2026-04-29
Selecting...
Home Page
reload
Search in this channel...
Punch card
Raw Text (irssi format)
Fork on github
switch to admin mode
Jump to...
redirecting...
Log for
YSITD
am 02:33:47
Del 乜春 Del 呢 , 屌你老母
youtu.be/zQ3rGRQY6WM?t=440
am 07:47:22
Cute_ Panda 🐼 就業了,Still 窮。
酷欸
@seadog007
https://www.4gamers.com.tw/news/detail/63179/factorio-world-record-server
pm 03:22:16
ʇɹᴉsʞʎ🐕(有狗!) 0️⃣2️⃣:3️⃣0️⃣ AM
https://www.vmware.com/security/advisories/VMSA-2024-0006.html
pm 03:22:16
ʇɹᴉsʞʎ🐕(有狗!) 0️⃣2️⃣:3️⃣0️⃣ AM
4個CVE
pm 03:22:16
ʇɹᴉsʞʎ🐕(有狗!) 0️⃣2️⃣:3️⃣0️⃣ AM
A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
pm 03:22:16
ʇɹᴉsʞʎ🐕(有狗!) 0️⃣2️⃣:3️⃣0️⃣ AM
A malicious actor with privileges within the VMX process may trigger an out-of-bounds write leading to an escape of the sandbox.
pm 03:22:17
ʇɹᴉsʞʎ🐕(有狗!) 0️⃣2️⃣:3️⃣0️⃣ AM
A malicious actor with administrative access to a virtual machine may be able to exploit this issue to leak memory from the vmx process.
pm 03:22:17
ʇɹᴉsʞʎ🐕(有狗!) 0️⃣2️⃣:3️⃣0️⃣ AM
created by
mmis1000
and release under
MIT License
GitHub Repo