Subscribe via feed.
Posts under tools

Apple Security Advisory 2013-09-06-1

Apple Security Advisory 2013-09-06-1 – AirPort Base Station Firmware Update 7.6.4 is now available and addresses a security issue. An associated client may be able to cause an unexpected base station system termination.

Tags: , ,

Julian Assange’s WikiLeaks Party Underwhelms Everyone With Australian … – Business Insider

Business Insider Julian Assange's WikiLeaks Party Underwhelms Everyone With Australian … Business Insider While the votes in the Australian election are still coming in, it looks early enough to say that conservative Tony Abbott has trounced liberal Kevin Rudd — and that Julian Assange's specially formed Wikileaks Party may not have done very well at all … Australian election: Landslide victory for Abbott, Assange may miss out on …

Tags: , , , ,

Packet Storm Advisory 2013-0903-1 – Apple Safari Heap Buffer Overflow

A heap memory buffer overflow vulnerability exists within the WebKit’s JavaScriptCore JSArray::sort(…) method.

Tags: , ,

Packet Storm Exploit 2013-0903-1 – Apple Safari Heap Buffer Overflow

A heap memory buffer overflow vulnerability exists within the WebKit’s JavaScriptCore JSArray::sort(…) method. The exploit for this vulnerability is javascript code which shows how to use it for memory corruption of internal JS objects (Unit32Array and etc.) and subsequent arbitrary code execution (custom ARM/x64 payloads can be pasted into the JS code). This exploit affects Apple Safari version 6.0.1 for iOS 6.0 and OS X 10.7/8.

Tags: , ,

Mac OS X 10.8.4 Local Privilege Escalation

Mac OS X versions 10.8.4 and below local root privilege escalation exploit written in Python.

Tags: , ,

Packet Storm Advisory 2013-0827-1 – Oracle Java ByteComponentRaster.verify()

The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of “dataOffsets[]” boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file

Tags: , ,

Packet Storm Exploit 2013-0827-1 – Oracle Java ByteComponentRaster.verify() Memory Corruption

The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of “dataOffsets[]” boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.

Tags: , , , ,

Mac OS X Sudo Password Bypass

This Metasploit module gains a session with root permissions on versions of OS X with sudo binary vulnerable to CVE-2013-1775.

Tags: , ,

Prison will not be kind to Chelsea Manning – Telegraph.co.uk

Posted by deepcore under DDOS, m$, tools, Wikileak (No Respond)

Telegraph.co.uk Prison will not be kind to Chelsea Manning Telegraph.co.uk “I am Chelsea Manning.” It's the simplest of statements, the most uncomplicated of claims. A name, an introduction, no more no less

Tags: , ,

Đảng Wikileaks gặp rắc rối trong kế hoạch tranh cử – Đài Á Châu Tự Do

Posted by deepcore under DDOS, facebook, m$, Privacy, tools, twitter, Wikileak (No Respond)

Đảng Wikileaks gặp rắc rối trong kế hoạch tranh cử Đ

Tags: , , ,