Zero Day Initiative Advisory 10-253
Zero Day Initiative Advisory 10-253 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required in that a target must open a malicious media file or visit a malicious page. The specific flaw exists within the application's implementation of the LZW compression when opening a certain file format. The application will allocate a buffer for the image and then decompress image data into it. Due to explicitly trusting the decompressed data, a buffer overflow will occur. This can lead to memory corruption and code execution under the context of the application.
Researcher Releases Android Exploit In Webkit Browser Engine
And Android security hits the news...
ddosim v0.2 – Application Layer DDOS Simulator
DDOSIM simulates several zombie hosts (having...
V for Vendetta Hacker Strikes at Washington State University
An anonymous hacker wearing a Guy...
Facebook Do Not Do! 10 Tips About Facebook Security
Facebook has its advantages, but also...
Dozens of Bugs Found in One Version of Android Kernel
Security researchers found dozens of high...
Exploit Next Generation SQL Fingerprint (ESF) – MS-SQL Server Fingerprinting Tool
SQL Server fingerprinting can be a...