bolha.us is one of the many independent Mastodon servers you can use to participate in the fediverse.
We're a Brazilian IT Community. We love IT/DevOps/Cloud, but we also love to talk about life, the universe, and more. | Nós somos uma comunidade de TI Brasileira, gostamos de Dev/DevOps/Cloud e mais!

Server stats:

254
active users

#Exploit

2 posts2 participants0 posts today
packet storm<p>compop.ca 3.5.3 Arbitrary Code Execution <a href="https://packetstorm.news/files/190562" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">packetstorm.news/files/190562</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a></p>
packet storm<p>Meshtastic Buffer Overflow <a href="https://packetstorm.news/files/190552" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">packetstorm.news/files/190552</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a></p>
packet storm<p>Ivanti Connect Secure / Policy Secure / ZTA Gateways Remote Code Execution <a href="https://packetstorm.news/files/190444" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">packetstorm.news/files/190444</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a></p>
Hacker News<p>One Bug Wasn't Enough: Escalating Twice Through SAP's Setuid Landscape</p><p><a href="https://www.anvilsecure.com/blog/one-bug-wasnt-enough-escalating-twice-through-saps-setuid-landscape.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">anvilsecure.com/blog/one-bug-w</span><span class="invisible">asnt-enough-escalating-twice-through-saps-setuid-landscape.html</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/OneBugWasntEnough" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OneBugWasntEnough</span></a> <a href="https://mastodon.social/tags/SAP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SAP</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/Setuid" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Setuid</span></a> <a href="https://mastodon.social/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://mastodon.social/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a></p>
packet storm<p>WordPress Simple Dashboard 2.0 Privilege Escalation <a href="https://packetstorm.news/files/190416" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">packetstorm.news/files/190416</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a></p>
packet storm<p>WBCE CMS 1.6.3 Remote Code Execution <a href="https://packetstorm.news/files/190302" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">packetstorm.news/files/190302</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a></p>
packet storm<p>WordPress Backup and Staging 1.21.16 Shell Upload <a href="https://packetstorm.news/files/190291" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">packetstorm.news/files/190291</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a></p>
heise Security<p>Apache Tomcat: Angriffe auf kritische Sicherheitslücke laufen</p><p>Eine kritische Sicherheitslücke in Apache Tomcat ermöglicht das Einschleusen von Schadcode. Genau das machen Angreifer derzeit.</p><p><a href="https://www.heise.de/news/Apache-Tomcat-Angriffe-auf-kritische-Sicherheitsluecke-laufen-10338443.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Apache-Tomcat-An</span><span class="invisible">griffe-auf-kritische-Sicherheitsluecke-laufen-10338443.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Hacker News<p>Blasting Past WebP - An analysis of the NSO BLASTPASS iMessage exploit</p><p><a href="https://googleprojectzero.blogspot.com/2025/03/blasting-past-webp.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">googleprojectzero.blogspot.com</span><span class="invisible">/2025/03/blasting-past-webp.html</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/Blasting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Blasting</span></a> <a href="https://mastodon.social/tags/Past" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Past</span></a> <a href="https://mastodon.social/tags/WebP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebP</span></a> <a href="https://mastodon.social/tags/An" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>An</span></a> <a href="https://mastodon.social/tags/analysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>analysis</span></a> <a href="https://mastodon.social/tags/of" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>of</span></a> <a href="https://mastodon.social/tags/the" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>the</span></a> <a href="https://mastodon.social/tags/NSO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NSO</span></a> <a href="https://mastodon.social/tags/BLASTPASS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BLASTPASS</span></a> <a href="https://mastodon.social/tags/iMessage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iMessage</span></a> <a href="https://mastodon.social/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://mastodon.social/tags/hackernews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackernews</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://mastodon.social/tags/analysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>analysis</span></a> <a href="https://mastodon.social/tags/NSO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NSO</span></a></p>
packet storm<p>WordPress Modal 1.5.8 Code Execution / Denial Of Service <a href="https://packetstorm.news/files/190045" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">packetstorm.news/files/190045</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a></p>
Hacker News<p>Heap-overflowing Llama.cpp to RCE</p><p><a href="https://retr0.blog/blog/llama-rpc-rce" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">retr0.blog/blog/llama-rpc-rce</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/HeapOverflow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HeapOverflow</span></a> <a href="https://mastodon.social/tags/LlamaCpp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LlamaCpp</span></a> <a href="https://mastodon.social/tags/RCE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RCE</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://mastodon.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechNews</span></a></p>
packet storm<p>WordPress Shortcode Addons 3.2.5 Shell Upload <a href="https://packetstorm.news/files/190019" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">packetstorm.news/files/190019</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a></p>
packet storm<p>Dolphin Pro 7.4.2 SQL Injection <a href="https://packetstorm.news/files/190012" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">packetstorm.news/files/190012</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a></p>
jbz<p>💣 Microsoft isn't fixing 8-year-old zero day used for spying <br>—The Register</p><p>"We told Microsoft but they consider it a UI issue, not a security issue. So it doesn't meet their bar for servicing as a security update, but it might be fixed in a later OS version, or something along those lines." </p><p><a href="https://www.theregister.com/2025/03/18/microsoft_trend_flaw/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/03/18/mic</span><span class="invisible">rosoft_trend_flaw/</span></a></p><p><a href="https://indieweb.social/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a> <a href="https://indieweb.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://indieweb.social/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a></p>
PrivacyDigest<p><a href="https://mas.to/tags/Allstate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Allstate</span></a> sued for exposing personal info in <a href="https://mas.to/tags/plaintext" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>plaintext</span></a> • The Register</p><p>Crooks built <a href="https://mas.to/tags/bots" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bots</span></a> to <a href="https://mas.to/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> astoundingly bad quotation website and made off with data on thousands<br><a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p><p><a href="https://www.theregister.com/2025/03/10/allstate_sued_pii_exposure/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/03/10/all</span><span class="invisible">state_sued_pii_exposure/</span></a></p>

Prawdopodobnie bez problemu można odblokować Twojego Androida – mając do niego fizyczny dostęp.

Taki przypadek wydarzył się niedawno w Serbii, gdzie do odblokowania telefonu studenta (Samsung Galaxy) użyto oprogramowania Cellebrite: the Android phone of one student protester was exploited and unlocked by a sophisticated zero-day exploit chain targeting Android USB drivers, developed by Cellebrite. Student zatrzymany przez policję wręczył im wyłączony telefon. Po...

#WBiegu #0Day #Android #Cellebrite #Exploit #Serbia #Usb

sekurak.pl/prawdopodobnie-bez-

Sekurak · Prawdopodobnie bez problemu można odblokować Twojego Androida - mając do niego fizyczny dostęp.Taki przypadek wydarzył się niedawno w Serbii, gdzie do odblokowania telefonu studenta (Samsung Galaxy) użyto oprogramowania Cellebrite: the Android phone of one student protester was exploited and unlocked by a sophisticated zero-day exploit chain targeting Android USB drivers, developed by Cellebrite. Student zatrzymany przez policję wręczył im wyłączony telefon. Po...
Continued thread

“He can come back when he is ready for Peace,” #Trump posted on social media about #Ukraine President #Zelensky.

The *agreement* [robbery] he had prepared for Zelensky, giving the #US rights to #exploit Ukraine’s critical #minerals in exchange for a vaguely outlined security guarantee by someone not necessarily the US, remains unsigned.
#geopolitics #Russia #Putin #PutinsPuppet #MafiaState #ForeignPolicy #diplomacy #Europe #war #allies #authoritarianism #RevengePolitics #chaos