*Vulnerability Name – *Application is Vulnerable to Session Fixation
*Vulnerable URL: *www.fusionpbx.com
*Overview of the Vulnerability*
Session fixation is a security vulnerability that occurs when an attacker
sets or fixes a user’s session identifier, manipulating the authentication
process. Typically exploited in web applications, this vulnerability allows
the attacker to force a user’s session ID to a known value, granting…
Posted by Apple Product Security via Fulldisclosure on Mar 27
APPLE-SA-03-25-2024-3 macOS Ventura 13.6.6
macOS Ventura 13.6.6 addresses the following issues.
Information about the security content is also available at https://support.apple.com/kb/HT214095.
Apple maintains a Security Updates page at https://support.apple.com/HT201222 which lists recent
software updates with security advisories.
CoreMedia
Available for: macOS Ventura
Impact: Processing an image may lead to arbitrary code execution…
Posted by Apple Product Security via Fulldisclosure on Mar 27
APPLE-SA-03-25-2024-4 iOS 17.4.1 and iPadOS 17.4.1
iOS 17.4.1 and iPadOS 17.4.1 addresses the following issues.
Information about the security content is also available at https://support.apple.com/kb/HT214097.
Apple maintains a Security Updates page at https://support.apple.com/HT201222 which lists recent
software updates with security advisories.
CoreMedia
Available for: iPhone XS and later, iPad Pro 12.9-inch 2nd generation
and later, iPad…
Posted by Apple Product Security via Fulldisclosure on Mar 27
APPLE-SA-03-25-2024-5 iOS 16.7.7 and iPadOS 16.7.7
iOS 16.7.7 and iPadOS 16.7.7 addresses the following issues.
Information about the security content is also available at https://support.apple.com/kb/HT214098.
Apple maintains a Security Updates page at https://support.apple.com/HT201222 which lists recent
software updates with security advisories.
The util-linux wall command does not filter escape sequences from
command line arguments. The vulnerable code was introduced in
commit cdd3cc7fa4 (2013). Every version since has been
vulnerable.
1. CVE-2020-8006 Pre-Auth Stack Based Buffer Overflow
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H (10)
The server in Circontrol Raption through 5.11.2 has a pre-authentication
stack-based buffer overflow that can be exploited to gain run-time control
of the device as root.
When the server parses the HTTP headers and finds the Basic-Authentication
tag it will call a base64 decode function. This function…