Twitter 5.0 Eavesdropping Proof Of Concept
The Twitter 5.0 application for iPhone grabs images over HTTP and due to this, allows for a man in the middle attack / image swap. Proof of concept included.
Apple QuickTime 7.7.2 Buffer Overflow
Apple QuickTime versions 7.7.2 and below suffer from a buffer overflow vulnerability in the handling of TGA files.
[webapps] – WordPress Facebook Survey v1 SQL Injection Vulnerability
Wordpress Facebook Survey v1 SQL Injection Vulnerability
[webapps] – WordPress Facebook Survey v1 SQL Injection Vulnerability
Wordpress Facebook Survey v1 SQL Injection Vulnerability
Zero Day Initiative Advisory 12-185
Zero Day Initiative Advisory 12-185 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Mac OSX. Authentication is not required to exploit this vulnerability.
[papers] – Guidelines for Pentesting a Joomla Based Site
Guidelines for Pentesting a Joomla Based Site
The Spy Who Hacked Me – The UCSD Guardian Online
The Spy Who Hacked Me The UCSD Guardian Online His mysteous force wages a secret war against MI6 using the anonymity of the Internet, with plenty of allusions to modern day cyberterrorism and WikiLeaks in tow. Bardem's golden blonde hair bears more than a passing resemblance to WikiLeak's ...
Cambodian Foreign Minister Hor Nam Hong in Phnom Penh, August 6, 2010 – The New York Review of Books (blog)
The New York Review of Books (blog) Cambodian Foreign Minister Hor Nam Hong in Phnom Penh, August 6, 2010 The New York Review of Books (blog) Third, regarding a 2002 US Embassy cable released by WikiLeaks last summer, His Excellency Hor Nam Hong has already sent a letter of protest to US Secretary of State Hillary Clinton on 18 July, 2011.
Secunia Security Advisory 51226
Secunia Security Advisory - Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.