A malicious Jar file can bypass all OS X Gatekeeper warnings and protections, allowing a remote attacker to execute arbitrary unsigned code downloaded by the user. Java must be installed on the victim’s machine.
[papers] – Ghost Vulnerability CVE-2015-0235 White Paper
Ghost Vulnerability CVE-2015-0235 White Paper
[local] – McAfee Data Loss Prevention Endpoint – Arbitrary Write Privilege Escalation
McAfee Data Loss Prevention Endpoint – Arbitrary Write Privilege Escalation
[remote] – VSAT Sailor 900 – Remote Exploit
VSAT Sailor 900 – Remote Exploit
[local] – OS X < 10.10.x – Gatekeeper bypass Vulnerability
OS X < 10.10.x – Gatekeeper bypass Vulnerability
[local] – UniPDF 1.1 – Crash PoC (SEH overwritten)
UniPDF 1.1 – Crash PoC (SEH overwritten)