• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

xnu

  1. 1

    Exploits XNU Data Race Remote Double-Free

    XNU suffers from a remote double-free vulnerability due to a data race in IPComp input path. View the full article
  2. 1

    Exploits XNU Stale Pointer Use-After-Free

    XNU suffers from a use-after-free vulnerability due to a stale pointer left by in6_pcbdetach. View the full article
  3. 1

    Exploits XNU stf_ioctl Bad Cast

    XNU suffers from a wild-read (and possible corruption) due to bad cast in stf_ioctl. View the full article
  4. 1

    Exploits XNU Unsafe Pidversion Increment During Execve

    XNU has an issue where pidversion increment during execve is unsafe. View the full article
  5. 1

    Exploits XNU Copy-On-Write Behavior Bypass

    XNU suffers from a copy-on-write behavior bypass via mount of user-owned filesystem image. View the full article
  6. 1

    Exploits XNU vm_map_copy Optimization Issue

    XNU vm_map_copy optimization which requires atomicity is not atomic. This violates the semantics of mach message OOL memory, and leads to TOCTOU issues which can lead to memory corruption. View the full article
  7. 1

    Exploits XNU copy-on-write Behavior Bypass

    XNU suffers from a copy-on-write behavior bypass via partial-page truncation of file. View the full article
  8. 1

    Exploits XNU POSIX Shared Memory Mapping Issue

    XNU POSIX has an issue where shared memory mapping have an incorrect maximum protection. View the full article
Back
Top