Secunia Security Advisory 43832
Secunia Security Advisory – A vulnerability has been reported in Apple iPhone iOS, which can be exploited by malicious people to compromise a vulnerable device.
Tags: Apple, exploit, secunia-security, SecuritySecunia Security Advisory – A vulnerability has been reported in Apple iPhone iOS, which can be exploited by malicious people to compromise a vulnerable device.
Tags: Apple, exploit, secunia-security, SecurityWikiLeak Pique: Mexico's Calderon Drives Out a US Ambassador Over Leaked Cables TIME (blog) When WikiLeaks released US diplomatic cables last fall expressing fears and criticism about the safety of Pakistan's nuclear weapons program, the Pakistani government largely shrugged. That's because its leaders understood that frank private discussion ..
Tags: calderon-drives, hacker, pakistani, safety, timeVSR identified a vulnerability in HFS+, a filesystem implemented in the OS X XNU kernel. HFS+ is the default filesystem in use on many installations of the Mac OS X operating system. By exploiting this vulnerability, an unprivileged user with local access to a machine using HFS+ may be able to read raw filesystem data, bypassing file permissions and resulting in information disclosure.
Tags: exploit, filesystem-data, VulnerabilityPaul Harrington of NGS Secure has discovered a high risk vulnerability in Mac OS X Image RAW. Multiple buffer overflow issues existed in Image RAW’s handling of Canon RAW images. Viewing a maliciously crafted Canon RAW image may result in an unexpected application termination or arbitrary code execution.
Tags: 10-6-through, arbitrary-code, buffer-overflow, imageDominic Chell of NGS Secure has discovered a High risk vulnerability in Mac OS X ImageIO. An integer overflow issue exists in ImageIO’s handling of JPEG-encoded TIFF images
Tags: 10-6-through, arbitrary-code, dominic-chell, image, issue-existsiDefense Security Advisory 03.21.11 -Remote exploitation of a memory corruption vulnerability in Apple Inc.’s OfficeImport framework could allow an attacker to execute arbitrary code with the privileges of the current user. The vulnerability occurs when parsing an Excel file with a certain maliciously constructed record.
Tags: Apple, exploit, recordZero Day Initiative Advisory 11-109 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari on the iPhone. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the support for parsing Office files.
Tags: Apple, exploit, Mobile, VulnerabilityZero Day Initiative Advisory 11-108 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mac OS X’s CFF Decoder. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file
Tags: decoder-user, exploit, the-application, VulnerabilityEx-chief rebuts Modi criticism of NHRC's '02 riot report Hindustan Times Gujarat Chief Minister Narendra Modi's allegation that the NHRC was biased against his government during the 2002 anti-Muslim riots — revealed in the leaked WikiLeak cables on Tuesday — drew a sharp rebuttal from the panel's chief during the period.
Tags: anonymous, during-the-2002, government, hindustan-times, wikileakCong demands BJP apology for raising WikiLeaks issue in House IBNLive.com PTI | 09:03 PM,Mar 22,2011 Natarajan said the issue of WikiLeaks was being used as a political tool by the opposition to divert attention from the real issues. Asked about the latest WikiLeaks cables revealing that in 2006, sensing his growing rise at ..
Tags: anonymous, growing, house