This issue is fixed in Safari 15.5, macOS High Sierra 10.13.1. It may be possible to use social engineering techniques to trick
Safari
The vulnerability exists due to the Ingesting Service exposing a user-controlled Path variable to the application. An attacker can leverage this to append arbitrary file
This issue can be exploited by an attacker by passing the following request to the targeted Apache server:
POST /cgi-bin/setTracerouteCfg HTTP/1.0 Host:
The issue is addressed by installing the latest software updates. An out-of-bounds read issue was discovered in the caching of font assets. This issue may
This could then lead to the disclosure of passwords or other sensitive data. To reduce the likelihood of this happening, 1Password apps and integrations are