Sony Playstation 4 versions prior to 6.72 ValidationMessage::buildBubbleTree() use-after-free webkit code execution proof of concept exploit.
383eac13c6365272cb888db6cc8227b50faebee2867ff741525ac888b1cc5c3b
FreeBSD Security Advisory - States in pf(4) let ICMP and ICMP6 packets pass if they have a packet in their payload matching an existing condition. pf(4) does not check if the outer ICMP or ICMP6 packet has the same destination IP as the source IP of the inner protocol packet. A maliciously crafted ICMP/ICMP6 packet could bypass the packet filter rules and be passed to a host that would otherwise be unavailable.
5658869886042ac484dc95cb6af84648e15ab1941fc781b833bc4d659efbb67a
FreeBSD Security Advisory - A bug in the pf(4) IPv6 fragment reassembly logic incorrectly uses the last extension header offset from the last received packet instead of from the first packet. Malicious IPv6 packets with different IPv6 extensions could cause a kernel panic or potentially a filtering rule bypass.
97bbcb3ce672debfe19dd8c848fe63f318427adee581b312031e315e30650a3a
Apple macOS version 10.13.5 local privilege escalation exploit.
941daba740ea0ba40899aea1ada256ba3b7160f9a918deb5f31281c172879522