The Vulnerability Laboratory Research Team discovered a local file include vulnerability in the official Wireless Photo Transfer Mobile version 3.0 iOS application.
>> TAG: #ios
Apple Security Advisory 2015-05-06-1 – Safari 8.0.6, Safari 7.1.6, and Safari 6.2.6 are now available and address memory corruption, information compromise, and unauthorized access vulnerabilities.
Apple Security Advisory 2015-05-06-1 – Safari 8.0.6, Safari 7.1.6, and Safari 6.2.6 are now available and address memory corruption, information compromise, and unauthorized access vulnerabilities.
Apple IOS versions 8.0 through 8.0.2 suffer from a lock bypass vulnerability.
Local denial of service exploit for Mac OS X kernel versions prior to 10.10.3.
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a…
This Metasploit module exploits a hidden backdoor API in Apple’s Admin framework on Mac OS X to escalate privileges to root, dubbed Rootpipe. Tested on Yosemite 10.10.2 and should work…
WordPress Windows Desktop and iPhone Photo Uploader plugin suffers from a remote shell upload vulnerability.
Mac OS X rootpipe local proof of concept privilege escalation exploit.
Apple Security Advisory 2015-04-08-1 – Safari 8.0.5, Safari 7.1.5, and Safari 6.2.5 are now available and address information disclosure, code execution, certificate matching, and various other vulnerabilities.