https://github.com/pydio/pydio-core/commits/develop
https://github.com/pydio/pydio-core/commit/2049254e7a215491019d2646a274a8fb1cf29e3b
2015-05-07 1:32 GMT+03:00 Just A Fake :
> Does anyone have any info on the two pydio vulnerabilities announced today?
>
> They have been given CVE-2015-3431 an
Even though deleting everything is kind of a big deal, it still does not
get you anywhere near that CVSS score.
Here's my very generous calculator inputs:
http://puu.sh/fQVB5/76c526ed5d.png
___
Sent through the Full Disclosure mailing list
https://nmap.o
ayy lmao
//Julius Kivimäki, leader of Lizard Squad
2015-01-12 10:29 GMT+00:00 Robert Cavanaugh :
> Hi FD,
>
> I'm sure you're all sick to death of hearing about Lizard Squad and the
> skid marks they're leaving all over the place, so we'll make this brief:
>
Um, this is well documented behavior that's been around for decades. *
expands to all files in the dir as arguments to whatever, if the filename
is "--no-preserve-root -rf .." why shouldn't that be returned?
2014-06-26 11:40 GMT+03:00 defensecode :
> Hi,
>
> We wanted to inform all major *nix di
If you actually know weev then you know that he isn't capable of running a
business.
2014-05-27 21:49 GMT+03:00 Philip Cheong :
> From https://www.startjoin.com/trollc
>
> *Right now if you're a software exploit developer and you want to monetize
> your craft to pay your rent, there's only one c
PAM, how does it work?
2014-05-07 1:08 GMT+03:00 :
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> http://pastebin.com/raw.?i=gjkivAf3
>
>
> - -- CUT --
> #exploit #openssh
> ░░▓▓
> ░░░ ▓