Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @chengjia4574
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @chengjia4574
-
I just ported exploit of Jann Horn's vuln CVE-2019-13272 to aarch64:https://github.com/jiayy/android_vuln_poc-exp/tree/master/EXP-CVE-2019-13272-aarch64 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
it is an amazing vuln
@tehjh and I got an idea when I learn your vuln that maybe the name 'ptracer_cred' can be changed to be sth like ' ptracelinkcreater_cred', when link is created by PTRACE_ATTACH,it == tracer's cred, when link created by PTRACE_TRACEME, it == tracee's credhttps://twitter.com/ProjectZeroBugs/status/1151143478715285504 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
jiayy proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
jiayy proslijedio/la je Tweet
slides for Facetime vulnerabilities available at http://i.blackhat.com/USA-19/Thursday/us-19-Huang-Towards-Discovering-Remote-Code-Execution-Vulnerabilities-In-Apple-FaceTime.pdf … and slides for iPhone XS kernel vulnerabilities available at http://i.blackhat.com/USA-19/Thursday/us-19-Wang-Attacking-IPhone-XS-Max.pdf … pls enjoy!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
jiayy proslijedio/la je Tweet
Project Zero blog: "The Fully Remote Attack Surface of the iPhone" by Natalie Silvanovich (
@natashenka) - https://googleprojectzero.blogspot.com/2019/08/the-fully-remote-attack-surface-of.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
jiayy proslijedio/la je Tweet
Two Google Project Zero researchers have just dumped details about five (of six) exploits for "interactionless" iOS attacks. The bugs are worth collectively between $5 million and $10 million -- if they would have been sold on the exploit black market. https://www.zdnet.com/article/google-researchers-disclose-exploits-for-interactionless-ios-attacks/ …pic.twitter.com/7ZVDYtg1a8
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
jiayy proslijedio/la je Tweet
PoC for Android CVE-2019-2107 RCE - the payload can be executed by simply watching a video
#MobileSecurity#AndroidSecurityhttps://github.com/marcinguy/CVE-2019-2107 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
jiayy proslijedio/la je Tweet
VM escape exploit for CVE-2019-6778 in QEMU. I'm too lazy to write an English version writeup, sorry for the inconvenience
https://github.com/Kira-cxy/qemu-vm-escape …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
jiayy proslijedio/la je Tweet
Google on Android: “Use-after-free (UAF), integer overflows, and out of bounds (OOB) reads/writes comprise 90% of vulnerabilities with OOB being the most common.” https://security.googleblog.com/2019/05/queue-hardening-enhancements.html …
#memoryunsafetyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
jiayy proslijedio/la je Tweet
Linux kernel v5.0 was released last week! I'm excited about arm64's read-only linear mapping, per-task stack canaries for arm and arm64, top-byte-ignore on arm64, the ongoing marking of implicit-fallthroughs, and the continuing conversions to refcount_t https://outflux.net/blog/archives/2019/03/12/security-things-in-linux-v5-0/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
jiayy proslijedio/la je Tweet
Taking control of
#VMware through UHCI. In part 1 of his analysis,@abdhariri looks at the bug used by@fluoroacetate during the last#Pwn2Ownhttp://bit.ly/2J5gmGxHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
jiayy proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
jiayy proslijedio/la je Tweet
Among the Top 5 researchers of
@Qualcomm Technologies' Vulnerability Rewards Program#bugbounty , two@chengjia4574@jianqiangzhao are from 360 IceSword Lab. Congrats!@pjf40490912 Hard work pays off! https://www.qualcomm.com/news/onq/2019/01/16/inside-qualcomm-technologies-vulnerability-rewards-program …pic.twitter.com/bDj4KZWWuG
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Thanks the
@Qualcomm vulnerability rewards program, very happy to be one of the top 5 https://www.qualcomm.com/news/onq/2019/01/16/inside-qualcomm-technologies-vulnerability-rewards-program …pic.twitter.com/GQFW80kyF2
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
great job from IceSword Lab !!
@rthhh17 ,@pjf40490912https://twitter.com/360CoreSec/status/1080651252445241346 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
jiayy proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
jiayy proslijedio/la je Tweet
A security-heavy
#arm64 Xmas gift in mainline:#armv8.3 pointer authentication in userspace, per-thread stack canaries in the kernel, removal of writable aliases of executable mappings by default & base support for secure boot w/ kexec.@nullmodem @kriiku https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5694cecdb092656a822287a6691aa7ce668c8160 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.