Subscribe via feed.
Posts under Privacy

Packet Storm Advisory 2013-0819-1 – Oracle Java BytePackedRaster.verify()

The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of “dataBitOffset” boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file

Tags: , ,

Packet Storm Exploit 2013-0819-1 – Oracle Java BytePackedRaster.verify() Signed Integer Overflow

The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of “dataBitOffset” boundary checks. This exploit code demonstrates remote code execution by popping calc.exe

Tags: ,

WikiLeaks posts 400 gigabytes of encrypted ‘insurance’ data online – RT (blog)

Posted by deepcore under Apple, blackberry, DDOS, facebook, m$, Privacy, Security, twitter, Wikileak (No Respond)

RT (blog) WikiLeaks posts 400 gigabytes of encrypted 'insurance' data online RT (blog) WikiLeaks has released a trove of encrypted “insurance” data on Twitter and Facebook.

Tags: , ,

Wikileaks Just Released A Massive ‘Insurance’ File That No One Can Open – Business Insider

Wikileaks Just Released A Massive 'Insurance' File That No One Can Open Business Insider You can download the files via torrent but since they are encrypted — and Wikileaks has not yet provided the key — you won't be able to open them. We can garner at least one thing of note from the file names alone: They probably have a very high … and more

Tags: , , ,

What Could Be In Wikileak’s Giant 349GB "Insurance" File? – Gizmodo

Posted by deepcore under Apple, facebook, m$, Privacy, Security, tools, twitter, Wikileak (No Respond)

What Could Be In Wikileak's Giant 349GB “Insurance” File? Gizmodo Wikileaks has stirred up its share of trouble in its day, but it might be up to something more.

Tags: , , ,

Packet Storm Advisory 2013-0813-1 – Oracle Java IntegerInterleavedRaster.verify()

The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of “dataOffsets[0]” boundary checks. This vulnerability allows for remote code execution

Tags: , , ,

Packet Storm Exploit 2013-0813-1 – Oracle Java IntegerInterleavedRaster.verify() Signed Integer Overflow

The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of “dataOffsets[0]” boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.

Tags: , ,

Packet Storm Advisory 0811-1 – Oracle Java storeImageArray()

Oracle Java versions prior to 7u25 suffer from an invalid array indexing vulnerability that exists within the native storeImageArray() function inside jre/bin/awt.dll. This vulnerability allows for remote code execution.

Tags: , ,

Oracle Java storeImageArray() Invalid Array Indexing Code Execution

Oracle Java versions prior to 7u25 suffer from an invalid array indexing vulnerability that exists within the native storeImageArray() function inside jre/bin/awt.dll.

Tags: , ,

Julian Assange, Politician, Wants To WikiLeak Australian Politics: Interview – Motherboard (blog)

Posted by deepcore under DDOS, facebook, m$, Privacy, twitter, Wikileak (No Respond)

Julian Assange, Politician, Wants To WikiLeak Australian Politics: Interview Motherboard (blog) Our visit coincided with the conviction of Bradley Manning, the young US Army private whose alleged espionage put WikiLeaks on the map. Assange spoke to us about political payback, his plans for freeing the most famous whistle-blower in history, and ..

Tags: , , , ,