Tweetovi

Blokirali ste korisnika/cu @fariskhi

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @fariskhi

  1. 18. ruj 2019.
    Poništi
  2. proslijedio/la je Tweet
    31. svi 2019.
    Odgovor korisniku/ci

    Thank you Alisa and ZDI for the report. ZDI-CAN-8296 & ZDI-CAN-8495 are tracked as and . ZDI-CAN-8296 was fixed in the nJS 0.3.2 release, and ZDI-CAN-8495 will be fixed in 0.3.3. Neither bug appears to be generally exploitable.

    Poništi
  3. 3. lip 2019.

    My writeup for Facebook CTF 2019 hardest web problem (1000pts, solved by only 4 teams during contest), "hr_admin_module". Thanks for nice challenges!

    Poništi
  4. proslijedio/la je Tweet
    3. lip 2019.

    LOL it turned out that Google's CTF team won Facebook's CTF (by solving ALL the challenges btw)!! And now they are trolling the scoreboard by redirecting users to their Google CTF website... (We finished 5th btw by solving 27/33 challenges.)

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    11. svi 2019.

    Ladies and Gentlemen: The saddest and funniest testament to American bigotry we've ever seen in our data.

    Poništi
  6. proslijedio/la je Tweet
    15. tra 2019.

    Hai teman-teman! Pilpres tinggal dua hari lagi nih. Apakah kamu sudah yakin dengan pilihan politikmu? Cari tahu kecocokanmu dengan program & gagasan kedua Paslon dengan mengisi kuis kami di ! Bantu share juga ya ❤️

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    27. ožu 2019.

    Hey Red Teams! Wanna see physical security measures? Badges? Code snippets, applications used? Passwords typed and more? Then enjoy the trend of interns filming and sharing their daily routine of working in tech companies.

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    5. ožu 2019.

    "Google is aware of reports that an exploit for CVE-2019-5786 exists in the wild." -- (another discovery by )

    Poništi
  9. 19. velj 2019.

    What make this worse is, we can embed the GET request to "host/[path]/checkScriptCompile?value=" with iframe because that URL is not protected with x-frame-options. So we can just trick an authenticated user to visit our web page to pwn the Jenkins inside isolated network!

    Poništi
  10. 10. velj 2019.
    Poništi
  11. proslijedio/la je Tweet
    28. pro 2018.

    Thread: there are countless urban legends and misconceptions about the practices of tech companies such as Google and Facebook. In my experience, they take extremely good care of your data; they guard it with zeal that's unmatched by most other players in the industry. (1/9)

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    9. sij 2019.

    Facebook is launching BountyCon, a 2 day bug bounty conference in Singapore in March - Details on how to be invited at

    Poništi
  13. 21. sij 2019.
    Poništi
  14. 17. sij 2019.

    Update for a critical security vulnerability in Drupal that I reported

    Poništi
  15. proslijedio/la je Tweet

    Fact: Wild otters clean, scrub & exfoliate their skin daily...It feels good & gives them a healthy glow. 😂

    Poništi
  16. proslijedio/la je Tweet

    Self-described titles that make me cringe: - Guru - Expert - Visionary - Evangelist - ICO Advisor - Thought leader - Chief Story Teller - Instagram influencer

    Poništi
  17. proslijedio/la je Tweet
    2. sij 2019.

    # Best New Year gift for myself :) VM escape again! This time it's qemu. Both guest and host are Ubuntu 18.04.1 with the default configuration of qemu. I exploited it with a single bug. If it's possible, I'll release the exploit and details after the fixing.

    Poništi
  18. 2. sij 2019.

    Found CVE-2018-1000888, object injection/RCE vuln in PEAR Archive_Tar version 1.4.3 and earlier; used by several popular projects like Drupal and OwnCloud.

    Poništi
  19. proslijedio/la je Tweet
    27. pro 2018.

    CVE-2018-1000888 PEAR Archive_Tar version 1.4.3 and earlier contains a CWE-502, CWE-915 vulnerability in the Archive_Tar class. There are several file operations with `$v_header['filename']` as parameter (such as file_exists, ...

    Poništi
  20. 24. pro 2018.

    So many pending CVE registration, either directly reported by vendor or by me. What happened? 🤔

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·