туита
- туита, текущата страница.
- Туитове и отговори
- Мултимедийно съдържание
Блокираш @scannell_simon
Наистина ли искаш да видиш тези туитове? Това няма да разблокира @scannell_simon
-
Закачен туит
Really happy to publish something again. I have to admit I'm proud of the info leak, it enabled the exploit to be 100% reliable. We might publish the exploit code soonhttps://twitter.com/the_secret_club/status/1393211695389188096 …
Благодаря. Twitter ще използва това, за да подобри хрониката ти. ОтмянаОтмяна -
Simon Scannell ретуитна
Our research team enjoyed a great
@hacktivityconf and@scannell_simon presented "A Common Bypass Pattern to Exploit Modern Web Apps". Stay tuned for the slides.#Hacktivity2021#appsechttps://twitter.com/hacktivityconf/status/1447490789882351618 …Благодаря. Twitter ще използва това, за да подобри хрониката ти. ОтмянаОтмяна -
Благодаря. Twitter ще използва това, за да подобри хрониката ти. ОтмянаОтмяна
-
Simon Scannell ретуитна
@scannell_simon will talk about A Common Bypass Pattern to Exploit Modern Web Apps at#Hacktivity2021. Make sure to get your ticket on time: https://bit.ly/2Y4aaHv pic.twitter.com/BbRMth6a7pБлагодаря. Twitter ще използва това, за да подобри хрониката ти. ОтмянаОтмяна -
Simon Scannell ретуитна
The plural of regex is regrets
Благодаря. Twitter ще използва това, за да подобри хрониката ти. ОтмянаОтмяна -
Simon Scannell ретуитна
MyBB fixed a Persistent XSS (CVE-2021-27279) in MyBB < 1.8.25 found by our researcher Igor Sak-Sakovskiy. RCE is possible when chained with CVE-2021-27890, reported by Simon Scannell & Carl Smith. Advisory: https://mybb.com/versions/1.8.25/ …pic.twitter.com/CYeN4grpDf
Показване на тази нишкаБлагодаря. Twitter ще използва това, за да подобри хрониката ти. ОтмянаОтмяна -
Simon Scannell ретуитна
Tired of hopping between boring
#BugBounty programs? We are looking for full-time#Java and#CSharp vulnerability researchers to join our R&D team and uncover impactful#security bugs in popular open-source projects: https://www.sonarsource.com/company/jobs/vulnerability-research …pic.twitter.com/LtfxbsL6gbБлагодаря. Twitter ще използва това, за да подобри хрониката ти. ОтмянаОтмяна -
Simon Scannell ретуитна
We are excited that our security researchers
@scannell_simon and@swapgs are honored with a nomination for this year's ... - Best Client-Side Bug (RCE through CS:GO) - Best Privilege Escalation Bug (CVE-2020-27194) - Most Under-Hyped Research (Composer)https://twitter.com/PwnieAwards/status/1420362071225556995 …Благодаря. Twitter ще използва това, за да подобри хрониката ти. ОтмянаОтмяна -
Simon Scannell ретуитна
So excited to finally release my blog post- Kernel Pwning with eBPF: a Love Story. I cover eBPF, the verifier, debugging, exploitation, mitigations and other cool findings! I do root cause analysis and exploit CVE-2021-3490 for LPE with PoC included.https://www.graplsecurity.com/post/kernel-pwning-with-ebpf-a-love-story …
Показване на тази нишкаБлагодаря. Twitter ще използва това, за да подобри хрониката ти. ОтмянаОтмяна -
Simon Scannell ретуитна
We discovered a
#Java and#JavaScript code vulnerability in Zimbra webmail that could enable attackers to steal all emails of an organization by sending one malicious email. Learn more in our new blog post: https://blog.sonarsource.com/zimbra-webmail-compromise-via-email …#appsec#infosecpic.twitter.com/B7Cfwdc1HnБлагодаря. Twitter ще използва това, за да подобри хрониката ти. ОтмянаОтмяна -
Really happy to have published something again, especially web stuff! pre-auth Stored XSS in email body + SSRFhttps://blog.sonarsource.com/zimbra-webmail-compromise-via-email …
Благодаря. Twitter ще използва това, за да подобри хрониката ти. ОтмянаОтмяна -
Simon Scannell ретуитна
Yet another Linux kernel exploitation write-up! CVE-2021-22555: Turning \x00\x00 into 10000$https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html …
Благодаря. Twitter ще използва това, за да подобри хрониката ти. ОтмянаОтмяна -
Simon Scannell ретуитна
My first blog post as a vulnerability researcher is up Check it out to learn about blind and error-based NoSQL injections in RocketChat that ended up giving me RCE!https://twitter.com/SonarSource/status/1394669606888001536 …
Благодаря. Twitter ще използва това, за да подобри хрониката ти. ОтмянаОтмяна -
Simon Scannell ретуитна
Just published the source code for both proxy and pocs https://github.com/brymko/csgo-exploits …https://twitter.com/the_secret_club/status/1393211695389188096 …
Благодаря. Twitter ще използва това, за да подобри хрониката ти. ОтмянаОтмяна -
Simon Scannell ретуитна
I've written multiple OSes, dozens of compilers, and even developed entirely new algorithms. I'm a high-school dropout.https://twitter.com/EmilyKager/status/1393223289233838082 …
Благодаря. Twitter ще използва това, за да подобри хрониката ти. ОтмянаОтмяна -
Simon Scannell ретуитна
XXE Vulnerability in
#WordPress <5.7.1: Learn what attackers were able to do and how to patch your#PHP8 code. https://blog.sonarsource.com/wordpress-xxe-security-vulnerability/?utm_source=twitter&utm_medium=social&utm_campaign=wordpress&utm_content=security&utm_term=mofu …#security#appsecpic.twitter.com/XIHysLAlqdБлагодаря. Twitter ще използва това, за да подобри хрониката ти. ОтмянаОтмяна -
Simon Scannell ретуитна
You can read about our work in the latest VICE articlehttps://www.vice.com/en/article/dyvgej/counter-strike-bug-allows-hackers-to-take-over-a-pc-with-a-steam-invite …
Благодаря. Twitter ще използва това, за да подобри хрониката ти. ОтмянаОтмяна -
Simon Scannell ретуитна
I wonder if it's possible to challenge H1 legally for enforcing unlimited NDA on those bug reports while never acting on them?
@k8em0 do you know of any precedent?https://twitter.com/the_secret_club/status/1381632980628692996 …Показване на тази нишкаБлагодаря. Twitter ще използва това, за да подобри хрониката ти. ОтмянаОтмяна -
Simon Scannell ретуитна
Valve ignoring security researchers is not just specific to the secret club. Here we see Bien Pham demonstrate his Remote Code Execution exploit that has not been patched for over a year.https://twitter.com/bienpnn/status/1381616325391384577 …
0:37Благодаря. Twitter ще използва това, за да подобри хрониката ти. ОтмянаОтмяна -
Simon Scannell ретуитна
Two years ago, slidybat reported a remote code execution affecting Team Fortress 2. It can be triggered by joining a community server. It has yet to be patched.pic.twitter.com/JqIQu18g3O
Показване на тази нишкаБлагодаря. Twitter ще използва това, за да подобри хрониката ти. ОтмянаОтмяна
Изглежда зареждането отнема известно време.
Twitter може да е претоварен или да изпитва моментно затруднение. Опитай отново или виж Twitter Status за повече информация.