Posted by deepcore under
Apple,
exploit,
facebook,
iphone,
m$,
OSX security tools,
Privacy,
Security,
tools,
twitter,
XSS (
No Respond)
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.
Tags:
facebook,
Security,
tools,
Vulnerability
Posted by deepcore under
Apple,
exploit,
facebook,
iphone,
m$,
OSX security tools,
Privacy,
Security,
software,
tools,
twitter,
XSS (
No Respond)
Lua-Programming Language version 1.6 for iOS suffers from a remote file upload vulnerability.
Tags:
exploit,
facebook,
twitter
Posted by deepcore under
Apple,
exploit,
facebook,
iphone,
m$,
OSX security tools,
Privacy,
Security,
software,
tools,
twitter,
XSS (
No Respond)
Apple Security Advisory 2013-09-06-1 – AirPort Base Station Firmware Update 7.6.4 is now available and addresses a security issue. An associated client may be able to cause an unexpected base station system termination.
Tags:
Apple,
exploit,
xss
Posted by deepcore under
Apple,
exploit,
facebook,
iphone,
m$,
OSX security tools,
Privacy,
Security,
tools,
twitter,
XSS (
No Respond)
A heap memory buffer overflow vulnerability exists within the WebKit’s JavaScriptCore JSArray::sort(…) method.
Tags:
Security,
tools,
twitter
Posted by deepcore under
Apple,
exploit,
facebook,
iphone,
m$,
OSX security tools,
Privacy,
Security,
tools,
twitter,
XSS (
No Respond)
A heap memory buffer overflow vulnerability exists within the WebKit’s JavaScriptCore JSArray::sort(…) method. The exploit for this vulnerability is javascript code which shows how to use it for memory corruption of internal JS objects (Unit32Array and etc.) and subsequent arbitrary code execution (custom ARM/x64 payloads can be pasted into the JS code). This exploit affects Apple Safari version 6.0.1 for iOS 6.0 and OS X 10.7/8.
Tags:
iphone,
javascript,
tools
Posted by deepcore under
Apple,
exploit,
facebook,
iphone,
m$,
OSX security tools,
Privacy,
Security,
tools,
twitter,
XSS (
No Respond)
Mac OS X versions 10.8.4 and below local root privilege escalation exploit written in Python.
Tags:
exploit,
Security,
twitter
Posted by deepcore under
Apple,
exploit,
facebook,
iphone,
m$,
OSX security tools,
Privacy,
Security,
tools,
twitter,
XSS (
No Respond)
The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of “dataOffsets[]” boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file
Tags:
exploit,
facebook,
ubuntu
Posted by deepcore under
Apple,
exploit,
facebook,
iphone,
m$,
OSX security tools,
Privacy,
Security,
tools,
twitter,
XSS (
No Respond)
The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of “dataOffsets[]” boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.
Tags:
Apple,
exploit,
facebook,
Vulnerability,
xss
Posted by deepcore under
Apple,
exploit,
facebook,
iphone,
m$,
OSX security tools,
Privacy,
Security,
tools,
twitter,
XSS (
No Respond)
This Metasploit module gains a session with root permissions on versions of OS X with sudo binary vulnerable to CVE-2013-1775.
Tags:
python,
tools,
twitter
Posted by deepcore under
Apple,
exploit,
facebook,
iphone,
m$,
OSX security tools,
Privacy,
Security,
tools,
twitter,
XSS (
No Respond)
The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of “dataBitOffset” boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file
Tags:
facebook,
javascript,
Security