Drupal < 8.6.10 / < 8.5.11 - REST Module RCE
https://sploitus.com/exploit?id=EDB-ID:46452
https://sploitus.com/exploit?id=EDB-ID:46452
Sploitus
💀 Exploit for Drupal < 8.6.10 / < 8.5.11 - REST Module Remote Code Execution 2019-6340
Exploit for Drupal < 8.6.10 / < 8.5.11 - REST Module Remote Code Execution 2019-6340 | Sploitus | Exploit & Hacktool Search Engine
Forwarded from r0 Crew (Channel)
Unc0ver Jailbreak has been released for iOS 12 .1.2 to iOS 12 with full functional Cydia. Unc0ver tool compatible with iOS 11 to 11.4.1 Jailbreak too.
Article: https://pangu8.com/jailbreak/unc0ver/
Release: https://github.com/pwn20wndstuff/Undecimus/releases
#ios #jailbreak #expdev #tool #darw1n
Article: https://pangu8.com/jailbreak/unc0ver/
Release: https://github.com/pwn20wndstuff/Undecimus/releases
#ios #jailbreak #expdev #tool #darw1n
Pangu8
Unc0ver Jailbreak [iOS 11 – iOS 18] – Pangu8
Download Unc0ver Jailbreak IPA for iOS 11- iOS 14.8, Uncover Virtual for iOS 15-iOS 15.8.3 or Unc0ver black edition for iOS 16 - iOS 18 using detailed guides
CVE-2019-6977 gdImageColorMatch in gd_color_match.c in the GD Graphics Library (aka LibGD) 2.2.5, as used in the imagecolormatch function in PHP (different versions), has a heap-based buffer overflow. This can be exploited by an attacker who is able to trigger imagecolormatch calls with crafted image data.
imagecolormatch() OOB Heap Write exploit: https://github.com/cfreal/exploits/tree/master/CVE-2019-6977-imagecolormatch
imagecolormatch() OOB Heap Write exploit: https://github.com/cfreal/exploits/tree/master/CVE-2019-6977-imagecolormatch
GitHub
exploits/CVE-2019-6977-imagecolormatch at master · cfreal/exploits
Some of my exploits. Contribute to cfreal/exploits development by creating an account on GitHub.
Well, how to find the venue (Belka, KPI):
https://www.bing.com/maps?v=2&pc=FACEBK&mid=8100&rtp=~pos.50.449511640085_30.455839633942_%D0%A1%D1%82%D1%83%D0%B4%D0%B5%D0%BD%D1%82%D1%81%D1%8C%D0%BA%D0%B8%D0%B9+%D0%BF%D1%80%D0%BE%D1%81%D1%82%D1%96%D1%80+Belka&cp=50.449511640085~30.455839633942&lvl=16&sty=r&rtop=0~0~0~&mode=D&FORM=FBKPL6&mkt=en-US&fbclid=IwAR2SJ09pzSEWHTR8sDDYdNZmIe0MaaOFzGudwNaezk_RmnRkejP069toD7A
https://www.bing.com/maps?v=2&pc=FACEBK&mid=8100&rtp=~pos.50.449511640085_30.455839633942_%D0%A1%D1%82%D1%83%D0%B4%D0%B5%D0%BD%D1%82%D1%81%D1%8C%D0%BA%D0%B8%D0%B9+%D0%BF%D1%80%D0%BE%D1%81%D1%82%D1%96%D1%80+Belka&cp=50.449511640085~30.455839633942&lvl=16&sty=r&rtop=0~0~0~&mode=D&FORM=FBKPL6&mkt=en-US&fbclid=IwAR2SJ09pzSEWHTR8sDDYdNZmIe0MaaOFzGudwNaezk_RmnRkejP069toD7A
Bing Maps
Map multiple locations, get transit/walking/driving directions, view live traffic conditions, plan trips, view satellite, aerial and street side imagery. Do more with Bing Maps.
BSidesKyiv 2019 CFP, https://goo.gl/forms/bIAI94Mz9Ak6VnSw2
Google Docs
BSidesKyiv 2019 CFP
Свершилось, W3C апрувнули WebAuthn :)
https://venturebeat.com/2019/03/04/w3c-approves-webauthn-as-the-web-standard-for-password-free-logins/
https://venturebeat.com/2019/03/04/w3c-approves-webauthn-as-the-web-standard-for-password-free-logins/
VentureBeat
W3C approves WebAuthn as the web standard for password-free logins
The World Wide Web Consortium (W3C) announced that the Web Authentication API (WebAuthn) is an official web standard for password-free logins on the web.