Rezultati pretraživanja
  1. prije 5 sati

    if OpenSMTPD was a rugby match ...Gilles would have scored 7 tries and converted them, but missed a tackle and one try against the team. hell of a scoreline and contribution... Thanks for your huge commitment and great contribution to in Merci Mon Amis

  2. I'll take a break then work on other projects which are less stressful and that are more compatible with my new life. keeps a special place in my heart and I will continue helping as I can.

    Prikaži ovu nit
  3. I've been the maintainer of for the last +10 years. During that time, I took some very good decisions and some very bad decisions, I also wrote some very cool code and some shitty bugs. I've decided to resign today from this role and be a simple contributor.

    Prikaži ovu nit
  4. The mitigations discussed in my article after the CVE on were implemented for some and are either discussed or being implemented for others. It sucks, shit happens, this is the life of software.

    Prikaži ovu nit
  5. prije 16 sati

    Serious Security – How ‘special case’ code blew a hole in : now before you receive a…

  6. prije 20 sati

    Admins: patch your implementations, if you have them. There's a remote code execution vuln now in play.

  7. 3. velj

    nice writeup and response/dissection of the bug discoverd by

  8. 1. velj
  9. 31. sij
    Prikaži ovu nit
  10. 30. sij

    More excellent work by Qualys. command injection (CVE-2020-7247) Here's a rudimentary local root exploit for OpenBSD.

  11. 30. sij

    Remotely Exploitable Root Vulnerability In Disclosed. You absolutely have to upgrade to OpenSMTPD 6.6.2p1 if you are running a e-mail server using OpenSMTPD. OpenSMTPD is a default on and it is also available on and *BSDs).

  12. 30. sij
  13. "To overcome these limitations, we drew inspiration from the Morris worm"

  14. 30. sij

    Patch Remote Code Execution Vulnerability (CVE-2020-7247)

  15. 29. sij

    This is seriously critical, allowing remote code execution. Check the blog post to see how detecting, assessing, monitoring and prioritizing the remediation, empowering your operational effic…

  16. 29. sij

    How to detect and remediate the remote code execution vulnerability (CVE-2020-7247) discovered by Qualys

  17. 29. sij
  18. 29. sij

    I just pushed patched to edge and v3.11. Packages should be available on mirrors in few minutes. If you're running OpenSMTPD 6.6.1p1, upgrade immediately!

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.