MacOS bug bounty

MacOS bug bounty

255 bookmarks
Custom sorting
Analysis of CVE-2023-32439 in Safari
Analysis of CVE-2023-32439 in Safari
On June 21, 2023, Apple rolled out a security update for Safari, tagging CVE-2023-32439 as a DFG type confusion vulnerability. Let's analyze it!
·ai.moda·
Analysis of CVE-2023-32439 in Safari
po6ix/POC-for-CVE-2023-41993
po6ix/POC-for-CVE-2023-41993
Contribute to po6ix/POC-for-CVE-2023-41993 development by creating an account on GitHub.
·github.com·
po6ix/POC-for-CVE-2023-41993
MacOS "DirtyNIB" Vulnerability
MacOS "DirtyNIB" Vulnerability
New blog post is up which looks at an unpatched vulnerability in macOS which allows us to hijack entitlements from signed binaries.. aka.. DirtyNIB. https://t.co/B3M6kyssKa— Adam Chester 🏴‍☠️ (@_xpn_) October 5, 2023
·x.com·
MacOS "DirtyNIB" Vulnerability
CVE-2023-38571 - a macOS TCC bypass in Music and TV
CVE-2023-38571 - a macOS TCC bypass in Music and TV
This post is a writeup of CVE-2023-38571, a macOS TCC bypass bug I found. It was supposed to be unveiled in my upcoming talk: "Unexpected, Unreasonable, Unfixable: Filesystem Attacks on macOS" at OBTS v6, but I needed to cut some bugs out. This is another one of them. Background While …
·gergelykalman.com·
CVE-2023-38571 - a macOS TCC bypass in Music and TV
CVE-2023-32364 - a macOS sandbox escape by mounting
CVE-2023-32364 - a macOS sandbox escape by mounting
This post is a writeup of CVE-2023-32364, a macOS application sandbox escape bug I found. It was supposed to be unveiled in my upcoming talk: "Unexpected, Unreasonable, Unfixable: Filesystem Attacks on macOS" at OBTS v6, but I needed to cut some bugs out. This is one of them. macOS Sandboxing …
·gergelykalman.com·
CVE-2023-32364 - a macOS sandbox escape by mounting
Clandestine on Twitter
Clandestine on Twitter
Disable Sandbox Through Interposing | by ɪ • ᴅ ᴇ ᴀ ᴠ ꜱ ツ | Sep, 2023 | Medium https://t.co/WCCtOkcWJV— Clandestine (@akaclandestine) September 16, 2023
·x.com·
Clandestine on Twitter
ZZY3312/CVE-2023-32434
ZZY3312/CVE-2023-32434
Contribute to ZZY3312/CVE-2023-32434 development by creating an account on GitHub.
·github.com·
ZZY3312/CVE-2023-32434
CVE-2022-42864 - Diabolical Cookies
CVE-2022-42864 - Diabolical Cookies
iOS 16.2 and macOS Ventura 13.1 released just over a month ago, fixing an interesting vulnerability that I reported in IOHIDFamily. I would ...
·muirey03.blogspot.com·
CVE-2022-42864 - Diabolical Cookies
CVE-2020-9964 - An iOS infoleak
CVE-2020-9964 - An iOS infoleak
iOS 14 is now available to the public, and with it comes the iOS 14.0 security content update . One of the vulnerabilities you'll see listed...
·muirey03.blogspot.com·
CVE-2020-9964 - An iOS infoleak
macOS Atlassian Companion Remote Code Execution
macOS Atlassian Companion Remote Code Execution
Overview I identified a vulnerability that allowed executing code on victims’ machines after they click the Edit button on a Confluence page when Atlassian Companion is installed on macOS. The Atlassian Companion app enables users to edit Confluence files in their preferred desktop application, then save the file back to Confluence automatically. Source: https://confluence.atlassian.com/doc/administering-the-atlassian-companion-app-958456281.html Exploitation conditions Victim must have Atlassian Companion installed. Victim clicks on the Edit button in Confluence, so the malicious file is opened in the Atlassian Companion App on macOS (standard app behavior).
·wojciechregula.blog·
macOS Atlassian Companion Remote Code Execution
CVE-2022-32902: Patch One Issue and Introduce Two
CVE-2022-32902: Patch One Issue and Introduce Two
A year ago, I discovered a TCC-bypass issue in the system daemon service named com.apple.fontmover. Three months later, Apple addressed it as CVE-2022-32902. After checking how Apple addressed the issue, I found two new issues introduced by patching the issue. I reported them to Apple immediately and waited for about 9 months.
·jhftss.github.io·
CVE-2022-32902: Patch One Issue and Introduce Two