Subscribe via feed.
Posts under twitter

WikiLeak’s Julian Assange suffering from chronic lung infection due to house … – Tech Digest

Bangkok Post WikiLeak's Julian Assange suffering from chronic lung infection due to house … Tech Digest Celebrities such as Lady Gaga, MIA and Vivienne Westwood have all visited Assange to show their support for the WikiLeaks cause, with supporters claiming the allegations against Assange are a conspiracy designed to undermine WikiLeak's ability to root ..

Tags: , , , ,

Apple QuickTime 7.7.2 MIME Type Buffer Overflow

This Metasploit module exploits a buffer overflow in Apple QuickTime 7.7.2. The stack based overflow occurs when processing a malformed Content-Type header. The module has been tested successfully on Safari 5.1.7 and 5.0.7 on Windows XP SP3.

Tags: , , ,

Apple WGT Dictionnaire 1.3 Script Code Injection

Apple WGT Dictionnaire version 1.3 suffers from a script code injection vulnerability.

Tags: , , ,

Apple QuickTime 7.7.2 TeXML Style Element font-table Field Stack Buffer Overflow

This Metasploit module exploits a vulnerability found in Apple QuickTime.

Tags: , ,

Sunday Roundup – Huffington Post (blog)

Posted by deepcore under DDOS, facebook, m$, twitter, Wikileak (No Respond)

Sunday Roundup Huffington Post (blog) Apart from small caches of WMD found in Iraq (according to WikiLeak docs) “capability” was reason enough to take down the Terror Master of Iraq and end his menacing reign.

Tags: , , , ,

Twitter 5.0 Eavesdropping Proof Of Concept

The Twitter 5.0 application for iPhone grabs images over HTTP and due to this, allows for a man in the middle attack / image swap. Proof of concept included.

Tags: , ,

Apple QuickTime 7.7.2 Buffer Overflow

Apple QuickTime versions 7.7.2 and below suffer from a buffer overflow vulnerability in the handling of TGA files.

Tags: , , , ,

Zero Day Initiative Advisory 12-185

Zero Day Initiative Advisory 12-185 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Mac OSX. Authentication is not required to exploit this vulnerability.

Tags: , , , ,

[papers] – Guidelines for Pentesting a Joomla Based Site

Posted by deepcore under exploit, facebook, m$, Security, tools, twitter, XSS (No Respond)

Guidelines for Pentesting a Joomla Based Site

Tags: , , , ,

The Spy Who Hacked Me – The UCSD Guardian Online

Posted by deepcore under DDOS, facebook, m$, tools, twitter, Wikileak (No Respond)

The Spy Who Hacked Me The UCSD Guardian Online His mysteous force wages a secret war against MI6 using the anonymity of the Internet, with plenty of allusions to modern day cyberterrorism and WikiLeaks in tow. Bardem's golden blonde hair bears more than a passing resemblance to WikiLeak's …

Tags: , , , ,