Category: twitter

Appleexploitfacebookiphonem$OSX security toolsPrivacySecuritytoolstwitterXSS

Packet Storm Advisory 2013-0827-1 – Oracle Java ByteComponentRaster.verify()

The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file
Appleexploitfacebookiphonem$OSX security toolsPrivacySecuritytoolstwitterXSS

Packet Storm Exploit 2013-0827-1 – Oracle Java ByteComponentRaster.verify() Memory Corruption

The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.
AppleDDOSfacebookm$PrivacytoolstwitterWikileak

Key WikiLeaks Senate candidate quits due to lack of ‘democratic processes’ – ABC Online

International Business Times AU Key WikiLeaks Senate candidate quits due to lack of 'democratic processes' ABC Online The bid by WikiLeaks Party founder Julian Assange to win seats in the Senate has taken a blow, with a key candidate quitting because of a lack of transparency and accountability in the party. Author and ethicist, Leslie Cannold, is second on the ...
Appleexploitfacebookiphonem$OSX security toolsPrivacySecuritytoolstwitterXSS

Packet Storm Advisory 2013-0819-1 – Oracle Java BytePackedRaster.verify()

The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file