信息源 | 时间 | ||
---|---|---|---|
Nicolas Krassas
|
dinosn | 原文
RT Jason Haddix: Another crypto hack due to "access" to systems. Sounds like web 2.0 to me ¯\_(ツ)_/¯ Crypto companies: invest heavily in web 2 secu... |
|
Nicolas Krassas
|
Dinosn | 原文
The PoC for the spring boot core RCE as it was published before, |
|
Rasta Mouse
|
_RastaMouse | 原文
Re @digininja The thought of 5-year old being alone in London is simply terrifying. |
|
phithon别跟路人甲BB
|
phithon别跟路人甲BB | 原文
低情商:封城 高情商:全域静态管理 |
|
Project Zero Bugs
|
ProjectZeroBugs | 原文
Chrome: heap-use-after-free in safe_browsing::ThreatDetails::OnReceivedThreatDOMDetails |
|
سعود العنزي
|
dmaral3noz | 原文
Re @Matrix0700 كفوك يالاسطورة الفال لك بالافضل والاعلى من هذي 💪🏻 |
|
سعود العنزي
|
dmaral3noz | 原文
Re @MH_alrashidi ياهلا بمحمد الفال لك ياصاحبي 👍🏻 |
|
سعود العنزي
|
dmaral3noz | 原文
Re @AbdulslamAlonzi ياهلا بالهيكس كله منور 💪🏻 |
|
سعود العنزي
|
dmaral3noz | 原文
Re @slv0d يابعد راسي يامشاري والابداع منك وفيك 👍🏻 ( الشانزليليه ) 😂 |
|
سعود العنزي
|
dmaral3noz | 原文
Re @xcode0x الفال لك يالشيخ بالاعلى والافضل منها 👍🏻 |
|
سعود العنزي
|
dmaral3noz | 原文
Re @mayhab511 ياهلا بالوافي الي ماتغيره السنين ، الفال لك يابو عتب بالافضل منها 👍🏻 |
|
vx-underground
|
vxunderground | 原文
Re @imn000f what |
|
vx-underground
|
vxunderground | 原文
A Java Springcore RCE 0day exploit has been leaked. It was leaked by a Chinese security researcher who, since sharing and/or leaking it, has deleted t... |
|
vx-underground
|
vxunderground | 原文
ContiLeaks did an interview with CNN. |
|
👑 OFJAAAH 👑
|
ofjaaah | 原文
Re @rodoassis @brutelogic sempre meu querido! Agradeço demais o seu tempo e dividir um pouco de conhecimento! Forte abraço mermão. |
|
👑 OFJAAAH 👑
|
ofjaaah | 原文
Re @twitsecuriter before moving to qsreplace you need to find what you want to pass. echo |
|
👑 OFJAAAH 👑
|
ofjaaah | 原文
Rapaaaziada!!! Sexta-feria estarei com @brutelogic @rodoassis falando sobre XSS e entre outros assuntos, para os alunos do introdução ao Recon as 19... |
|
Bank Security
|
Bank_Security | 原文
RT Daily Dark Web: Central Bank of #Tunisia hacked by Conti (1560 devices encrypted) #dailydarkweb #DarkWeb #darkwebmonitoring #DataBreaches |
|
Elon Musk
|
elonmusk | 原文
Re @JohnnaCrider1 Ok |
|
Elon Musk
|
elonmusk | 原文
Re @harsimranbansal Canada requires charging by the minute vs kWh. We’re working to get that changed. |
|
☣ KitPloit - Hacker Tools
|
KitPloit | 原文
Nimcrypt2 - .NET, PE, And Raw Shellcode Packer/Loader Writte... |
|
☣ KitPloit - Hacker Tools
|
KitPloit | 原文
Casper-Fs - A Custom Hidden Linux Kernel Module Generator. Each Module Works In The File System To Protect And Hide Secret Files |
|
Brute Logic
|
brutelogic | 原文
RT KNOXSS: #DidYouKnow #KNOXSS tests: - All URL or POST params (source/DOM) - URL fragment # - URL path /a/b/c - SQL error, XML, double enc & B64 It a... |
|
Brute Logic
|
brutelogic | 原文
RT 👑 OFJAAAH 👑: Rapaaaziada!!! Sexta-feria estarei com @brutelogic @rodoassis falando sobre XSS e entre outros assuntos, para os alunos do intro... |
|
Brute Logic
|
brutelogic | 原文
Re @xhzeem Thanks for mentioning this one and congratulations for finding that if it was you who crafted it. |
|
Brute Logic
|
brutelogic | 原文
Re @xhzeem Yeah, I've also used that trick against Akamai before your tweet as well as several other guys. But it doesn't work there anymore while the... |
|
Rodolfo Assis
|
rodoassis | 原文
Re @ofjaaah @brutelogic Sempre um prazer, meu amigo! 😉 |
|
Rodolfo Assis
|
rodoassis | 原文
Re @ofjaaah @brutelogic Tamo junto! 😀 |
|
Rodolfo Assis
|
rodoassis | 原文
Today we are celebrating the birthday of our beloved sons!!! 🥳🎉 NICOLAS (left) completed 2 years couple days ago while CÉSAR (right) completes ... |
|
CVE
|
CVEnew | 原文
CVE-2022-1155 Old sessions are not blocked by the login enable function. in GitHub repository snipe/snipe-it prior to 5.3.10. |
|
CVE
|
CVEnew | 原文
CVE-2022-1154 Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646. |
|
CVE
|
CVEnew | 原文
CVE-2022-24131 DouPHP v1.6 Release 20220121 is affected by Cross Site Scripting (XSS) through /admin/login.php in the background, which will lead to J... |
|
CVE
|
CVEnew | 原文
CVE-2022-1179 Non-Privilege User Can Created New Rule and Lead to Stored Cross Site Scripting in GitHub repository openemr/openemr prior to 6.0.0.4. |
|
CVE
|
CVEnew | 原文
CVE-2022-1181 Stored Cross Site Scripting in GitHub repository openemr/openemr prior to 6.0.0.2. |
|
CVE
|
CVEnew | 原文
CVE-2022-1178 Stored Cross Site Scripting in GitHub repository openemr/openemr prior to 6.0.0.4. |
|
CVE
|
CVEnew | 原文
CVE-2022-1180 Reflected Cross Site Scripting in GitHub repository openemr/openemr prior to 6.0.0.4. |
|
CVE
|
CVEnew | 原文
CVE-2022-1177 Accounting User Can Download Patient Reports in openemr in GitHub repository openemr/openemr prior to 6.1.0. |
|
CVE
|
CVEnew | 原文
CVE-2022-23869 In RuoYi v4.7.2 through the WebUI, user test1 does not have permission to reset the password of user test3, but the password of user te... |
|
CVE
|
CVEnew | 原文
CVE-2022-23868 RuoYi v4.7.2 contains a CSV injection vulnerability through ruoyi-admin when a victim opens .xlsx log file. |
|
Black Hat
|
BlackHatEvents | 原文
#BHASIA Arsenal "Kubesploit: A Post-Exploitation Framework, Focused on Containerized Environments" dives into Kubesploit, a post-exploitation HTTP/2 C... |
|
Rasta Mouse
|
_RastaMouse | 原文
Re @_xpn_ I can stop any time I want |
|
Rasta Mouse
|
_RastaMouse | 原文
Re @_xpn_ When you work from home, every hour is after hours. |
|
Rasta Mouse
|
_RastaMouse | 原文
Re @_xpn_ The ASMR category is where the action is really at... |
|
Rasta Mouse
|
_RastaMouse | 原文
ffs Twitter |
|
Rasta Mouse
|
_RastaMouse | 原文
Re @imn000f ThinkPad X1 |
|
Rasta Mouse
|
_RastaMouse | 原文
Re Gotta say, a 15” 2-in-1 laptop makes for a pretty baller eReader. |
|
Rasta Mouse
|
_RastaMouse | 原文
Re @dontkerBROastme @zodiacon Yeah, I'm pretty fucked lol. |
|
Rasta Mouse
|
_RastaMouse | 原文
Let's gooooooo @zodiacon |
|
Burp Suite
|
Burp_Suite | 原文
Re @boy_child_ Thanks! |
|
Burp Suite
|
Burp_Suite | 原文
Re @boy_child_ If you click and drag the resize function, do the request and response return to the window? Could you send us (support@portswigger.net... |