Subscribe via feed.
Archive for August, 2013

http://accsoft.cad.go.th/Black.html

Posted by deepcore under defacement (No Respond)

http://accsoft.cad.go.th/Black.html notified by Iranian_Dark_Coders_Team

Tags: , , ,

http://yasothon.cad.go.th/Black.html

Posted by deepcore under defacement (No Respond)

http://yasothon.cad.go.th/Black.html notified by Iranian_Dark_Coders_Team

Tags: , , ,

Ecuador leader rebukes Assange for mocking Australian politicians – GlobalPost

Posted by deepcore under facebook, iphone, m$, Privacy, Security, twitter, Wikileak (No Respond)

Ecuador leader rebukes Assange for mocking Australian politicians GlobalPost Ecuadoran President Rafael Correa on Friday chastized WikiLeaks founder Julian Assange for making fun of Australian politicians in a video shot at his place of refuge in Ecuador's London embassy. “We have sent him a letter: he can campaign politically ..

Tags: , , , ,

Mac OS X 10.8.4 Local Privilege Escalation

Mac OS X versions 10.8.4 and below local root privilege escalation exploit written in Python.

Tags: , ,

Revelations From Snowden White House "Black Budget" Leak – Bustle

Revelations From Snowden White House “Black Budget” Leak Bustle The leak is unprecedented, and the Post certainly won't have made any friends in the White House by leaking it: like every WikiLeak -esque disclosure of private intelligence, it will invite criticism that giving terrorists knowledge of antiterrorism … and more

Tags: , , ,

http://mkho.moph.go.th/mko/administrator/Dbuzz.gif

Posted by deepcore under defacement (No Respond)

http://mkho.moph.go.th/mko/administrator/Dbuzz.gif notified by Dbuzz

Tags: , ,

Packet Storm Advisory 2013-0827-1 – Oracle Java ByteComponentRaster.verify()

The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of “dataOffsets[]” boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file

Tags: , ,

Packet Storm Exploit 2013-0827-1 – Oracle Java ByteComponentRaster.verify() Memory Corruption

The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of “dataOffsets[]” boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.

Tags: , , , ,

The First Rule of Spying on Your Allies Is You Don’t Get Caught Spying on Your … – Slate Magazine

Posted by deepcore under DDOS, facebook, m$, Privacy, Wikileak (No Respond)

Slate Magazine The First Rule of Spying on Your Allies Is You Don't Get Caught Spying on Your … Slate Magazine The new article also claims that NSA technicians have tapped into the U.N.'s internal video teleconferencing system. This adds to information about U.S.

Tags: ,

Mac OS X Sudo Password Bypass

This Metasploit module gains a session with root permissions on versions of OS X with sudo binary vulnerable to CVE-2013-1775.

Tags: , ,