The Twitter 5.0 application for iPhone grabs images over HTTP and due to this, allows for a man in the middle attack / image swap. Proof of concept included.
>> CATEGORY: facebook
Apple QuickTime versions 7.7.2 and below suffer from a buffer overflow vulnerability in the handling of TGA files.
Wordpress Facebook Survey v1 SQL Injection Vulnerability
Wordpress Facebook Survey v1 SQL Injection Vulnerability
Zero Day Initiative Advisory 12-185 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Mac OSX. Authentication is not required to exploit this vulnerability.
Guidelines for Pentesting a Joomla Based Site
The Spy Who Hacked Me The UCSD Guardian Online His mysteous force wages a secret war against MI6 using the anonymity of the Internet, with plenty of allusions to modern day cyberterrorism and WikiLeaks in tow. Bardem's golden blonde hair bears more than a passing resemblance to WikiLeak's …
The New York Review of Books (blog) Cambodian Foreign Minister Hor Nam Hong in Phnom Penh, August 6, 2010 The New York Review of Books (blog) Third, regarding a 2002 US Embassy cable released by WikiLeaks last summer, His Excellency Hor Nam Hong has already sent a letter of protest to US Secretary of State Hillary Clinton on 18 July, 2011.
Secunia Security Advisory – Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user’s system.
Apple Security Advisory 2012-11-07-1 – QuickTime version 7.7.3 is now available and addresses multiple buffer overflows, memory corruption, and use after free vulnerabilities.