Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
More Stories
USN-7340-1: OpenVPN vulnerabilities
It was discovered that OpenVPN did not perform proper input validation when generating a TLS key under certain configuration, which...
USN-7338-1: CRaC JDK 17 vulnerabilities
Andy Boothe discovered that the Networking component of CRaC JDK 17 did not properly handle access under certain circumstances. An...
USN-7339-1: CRaC JDK 21 vulnerabilities
Andy Boothe discovered that the Networking component of CRaC JDK 21 did not properly handle access under certain circumstances. An...
USN-7337-1: LibreOffice vulnerability
It was discovered that LibreOffice incorrectly handled Office URI Schemes. If a user or automated system were tricked into opening...
USN-7299-2: X.Org X Server vulnerabilities
USN-7299-1 fixed several vulnerabilities in X.Org. This update provides the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS....
thunderbird-128.8.0-1.fc41
FEDORA-2025-bd6664e83b Packages in this update: thunderbird-128.8.0-1.fc41 Update description: Update to 128.8.0 https://www.mozilla.org/en-US/security/advisories/mfsa2025-18/ https://www.thunderbird.net/en-US/thunderbird/128.8.0esr/releasenotes/ Read More