Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @peles_o
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @peles_o
-
Or Peles proslijedio/la je Tweet
Read how our researchers are helping secure
#OpenSource projects by discovering zero-day#vulnerabilities in the Lighttpd web server, the Live555 Media Library and a#Linux driver for the Realtek’s RTL8189ES Wi-Fi chip. http://bit.ly/2QvtNzT pic.twitter.com/V8b1rN16PH
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Peles proslijedio/la je Tweet
Our latest research here at
@VDOOSecurity by@peles_o, showcasing the significant cyber threats on connected physical security products#iot#iotsecurity https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
My detailed writeup on our newly discovered vulnerabilities in Foscam cameras that lead to a remote unauthenticated root shell. CVE-2018-6830, CVE-2018-6831, CVE-2018-6832https://blog.vdoo.com/2018/06/06/vdoo-has-found-major-vulnerabilities-in-foscam-cameras/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Peles proslijedio/la je Tweet
First batch of Huawei mobile pwn2own vulnerabilities fixed. Only time we needed an arbitrary delete primitive as part of a exploit chain :) Detailed write-up to follow at a later stage!http://www.huawei.com/uk/psirt/security-advisories/huawei-sa-20171120-01-hwreader-en …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Peles proslijedio/la je Tweet
We review some
#javadeser vulnerabilities in Android and showed how to find them using QL, these include CVE-2014-7911(@tehjh), CVE-2015-3825 (@peles_o and@roeehay), CVE-2017-411/412(@laginimaineb) and a new one CVE-2017-0871: https://lgtm.com/blog/android_deserialization …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Peles proslijedio/la je Tweet
[CVE-2017-0510] Critical
#Vulnerability: Attacking#Nexus 9 with Malicious Headphones#android#netsechttps://alephsecurity.com/2017/03/08/nexus9-fiq-debugger/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Peles proslijedio/la je Tweet
@ihackbanme@jduck This is how we bypassed ASLR for Stagefright: http://tinyurl.com/h4deqjgHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Peles proslijedio/la je Tweet
My talk about Android serialization vulnerabilities has been accepted to RSA Conference '16. See you in SF!
@peles_oHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Peles proslijedio/la je Tweet
Our
#woot15 slides of "One Class to Rule Them All" (CVE-2015-3825) are now online. https://www.usenix.org/conference/woot15/workshop-program/presentation/peles …@peles_oHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Peles proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Or Peles proslijedio/la je Tweet
Stagefright is still exploitable on 950+ million Android devices. Read the latest on our blog https://blog.exodusintel.com/2015/08/13/stagefright-mission-accomplished …
#droidsec#stagefrightHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Peles proslijedio/la je Tweet
nasty part is that "Serializable" is inherited from the superclass of the superclass (->X509Certificate->Certificate->Serializable)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
New Android Deserialization Vuln (CVE-2015-3825) and Exploit Details, with
@roeehay https://securityintelligence.com/one-class-to-rule-them-all-new-android-serialization-vulnerability-gives-underprivileged-apps-super-status/#.Vci0q2UnAZR.twitter … via@ibmsecurityHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Peles proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Or Peles proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Or Peles proslijedio/la je Tweet
Just uploaded the very final
#WOOT15 paper. See you in D.C.! Exciting stuff!@peles_o@USENIXSecurity@IBMSecurity@ibmxforceHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Peles proslijedio/la je Tweet
WOOT WOOT
#WOOT15 Third year in a row to present at#usenix#woot!@peles_o@USENIXSecurityHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Peles proslijedio/la je Tweet
Small writeup from last month about an in-the-wild exploit with partial EMET bypass codehttp://researchcenter.paloaltonetworks.com/2014/11/addressing-cve-2014-6332-swf-exploit/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Peles proslijedio/la je Tweet
DroppedIn: New Vulnerability Discovered in Dropbox SDK for Android (CVE-2014-8889): http://securityintelligence.com/droppedin-remotely-exploitable-vulnerability-in-the-dropbox-sdk-for-android/#.VP_3Bz2FmbJ.twitter …
@ibmsecurityHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Peles proslijedio/la je Tweet
My bit about Exploitation in Google Chrome: http://researchcenter.paloaltonetworks.com/2014/12/google-chrome-exploitation-case-study/ …
@PaloAltoNtwksHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.