OS X Gatekeeper Bypass

A malicious Jar file can bypass all OS X Gatekeeper warnings and protections, allowing a remote attacker to execute arbitrary unsigned code downloaded by the user. Java must be installed on the victim’s machine.

[papers] – Ghost Vulnerability CVE-2015-0235 White Paper

Ghost Vulnerability CVE-2015-0235 White Paper

[local] – McAfee Data Loss Prevention Endpoint – Arbitrary Write Privilege Escalation

McAfee Data Loss Prevention Endpoint – Arbitrary Write Privilege Escalation

#1337day WordPress Video Gallery Arbitrary File Download Vulnerability [webapps #exploits #Vulnerability #0day #Exploit]
#1337day VSAT Sailor 900 – Remote Exploit [remote #exploits #0day #Exploit]
#1337day OS X < 10.10.x – Gatekeeper bypass Vulnerability CVE: 2014-8826 [remote #exploits #Vulnerability #0day #Exploit]
#1337day ClearSCADA – Remote Authentication Bypass Exploit [remote #exploits #0day #Exploit]
[remote] – VSAT Sailor 900 – Remote Exploit

VSAT Sailor 900 – Remote Exploit

[local] – OS X < 10.10.x – Gatekeeper bypass Vulnerability

OS X < 10.10.x – Gatekeeper bypass Vulnerability

[local] – UniPDF 1.1 – Crash PoC (SEH overwritten)

UniPDF 1.1 – Crash PoC (SEH overwritten)