
Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024Posted by Dariusz G on Mar 27
Circontrol EV Charger vulnerabilities.Posted by Artur Janicki via Fulldisclosure on Mar 27
[APOLOGIES FOR CROSS-POSTING]Posted by Dave Aitel via Dailydave on Mar 24
There seem to be a lot of people who think the problem with cyber securityPosted by malvuln on Mar 19
Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024Posted by Michal Zalewski via Dailydave on Mar 06
Not really different from prototyping on the Linux kernel or thePosted by Konrads Klints via Dailydave on Mar 06
Windows XP and Windows 2003 partial source code is out there on github. With such a rich corpus of known