@jszumski

  • RT @oskargroth: Oof. macOS state restoration data was serialised without secure coding, so injecting malicious code into windows.plist and tricking system apps to load it would escape the sandbox & grant root privileges. sector7.computest.nl/post/2022-08-p… 6 days ago
  • RT @orange_8361: My favorite bug among the vulnerabilities I presented today! 😆 The original intent was to compare the password. However, the developer copy-and-pasted the code but forgot to replace the variable name. That leads to the Authentication Bypass on IIS. pic.twitter.com/NLDDLQNYX2 7 days ago
  • RT @simjp: With the latest SwiftLint release candidate, you can now develop custom native SwiftLint rules in Xcode right from your private projects. 🤯 github.com/realm/SwiftLin… 7 days ago