http://accsoft.cad.go.th/Black.html notified by Iranian_Dark_Coders_Team
http://yasothon.cad.go.th/Black.html
http://yasothon.cad.go.th/Black.html notified by Iranian_Dark_Coders_Team
Ecuador leader rebukes Assange for mocking Australian politicians – GlobalPost
Ecuador leader rebukes Assange for mocking Australian politicians GlobalPost Ecuadoran President Rafael Correa on Friday chastized WikiLeaks founder Julian Assange for making fun of Australian politicians in a video shot at his place of refuge in Ecuador's London embassy. “We have sent him a letter: he can campaign politically ..
Mac OS X 10.8.4 Local Privilege Escalation
Mac OS X versions 10.8.4 and below local root privilege escalation exploit written in Python.
Revelations From Snowden White House "Black Budget" Leak – Bustle
Revelations From Snowden White House “Black Budget” Leak Bustle The leak is unprecedented, and the Post certainly won't have made any friends in the White House by leaking it: like every WikiLeak -esque disclosure of private intelligence, it will invite criticism that giving terrorists knowledge of antiterrorism … and more
http://mkho.moph.go.th/mko/administrator/Dbuzz.gif
http://mkho.moph.go.th/mko/administrator/Dbuzz.gif notified by Dbuzz
Packet Storm Advisory 2013-0827-1 – Oracle Java ByteComponentRaster.verify()
The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of “dataOffsets[]” boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file
Packet Storm Exploit 2013-0827-1 – Oracle Java ByteComponentRaster.verify() Memory Corruption
The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of “dataOffsets[]” boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.
The First Rule of Spying on Your Allies Is You Don’t Get Caught Spying on Your … – Slate Magazine
Slate Magazine The First Rule of Spying on Your Allies Is You Don't Get Caught Spying on Your … Slate Magazine The new article also claims that NSA technicians have tapped into the U.N.'s internal video teleconferencing system. This adds to information about U.S.
Mac OS X Sudo Password Bypass
This Metasploit module gains a session with root permissions on versions of OS X with sudo binary vulnerable to CVE-2013-1775.