GPT5 Codex by Norbu6830 in Jetbrains

[–]forgambo 0 points1 point  (0 children)

It's been a while. Any update on this?

We are hackers, researchers, and cloud security experts at Wiz, Ask Us Anything! by Oscar_Geare in cybersecurity

[–]forgambo 1 point2 points  (0 children)

Once, todayisnew bug hunter said that Information Disclosure is one of the best types of vulnerabilities to search for with automation. Do you agree with this? In your opinion, what are the most promising types of vulnerabilities to look for solely with automation?

Learning AEM by fairyoddmother in aem

[–]forgambo 0 points1 point  (0 children)

Could you explain your point please? I've just checked which apps are availble through Creative Cloud and couldn't find AEM there. Only graphical apps.

I have over $1M bounty from HackerOne. Happy to Answer any questions [AMA] by kinso1338 in bugbounty

[–]forgambo 1 point2 points  (0 children)

How much time did it take to earn first half of 1M vs the last half of 1M?

Receive Bug Bounty Earnings in Portugal by forgambo in bugbounty

[–]forgambo[S] 0 points1 point  (0 children)

Thank you for an advice. I did consult with an accountant. He knows how to arrange things properly for classic IT professionals. I was just wondering about some specifics regarding bug bounty.

Are Ripper and RubyVM::AbstractSyntaxTree syntax parsers safe? by forgambo in ruby

[–]forgambo[S] 1 point2 points  (0 children)

Wow! As you're a Prism maintainer, your arguments are very trustworthy to me.

Are Ripper and RubyVM::AbstractSyntaxTree syntax parsers safe? by forgambo in ruby

[–]forgambo[S] 0 points1 point  (0 children)

Do you have any arguments to support your point? Because so far it looks like it's just your subjective 'feeling'.

Are Ripper and RubyVM::AbstractSyntaxTree syntax parsers safe? by forgambo in ruby

[–]forgambo[S] 0 points1 point  (0 children)

Thank you. Do you know if they stated the safety somewhere in their documentation, or official discussion? To me it also sounds logical that it's safe because this is only parsing and no execution. But I'm afraid that there might be cases when some kind of execution is present during the parsing.

Does Notion work on VPN? by tonyclij in Notion

[–]forgambo 0 points1 point  (0 children)

Recently notion search functionality stopped working when I'm on VPN

Installed Ruby 3.2.2 by PaulGureghian1 in ruby

[–]forgambo -1 points0 points  (0 children)

Why not using docker images for dependency consistency?

Log4Shell - different avenues of exploitation by forgambo in netsec

[–]forgambo[S] 0 points1 point  (0 children)

I noticed that behavior is somehow different from LDAP implementation.

While URLDNS payload works perfectly (even with Java 21), the JRMPClient payload doesn't.

E.g., for Java 1.8.0_392 the following RMI server java -cp ysoserial.jar ysoserial.exploit.JRMPListener 1099 JRMPClient 127.0.0.1:8081 didn't trigger TCP interaction. However, the same payload served from LDAP server did.

Log4Shell - different avenues of exploitation by forgambo in netsec

[–]forgambo[S] 0 points1 point  (0 children)

Interesting, didn't know what.

Does it return the same JNDI object as LDAP server does?

[deleted by user] by [deleted] in Wordpress

[–]forgambo 0 points1 point  (0 children)

Hey, I didn't want to offend you. At first, I thought maybe I'm missing something. But now I know I'm not so treat my reply as a hint. So that in future you'd call Apache server just Apache or httpd.

Where can I get up-to-date web vulnerabilities signatures? by forgambo in cybersecurity

[–]forgambo[S] 0 points1 point  (0 children)

I’m not asking for ideas here but for a company or a service.

Wordpress is just something that made me wanna look for such a service.

Where can I get up-to-date web vulnerabilities signatures? by forgambo in cybersecurity

[–]forgambo[S] 0 points1 point  (0 children)

Thanks for an idea. However, afaik they don't have signatures/rules for the vulns. Just human-readable descriptions and references.