http://accsoft.cad.go.th/Black.html

http://accsoft.cad.go.th/Black.html notified by Iranian_Dark_Coders_Team

http://yasothon.cad.go.th/Black.html

http://yasothon.cad.go.th/Black.html notified by Iranian_Dark_Coders_Team

Ecuador leader rebukes Assange for mocking Australian politicians – GlobalPost

Ecuador leader rebukes Assange for mocking Australian politicians GlobalPost Ecuadoran President Rafael Correa on Friday chastized WikiLeaks founder Julian Assange for making fun of Australian politicians in a video shot at his place of refuge in Ecuador's London embassy. “We have sent him a letter: he can campaign politically ..

Mac OS X 10.8.4 Local Privilege Escalation

Mac OS X versions 10.8.4 and below local root privilege escalation exploit written in Python.

Revelations From Snowden White House "Black Budget" Leak – Bustle

Revelations From Snowden White House “Black Budget” Leak Bustle The leak is unprecedented, and the Post certainly won't have made any friends in the White House by leaking it: like every WikiLeak -esque disclosure of private intelligence, it will invite criticism that giving terrorists knowledge of antiterrorism … and more

http://mkho.moph.go.th/mko/administrator/Dbuzz.gif

http://mkho.moph.go.th/mko/administrator/Dbuzz.gif notified by Dbuzz

Packet Storm Advisory 2013-0827-1 – Oracle Java ByteComponentRaster.verify()

The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of “dataOffsets[]” boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file

Packet Storm Exploit 2013-0827-1 – Oracle Java ByteComponentRaster.verify() Memory Corruption

The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of “dataOffsets[]” boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.

The First Rule of Spying on Your Allies Is You Don’t Get Caught Spying on Your … – Slate Magazine

Slate Magazine The First Rule of Spying on Your Allies Is You Don't Get Caught Spying on Your … Slate Magazine The new article also claims that NSA technicians have tapped into the U.N.'s internal video teleconferencing system. This adds to information about U.S.

Mac OS X Sudo Password Bypass

This Metasploit module gains a session with root permissions on versions of OS X with sudo binary vulnerable to CVE-2013-1775.