Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @mwulftange
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @mwulftange
-
Markus Wulftange proslijedio/la je Tweet
We're excited to support
#cidersecuritycon and its great cause taking place near our#mannheim office at the#technoseumhttps://twitter.com/CiderSecCon/status/1222411250849718272 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Markus Wulftange proslijedio/la je Tweet
Credits to
@mwulftange for finding and responsibly disclosing the SharePoint vuln, not much info was provided at time and it let orgs who patch get ahead of the issue.Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Markus Wulftange proslijedio/la je Tweet
Rumble in the pipe - a nice writeup about a
#privesc vuln in#tinywall by our teammate@frycoshttps://codewhitesec.blogspot.com/2020/01/cve-2019-19470-rumble-in-pipe.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Markus Wulftange proslijedio/la je Tweet
The CVE-2019-18935 is a severe insecure deserialization vulnerability affecting
#Telerik UI. Understand its impact + learn to safely patch your software in this post from@noperator: https://hubs.ly/H0mf7L-0 (With thanks to@mwulftange +@bao7uo)pic.twitter.com/qHc5XoKywA
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
We were also using https://github.com/mogwailabs/mjet of
@mogwailabs for exploitation. Worked well.Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
.
@cPanel's cpanel-dovecot-solr package before 8.2.0-1.cp1180 was also affected: https://documentation.cpanel.net/display/CL/cpanel-dovecot-solr+Change+Log …. I think we found and reported it at about the same time.
/cc @frycos@codewhitesechttps://twitter.com/pyn3rd/status/1196665594671558656 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Markus Wulftange proslijedio/la je Tweet
A detailed look at CVE-2019-1257: a
#SharePoint RCE bug originally reported by@mwulftange and patched last week.http://bit.ly/2m2UUHQHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Markus Wulftange proslijedio/la je Tweet
Struggling to exploit H2 DB? This may help: we found a new way utilizing native libraries and JNI. Kudos to
@mwulftange https://codewhitesec.blogspot.com/2019/08/exploit-h2-database-native-libraries-jni.html …pic.twitter.com/fbiXw7inY2Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Markus Wulftange proslijedio/la je Tweet
Let's break the dAM-SIng - a heap-based AMSI bypass for VBA. Follow
@danshaqfu of@codewhitesec into the rabbit hole in our latest blog post:https://codewhitesec.blogspot.com/2019/07/heap-based-amsi-bypass-in-vba.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Markus Wulftange proslijedio/la je Tweet
Critical vulns in
#FortiOS reversed & exploited by our colleagues@niph_ and@ramoliks - patch your#FortiOS asap and see the#bh2019 talk of@orange_8361 and@mehqq_ for details (tnx guys for the teaser that got us started)pic.twitter.com/TLLEbXKnJ4Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Markus Wulftange proslijedio/la je Tweet
Updated Telerik exploit https://github.com/bao7uo/RAU_crypto … after
@mwulftange great article on@codewhitesec blog. Also updated to work with latest versions in case of custom keys discovery. Thanks to@irsdl@gingeleski for feature inspiration. Props to@straight_blast@pwntester@olekmiroshHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Markus Wulftange proslijedio/la je Tweet
http://YSoSerial.Net has a new SharePoint plugin to generate payloads for CVE-2019-0604 and CVE-2018-8421
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Apparently, CVE-2019-0232 in Apache Tomcat was inspired by my
@codewhitesec blog post "Java and Command Line Injections in Windows": http://mail-archives.apache.org/mod_mbox/www-announce/201904.mbox/ajax/%3C13d878ec-5d49-c348-48d4-25a6c81b9605%40apache.org%3E …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Markus Wulftange proslijedio/la je Tweet
If you have SharePoint on your estate can you please poke your admins to make sure patches are applied, there is a POC for CVE-2019-0604 which will set you on
otherwise. For context check this ZDI post => https://www.thezdi.com/blog/2019/3/13/cve-2019-0604-details-of-a-microsoft-sharepoint-rce-vulnerability …pic.twitter.com/QIbUvl0m7t
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Markus Wulftange proslijedio/la je Tweet
People said our research on XmlSerializer had strong requirements and I kind of agree. Sharepoint joins DNN on high profile applications vulnerable to this RCE though so it may not be that rare
https://twitter.com/mwulftange/status/1105869256779096064 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
My write-up on the EntityInstanceIdEncoder RCE in SharePoint (CVE-2019-0604) has been published on the
@thezdi blog:https://twitter.com/thezdi/status/1105846921678213121 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Microsoft patched two RCE vulns I found in SharePoint: CVE-2019-0594 and CVE-2019-0604
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Markus Wulftange proslijedio/la je Tweet
The
@liferayfaces team has documented 2 simple mitigation methods for these vulnerabilities since no official fixes have been released: https://community.liferay.com/blogs/-/blogs/mitigating-richfaces-4-5-17-final-eol-vulnerabilities …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.