Money.pl Afera WikiLeak . Bradley Manning prosi o ułaskawienie Money.pl Bradley Manning, informator demaskatorskiego portalu WikiLeaks , skazany niedawno na 35 lat więzienia, zwrócił się do prezydenta Baracka Obamy z prośbą o ułaskawienie – poinformował wczoraj na Twitterze jego adwokat. Podczas procesu w Fort Meade …
>> CATEGORY: Apple
A heap memory buffer overflow vulnerability exists within the WebKit’s JavaScriptCore JSArray::sort(…) method.
A heap memory buffer overflow vulnerability exists within the WebKit’s JavaScriptCore JSArray::sort(…) method. The exploit for this vulnerability is javascript code which shows how to use it for memory corruption of internal JS objects (Unit32Array and etc.) and subsequent arbitrary code execution (custom ARM/x64 payloads can be pasted into the JS code). This exploit affects Apple Safari version 6.0.1 for iOS 6.0 and OS X 10.7/8.
Ecuador leader rebukes Assange for mocking Australian politicians GlobalPost Ecuadoran President Rafael Correa on Friday chastized WikiLeaks founder Julian Assange for making fun of Australian politicians in a video shot at his place of refuge in Ecuador's London embassy. “We have sent him a letter: he can campaign politically ..
Mac OS X versions 10.8.4 and below local root privilege escalation exploit written in Python.
Revelations From Snowden White House “Black Budget” Leak Bustle The leak is unprecedented, and the Post certainly won't have made any friends in the White House by leaking it: like every WikiLeak -esque disclosure of private intelligence, it will invite criticism that giving terrorists knowledge of antiterrorism … and more
The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of “dataOffsets[]” boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file
The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of “dataOffsets[]” boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.
This Metasploit module gains a session with root permissions on versions of OS X with sudo binary vulnerable to CVE-2013-1775.
FBI officials are claiming to have all but shut down hacker collective Anonymous because arrests have acted as a deterrent and freaked out hacktivists don’t trust each other.