Published Vulnerabilities

Wed
22
Apr

Researcher discovers Zero-Day Vulnerability in Wordpress Plugin of Exploit DB

Researcher discovers Zero-Day Vulnerability in Wordpress Plugin of Exploit DB

The young security researcher paulos yibleo discovered a remote vulnerability in the offensive security exploit-db community.

The vulnerability occured in the blog service of the community. The offensive security team installed an application plugin for wordpress called "wp-rocket". The "wp-rocket" (wp-rocket.me) plugin is well known for unsecure programming mythology.

The security vulnerability that is remotly exploitable was located in the /wp-content/wprocketfolder/inc/front/process.php application file. The process.php file allows to request without authorization (pre-auth) $host controlled inputs.

Mon
02
Mar

Apple iOS 8.0 - 8.0.2 - Controls Re Auth Bypass Vulnerability

Apple iOS 8.0 - 8.0.2 - Controls Re Auth Bypass Vulnerability

Due to the last years we learned fast that glitches can result in a security problem for embed device systems. At  the beginning of the year a german core team researcher revealed information on how to permanently evade the controls to bypass with an app the pass code. The researcher used a combination of glitches and design errors in the phone ui of iOS to successful exploit the local issue. The issue has a minor severity then for example the emergency call issue of 2013 because a physical device by account access is required. (cvss 5.2)

A local pass code (code lock) bypass and glitch has been discovered in the Apple iOS v8.0 (12A365) mobile device system. The vulnerability allows to bypass or evade via glitch the regular pass code restriction of the embed iOS device system.

Pages

Subscribe to RSS - Published Vulnerabilities