I hereby claim:
- I am fs0c131y on github.
- I am fs0c131y (https://keybase.io/fs0c131y) on keybase.
- I have a public key whose fingerprint is CA84 5024 A6F2 20B5 8B1B 4879 2F14 4F91 F7AE 7A48
To claim this, I am signing this object:
| Draziw.Button.Mines | |
| ag.video_solutions.wedotv | |
| ahf.dummynation | |
| ai.socialapps.speakmaster | |
| air.com.beachbumgammon | |
| air.com.freshplanet.games.SongPop2 | |
| air.com.gamesys.mobile.slots.jpj | |
| air.com.goodgamestudios.empirefourkingdoms | |
| air.com.kitchenscramble.goo | |
| air.com.lalaplay.rummy45 |
| [Log Session] | |
| active = false | |
| app_version = 17.2.4 | |
| duration = 0 | |
| eventIndex = 0 | |
| id = 0 | |
| launch_sent = false | |
| non_page = true | |
| pausetime = 1596980554524 | |
| timestamp = 1596980554524 |
| [Log Session] | |
| active = false | |
| app_version = 17.2.4 | |
| duration = 0 | |
| eventIndex = 0 | |
| id = 0 | |
| launch_sent = false | |
| non_page = true | |
| pausetime = 1596980554524 | |
| timestamp = 1596980554524 |
| CVEID: CVE-2019-14365 | |
| NAME OF AFFECTED PRODUCT(S) AND VERSION(S): Intercom plugin through 1.2.1 for WordPress | |
| PROBLEM TYPE: Insecure Permissions | |
| DESCRIPTION: The Intercom plugin for WordPress leaks a Slack Access Token in source code. An attacker can obtain a lot of information about the victim's Slack (channels, members, etc.) |
| /* | |
| * get_sqlcipher_password.js | |
| * Copyright (c) 2019 Elliot Alderson <[email protected]> | |
| * | |
| * Frida.re JS functions to get SQLCipher database passwords. | |
| * | |
| * Example usage: | |
| * # frida -U -f in.gov.uidai.mAadhaarPlus -l get_sqlcipher_password.js --no-pause | |
| * | |
| */ |
I hereby claim:
To claim this, I am signing this object: