Hossein Lotfi

@hosselot

Vulnerability researcher at Zero Day Initiative. 'A machine never faults. It reflects human faults... An engine shall never return.'

North
Vrijeme pridruživanja: listopad 2012.

Tweetovi

Blokirali ste korisnika/cu @hosselot

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @hosselot

  1. Prikvačeni tweet
    1. srp 2019.

    My new blog: Mozilla Firefox (versions 29 through 63) Select Element Use-after-free Vulnerability Details+Line by line PoC Analysis:

    Poništi
  2. proslijedio/la je Tweet

    To get set for Miami, exploits a SCADA bug submitted by and shows how you can too. See how he pops calc at

    Poništi
  3. 14. sij

    This Windows CryptoAPI Spoofing Vulnerability (CVE-2020-0601) is too good to be killed by someone like NSA. There should be a good reason they killed it. Maybe they noticed it is used by other players. Patch it if not late already:

    Poništi
  4. 13. sij
    Poništi
  5. 10. sij

    The fix removes overridden getAliasSet method to use the default behaviour (AliasSet::Any). This reminds me of fix for CVE-2019-9810, which used in Pwn2Own 2019. Refer to great blog for more information if interested:

    Poništi
  6. 10. sij

    Recent Firefox zero-day (used in targeted attacks in the wild) (CVE-2019-17026) mercurial changeset fix:

    Poništi
  7. proslijedio/la je Tweet

    We're excited to announce Vancouver 2020 with new categories and returning partners, & along with sponsor . More than $1,000,000 USD available - plus a Model 3! Details at

    Poništi
  8. 2. sij

    Good start of 2020 with an unpatched information disclosure vulnerability in Windows Media Player (ZDI-20-001):

    Poništi
  9. proslijedio/la je Tweet
    1. sij

    2020 is 0% complete.

    Poništi
  10. proslijedio/la je Tweet
    1. sij

    2019 is 100% complete! Thank you for following. Have a nice 2020!

    Poništi
  11. 31. pro 2019.

    Happy 2020 you all. It is going to be a good year.

    Poništi
  12. 23. pro 2019.

    Dear governments, do not spy on people directly: 1- Make vulnerable apps. 2- Compromise your target's device and spy. 3- If people find out about your campaign, patch exploited vulnerability. 4- Hype about how much you care about your users security. 5- Go to 1 or 2.

    Poništi
  13. proslijedio/la je Tweet

    In the final blog of our Top 5 bugs of 2019, details a privilege escalation via the core shell COM registrar object in .

    Poništi
  14. proslijedio/la je Tweet

    For Day 4 of our Top 5 bugs of 2019, details how the duo used a RegExp vuln in the infotainment system to win a Model 3 at this year.

    Poništi
  15. proslijedio/la je Tweet

    Day 3 of our Top 5 bugs of 2019 is a RCE we detailed back in March (CVE-2019-0604). Today, we look at the impact of that bug and the attacks seen in the wild.

    Poništi
  16. proslijedio/la je Tweet

    Day 2 of our Top 5 bugs for 2019 is an LPE in win32k.sys through indexed color palettes. The deep and thorough analysis is provided by Marcin Wiązowski, who reported the bug.

    Poništi
  17. proslijedio/la je Tweet

    In the 1st of our Top 5 bugs for 2019, takes a look at a sandbox escape in originally submitted to the program by . Read the details at

    Poništi
  18. 11. pro 2019.

    Bah, apparently the November 2019 patch Tuesday fixed one extra vulnerability reported by me: CVE-2019-1441: Microsoft Windows GDI EMF Parsing Integer Truncation Remote Code Execution Vulnerability

    Poništi
  19. 10. pro 2019.

    God bless Windows GDI for always being such a giver. And long time no see "Windows Media Player".

    Poništi
  20. 10. pro 2019.

    Well, the last patch Tuesday of 2019 fixed some more vulnerabilities reported by me: * 2 Windows GDI information disclosure vulnerabilities (CVE-2019-1465 and CVE-2019-1466) * 2 Windows Media Player information disclosure vulnerabilities (CVE-2019-1480 and CVE-2019-1481)

    Poništi
  21. 6. pro 2019.

    It is hard to believe that the "Terminator 2: Judgment Day" movie is almost 30 years old (made in 1991). It is still a great joy to watch it.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·