Apple CoreText libType1Scaler.dylib suffers from a heap out-of-bounds-write due to an integer overflow vulnerability in STOREWV othersubr.
5bc7d9095b5e3a443161d656caf0d98e618030349e3b02521fce505ffb28bfe4
Apple CoreText libFontParser.dylib suffers from a stack corruption vulnerability in the handling of /BlendDesignPositions Type 1 objects.
20846ff276b0918588c20eba4f03a51e239d0c24a7bc30e422ba7d6a2a943720
Apple CoreText libType1Scaler.dylib suffers from a heap buffer overflow vulnerability in the Counter Control Hints.
e9d0553c3318c8cfd5e3a7cef08c6780c862cd2e9728e3e931ac58bc5d0dd690
Apple CoreText libType1Scaler.dylib suffers from a memory disclosure vulnerability via an uninitialized transient array.
f0083ddd4710cae64924c74a0167cfc38f0711da70bd85eac021e889e40d7814
The XNU kernel suffers from a memory disclosure vulnerability in mach message trailers.
642f39fd92a5ac4ffb770427ffb354a2a9fadfb25d5b0622ea37837653fb0f84
The XNU kernel suffers from a type confusion vulnerability in turnstiles.
d3d2bb641fe186858d248f07b853338f4be5d90e81441c7f7abebd7540ae579c
Apple Safari is susceptible to a remote code execution vulnerability via an undefined othersubr in Type 1 fonts handled by libType1Scaler.dylib on macOS and iOS.
ee0df6f67552aebe8e8c91b5e13e7a4dc6342b9e701c512f4847cf4f5b91f7cc
A heap based buffer overflow exists in the sudo command line utility that can be exploited by a local attacker to gain elevated privileges. The vulnerability was introduced in July of 2011 and affects version 1.8.2 through 1.8.31p2 as well as 1.9.0 through 1.9.5p1 in their default configurations. The technique used by this implementation leverages the overflow to overwrite a service_user struct in memory to reference an attacker controlled library which results in it being loaded with the elevated privileges held by sudo.
cdf458fa2ff6a679afd1037bdb879758b301305b20f223b3aade629bb97b04bc
SEO Panel version 4.6.0 remote code execution exploit. Original discovery of code execution in this version is attributed to Daniel Monzon and Kiko Andreu in October of 2020.
32235f5af245cae264b5c3a9f586e7317257d23a3407ae0e6b1e9f54d275b9ac
PhreeBooks ERP version 5.2.3 remote code execution exploit. Original discovery of this vulnerability is attributed to Abdullah Celebi in April of 2019.
6318dca6517f810ccc72e6eda9d9b9465e83b02cd6a7e31fc0c1c37fe3f83e58
LiteSpeed Web Server Enterprise version 5.4.11 suffers from an authenticated remote command injection vulnerability.
3ba47cb0d0b0247ab02f85b865390f467999b58710524e0b2140b93cf1e7dd71