Tag: facebook

Appleexploitfacebookiphonem$OSX security toolsPrivacySecuritytoolstwitterXSS

Packet Storm Exploit 2013-0827-1 – Oracle Java ByteComponentRaster.verify() Memory Corruption

The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.
AppleDDOSfacebookm$PrivacytoolstwitterWikileak

Key WikiLeaks Senate candidate quits due to lack of ‘democratic processes’ – ABC Online

International Business Times AU Key WikiLeaks Senate candidate quits due to lack of 'democratic processes' ABC Online The bid by WikiLeaks Party founder Julian Assange to win seats in the Senate has taken a blow, with a key candidate quitting because of a lack of transparency and accountability in the party. Author and ethicist, Leslie Cannold, is second on the ...
Appleexploitfacebookiphonem$OSX security toolsPrivacySecuritytoolstwitterXSS

Packet Storm Advisory 2013-0819-1 – Oracle Java BytePackedRaster.verify()

The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file
AndroidApplebankingblackberryfacebookiphonem$PrivacySecuritysmartphonesoftwaretoolstwitterWikileak

Wikileaks Just Released A Massive ‘Insurance’ File That No One Can Open – Business Insider

Wikileaks Just Released A Massive 'Insurance' File That No One Can Open Business Insider You can download the files via torrent but since they are encrypted — and Wikileaks has not yet provided the key — you won't be able to open them. We can garner at least one thing of note from the file names alone: They probably have a very high ... and more
Appleexploitfacebookiphonem$OSX security toolsPrivacySecuritytoolstwitterXSS

Packet Storm Exploit 2013-0813-1 – Oracle Java IntegerInterleavedRaster.verify() Signed Integer Overflow

The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataOffsets[0]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.
DDOSfacebookm$PrivacytwitterWikileak

Julian Assange, Politician, Wants To WikiLeak Australian Politics: Interview – Motherboard (blog)

Julian Assange, Politician, Wants To WikiLeak Australian Politics: Interview Motherboard (blog) Our visit coincided with the conviction of Bradley Manning, the young US Army private whose alleged espionage put WikiLeaks on the map. Assange spoke to us about political payback, his plans for freeing the most famous whistle-blower in history, and ..