Stumbled over this tweet sharing a "low severity bug worth reporting". It was deleted after I pointed out that this is NOT a vulnerability.
But the tweet is gone now, and some might still think this is a valid issue. So I decided to share it again to say: IT'S NOT!
#bugbountytips
@varseand@disclosedh1@geeknik You can exploit either through Web cache poisoning or Request Smuggling. Without that it is not exploitable. At least until @albinowax figures out different way.
We continue our work with @intel and @DellTech to enable the Data Confidence Fabric technology.
"The #Chrysalis upgrade is relevant to #ProjectAlvarium, which must annotate and score massive amounts of data in a fast, scalable, and secure manner." cio.com/article/361791…#IOTA
Starting a new series, going over the sudo vulnerability research step by step. It's kinda like "season 2" from my binary exploitation playlist.
liveoverflow.com/why-pick-sudo-…
Researching the MissingNo Glitch from Pokemon Read and Blue. Using "discovery fiction" as a method of learning.
We are tracing reads and writes during important actions to find the interesting memory areas.
youtube.com/watch?v=p8OBkt…
Kogoś trzeba było szybko zatrzymać, więc zatrzymali (i to wcześnie rano - czyżby o 6?) informatyka, który się pomylił. Pojęcie ryzyka zawodowego zyskuje na znaczeniu. tvn24.pl/polska/wyciek-…