Packet Storm Advisory 2013-0827-1 – Oracle Java ByteComponentRaster.verify()
					The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file                
																																	
												                
																								                
						
																    
Packet Storm Exploit 2013-0827-1 – Oracle Java ByteComponentRaster.verify() Memory Corruption
					The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.                
																																	
												                
																								                
						
																    
Mac OS X Sudo Password Bypass
					This Metasploit module gains a session with root permissions on versions of OS X with sudo binary vulnerable to CVE-2013-1775.                 
																																	
												                
																								                
						
																    
FBI Agent Claims Hacking Group Anonymous is on Lockdown
					FBI officials are claiming to have all but shut down hacker collective Anonymous because arrests have acted as a deterrent and freaked out hacktivists don’t trust each other.                
																																	
												                
																								                
						
																    
Đảng Wikileaks gặp rắc rối trong kế hoạch tranh cử – Đài Á Châu Tự Do
					 Đảng Wikileaks gặp rắc rối trong kế hoạch tranh cử Đ                
																																	
												                
																								                
						
																    
US solider jailed for 35 years in WikiLeaks case – ITV News
					 ITV News US solider jailed for 35 years in WikiLeaks case ITV News US soldier Bradley Manning was jailed for 35 years at a military court in Maryland.                 
																																	
												                
																								                
						
																    
Bradley Manning Sentence a Victory, Says WikiLeaks’ Julian Assange [VIDEO] – IBTimes.co.uk
					 IBTimes.co.uk Bradley Manning Sentence a Victory, Says WikiLeaks ' Julian Assange [VIDEO] IBTimes.co.uk Julian Assange has praised the 35-year prison sentence handed down to US Army intelligence whistleblower Bradley Manning as a victory.                 
																																	
												                
																								                
						
																    
Wikileaks : Bradley Manning condamné à 35 ans de prison – ZDNet
					 Wikileaks : Bradley Manning condamné                 
																																	
												                
																								                
						
																    
Key WikiLeaks Senate candidate quits due to lack of ‘democratic processes’ – ABC Online
					 International Business Times AU Key WikiLeaks Senate candidate quits due to lack of 'democratic processes' ABC Online The bid by WikiLeaks Party founder Julian Assange to win seats in the Senate has taken a blow, with a key candidate quitting because of a lack of transparency and accountability in the party. Author and ethicist, Leslie Cannold, is second on the ...                 
																																	
												                
																								                
						
																    
Packet Storm Advisory 2013-0819-1 – Oracle Java BytePackedRaster.verify()
					The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file