Medijski sadržaj
- Tweetovi
- Tweetovi i odgovori
- Medijski sadržaj, trenutna stranica.
-
As part of my continuous fuzzing, VIM recently fixed few crashes. [1] https://github.com/vim/vim/commit/ec66c41d84e574baf8009dbc0bd088d2bc5b2421 … [2] https://github.com/vim/vim/commit/0ff822d2ebf0d130516631734b00179ba8dd8251 …
#AFL#Fuzzingpic.twitter.com/OPxKfBfxmD
Prikaži ovu nit -
It was in draft for a long time, worth waiting. Thanks .
@GoogleVRPpic.twitter.com/JYDBtEkUUV
-
I've added a module in
@metasploit for RFI in Supra Smart Cloud TV. Thank you@wvuuuuuuuuuuuuu for your support and merging the module. https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/supra_smart_cloud_tv_rfi.rb …pic.twitter.com/lR7RjaxLdH
-
CVE-2019-12137: Typora - Code execution. https://www.exploit-db.com/exploits/46932 pic.twitter.com/JFzLDRIh3X
Prikaži ovu nit -
Added support for CVE-2019-3799 directory traversal with spring-cloud-config-server in
@metasploit Thank you@shellfail https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/springcloud_traversal.rb …pic.twitter.com/CQItBxLh3g
Prikaži ovu nit -
Evernote - Local file read to code execution. https://www.inputzero.io/2019/04/evernote-cve-2019-10038.html …
#InfoSecpic.twitter.com/0sFm2fay5Y -
I found SOP bypass in TrendMicro Dr. Safety, an updated build has released for same. https://esupport.trendmicro.com/en-us/home/pages/technical-support/1121933.aspx …
#infosec#SOPBypasspic.twitter.com/w8w4UOmsGp
-
-
I had a great start of 2019. Thank you
@offsectraining again
https://www.offensive-security.com/bug-bounty-program/ …
#SecondTime#FriendsOfOffsec#bugbountypic.twitter.com/Ykh93DiRHA
Prikaži ovu nit -
I just ported my first module in Emipre which gathers info about local system, users, domain information. https://github.com/EmpireProject/Empire/blob/dev/lib/modules/powershell/situational_awareness/host/hostrecon.py … cc:
@harmj0y@enigma0x3@424f424f@Killswitch_GUIpic.twitter.com/rp255RVfPp
-
A path traversal issue exits in mozilla pdf.js [Unpatched] https://www.inputzero.io/2018/11/path-traversal-mozilla.html …
#infosec#unpatched#latepostpic.twitter.com/lpbmuImaUE
Prikaži ovu nit -
Added support for CVE-2018-8120 in
@metasploit Thank you@_sinn3r for landing this
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/ms18_8120_win32k_privesc.rb …
#infosec#metasploitpic.twitter.com/q1860fTimf
-
-
Not in Vegas for
#defcon but, thank you@DEFCON_TV http://dctv.defcon.org Waiting for more track to stream#dc101#defcon26 cc:@defconpic.twitter.com/l1B9tDKnqR
-
bufferoverflow() in
#GNOME evolution - CVE-2018-12422 https://datarift.blogspot.com/2018/06/bufferoverflow-in-evolution-cve-2018-12422.html … cc:@p1ngfl0yd@hardw00t#infosecpic.twitter.com/ruWld6I7PU
-
-
A Phreak Attack - CVE-2018-11518, was assigned to legacy IVR systems. https://datarift.blogspot.in/2018/05/CVE-2018-11518-abusing-ivr-systems.html … cc: @virgil_cj
#infosec#0day#IVR#PhreakAttackpic.twitter.com/7wKkDbEIjRPrikaži ovu nit
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.