Felipe Veas (@fjv_cl) 's Twitter Profile
Felipe Veas

@fjv_cl

ID: 708622069068603392

calendar_today12-03-2016 11:54:01

15 Tweet

133 Takipçi

246 Takip Edilen

CVE (@cvenew) 's Twitter Profile Photo

CVE-2020-8438 Ruckus ZoneFlex R500 104.0.0.0.1347 devices allow an authenticated attacker to execute arbitrary OS commands via the hidden /forms/nslookupHandler form, as demonstrated by the nslookuptarget=|cat${IFS} substring. cve.mitre.org/cgi-bin/cvenam…

CVE (@cvenew) 's Twitter Profile Photo

CVE-2020-8946 Netis WF2471 v1.2.30142 devices allow an authenticated attacker to execute arbitrary OS commands via shell metacharacters in the /cgi-bin-igd/sys_log_clean.cgi log_3g_type parameter. cve.mitre.org/cgi-bin/cvenam…

Adam Zeloof (@azzeloof@mastodon.online) (@azzeloof) 's Twitter Profile Photo

Presenting the least useful Pi Hat ever- the Raspberry Pi Zero RF Modulator. The answer to the question nobody was asking: “How can I display my raspberry Pi Zero on an antique TV?”

Presenting the least useful Pi Hat ever- the Raspberry Pi Zero RF Modulator. The answer to the question nobody was asking: “How can I display my raspberry Pi Zero on an antique TV?”
f4d3 (@f4d3_cl) 's Twitter Profile Photo

Here's my #writeup of an #XXE bug, exploited in more than one way, Really hope that this helps anyone! f4d3.io/xxe_wild/ cntr0llz.com Thanks to Cntr0llz, STÖK ✌️, Felipe Veas, Mataya, and everyone who keeps crushing it! #bugbounty

Cntr0llz (@cntr0llz) 's Twitter Profile Photo

Con gran orgullos nos complace anunciar la obtención de su certificación OSCP a la integrante de nuestro equipo nb . Felicitaciones máquina🦊🏴‍☠️ !!!

Con gran orgullos nos complace anunciar la obtención de su certificación OSCP a la integrante de nuestro equipo <a href="/n4t_cl/">nb</a> . Felicitaciones máquina🦊🏴‍☠️ !!!
🥝🏳️‍🌈 Benjamin Delpy (@gentilkiwi) 's Twitter Profile Photo

Great #patchtuesday Microsoft, but did you not forgot something for #printnightmare? 🤔 Still SYSTEM from standard user... (I may have missed something, but #mimikatz🥝mimispool library still loads... 🤷‍♂️)