![Day[0] cover image](https://wsrv.nl/?url=https%3A%2F%2Fd3t3ozftmdmh3i.cloudfront.net%2Fproduction%2Fpodcast_uploaded_nologo%2F1589585%2F1589585-1553556841291-2e3a293ad9c2e.jpg&w=320&h=320)
Binary Ninja's Decompiler, git credential leak, cross-platform LPEs
Day[0]
00:00
Themes for PHP Scripts
The post mentions that the bug is unpatched as of april eighteenth, which is when this post was published. There's no disclosure time line or information or anything like that. Once you're an adman, you're in a trusted position. I'm obviously, ideal cases just don't have that, but it's definitely not uncommon to allow it. It's one of those multi sage attacks. This is apin sore, so you can run this wherever. Wut ike anyb an a on a lot easier to hit than just someone's dust top,. You know what i mean? No. Ye, ye.
Play episode from 01:14:41
Transcript


