eboda (@eboda_) 's Twitter Profile
eboda

@eboda_

ID: 2692603118

calendar_today30-07-2014 11:18:01

607 Tweet

2,2K Followers

898 Following

Sonar (@sonarsource) 's Twitter Profile Photo

Code vulnerabilities allowed to take over the IT monitoring solution Icinga! Learn how our security researchers used a bug in the PHP engine itself to execute arbitrary code on Icinga Web 2 instances: blog.sonarsource.com/path-traversal… #appsec #security #vulnerability

Hexacon (@hexacon_fr) 's Twitter Profile Photo

💥 Brace yourselves, early bird tickets are coming! First come, first served 🗓️ Monday 13th June 12:00 CEST 💸 650€ 📢 The first accepted talks should be announced soon... #HEXACON2022

Charles Fol (@cfreal_) 's Twitter Profile Photo

These two CVEs (CVE-2022-31626, CVE-2022-31625) are remotely exploitable #PHP bugs that I'll present at TyphoonCon🌪️ later this month. Please update !

Hexacon (@hexacon_fr) 's Twitter Profile Photo

🔥 We are thrilled to announce our first sponsor! 🙏 Thank you Bugscale for helping us make this highly technical conference possible 🐞 To find out more about Bugscale: ➡️ bugscale.ch hexacon.fr/sponsors/ #HEXACON2022

🔥 We are thrilled to announce our first sponsor!

🙏 Thank you <a href="/bugscale/">Bugscale</a> for helping us make this highly technical conference possible

🐞 To find out more about Bugscale:
➡️ bugscale.ch

hexacon.fr/sponsors/

#HEXACON2022
Simon Scannell (@scannell_simon) 's Twitter Profile Photo

⚠️ Zimbra Mail pre-auth RCE via Path Traversal bug in unrar (CVE-2022-30333). This is probably my most impactful bug so far, especially after Zimbra has been the target of a 0day campaign likely conducted by a state actor. More details in this blog post: blog.sonarsource.com/zimbra-pre-aut…

⚠️ Zimbra Mail pre-auth RCE via Path Traversal bug in unrar (CVE-2022-30333).  This is probably my most impactful bug so far, especially after Zimbra has been the target of a 0day campaign likely conducted by a state actor. More details in this blog post: blog.sonarsource.com/zimbra-pre-aut…
Bugscale (@bugscale) 's Twitter Profile Photo

We're #hiring ! You can check out the job desc on our website: bugscale.ch/careers/ or you can also apply on LinkedIn: linkedin.com/jobs/view/3601…

Hexacon (@hexacon_fr) 's Twitter Profile Photo

🚨 Conference tickets are now on sale! 🚨 ⏱️ Early birds are in very limited supply ➡️ Register now! hexacon.fr/register/

Sonar Research (@sonar_research) 's Twitter Profile Photo

🔥Multiple XSS vulnerabilities in popular CMS Joomla! (CVE-2024-21726) 🔥 PHP bug could be used to bypass sanitization - We just disclosed the technical details behind the recent Joomla vulnerability: sonarsource.com/blog/joomla-mu…

🔥Multiple XSS vulnerabilities in popular CMS Joomla! (CVE-2024-21726) 🔥

PHP bug could be used to bypass sanitization - We just disclosed the technical details behind the recent Joomla vulnerability:

sonarsource.com/blog/joomla-mu…
Nick Percoco (@c7five) 's Twitter Profile Photo

Kraken Security Update: On June 9 2024, we received a Bug Bounty program alert from a security researcher. No specifics were initially disclosed, but their email claimed to find an “extremely critical” bug that allowed them to artificially inflate their balance on our platform.

Volodya (@volodiyah) 's Twitter Profile Photo

Here is a new blog post, where I wrote about (some of) my recent work with angr, including: - Adding support for Windows debug symbols - Collecting and visualizing real-time coverage - Improving debugging workflows plowsec.github.io/angr-introspec…

Orange Tsai  🍊 (@orange_8361) 's Twitter Profile Photo

Thrilled to release my latest research on Apache HTTP Server, revealing several architectural issues! blog.orange.tw/2024/08/confus… Highlights include: ⚡ Escaping from DocumentRoot to System Root ⚡ Bypassing built-in ACL/Auth with just a '?' ⚡ Turning XSS into RCE with legacy code

DARKNAVY (@darknavyorg) 's Twitter Profile Photo

Since the issue of CVE-2024-5274 is public now, we can finally release our research from months ago. This is a rare vulnerability in the V8 Parser module, and we were surprised to find that our exploit method coincidentally aligns with the ITW exploit😅 blog.darknavy.com/blog/cve_2024_…

iRunFar (@irunfar) 's Twitter Profile Photo

Vincent Bouillard of France wins the 2024 #UTMB in 19:54:23. This can only be called an incredible breakout race by a former track and field athlete turned trail ultrarunner who works in research and development for HOKA.

Vincent Bouillard of France wins the 2024 #UTMB in 19:54:23.

This can only be called an incredible breakout race by a former track and field athlete turned trail ultrarunner who works in research and development for HOKA.
Sean Heelan (@seanhn) 's Twitter Profile Photo

I wrote-up how I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation. Link to the blog post below 👇

Hexacon (@hexacon_fr) 's Twitter Profile Photo

🐞 Bugscale is thrilled to be sponsoring Hexacon again and we look forward to seeing everyone in Paris! Thank you Bugscale for your continued support 🙏

🐞 Bugscale is thrilled to be sponsoring Hexacon again and we look forward to seeing everyone in Paris!

Thank you <a href="/bugscale/">Bugscale</a> for your continued support 🙏
ϻг_ϻε (@steventseeley) 's Twitter Profile Photo

As it turns out, Orange Tsai 🍊 and I have more in common than I had thought! If you love old school PHP quirks and CTF tricks I recommend you read our articles: phrack.org/issues/72/5_md… phrack.org/issues/72/6_md…