v09044g40000c40tatrc77u3vqm6u500

Apr 23, 2026 19:49 · 0:51 · English · Whisper Turbo · 1 speakers
이 트랜스크립트는 다음에 만료됩니다. 9 며칠이요 영구 저장소 업그레이드 →
보이는 것만
0:00
S… Speaker 1 (v09044g40000c40tatrc77u3vqm6u500)
What kind of security flaw do you think qualifies for a critical severity and a $20,000 reward from GitLab? Let's walk through the vulnerability. So you upload an image to GitLab, and it goes to a special tool to remove tags. But this tool doesn't pay attention to the extension. It pays attention to the contents of the file. So it could be a .jpg file.
0:20
S… Speaker 1 (v09044g40000c40tatrc77u3vqm6u500)
with something totally different inside. So the researcher put code in the file and he found that if he crafted it just right, he could get that code to execute. In cybersecurity, we call this kind of vulnerability RCE or remote code execution. Why is it so good? Because then you can craft some commands that open up a doorway to the internet, which we call the reverse shell. RCE on production, 20 grand, sometimes more. Awesome.

This transcript was generated by AI (automatic speech recognition). May contain errors — verify against the original audio for critical use. AI policy

❤️ STT.ai가 마음에 드시나요? 친구들에게 알려주세요!
요약
요약 을 클릭하여 이 녹음의 AI 요약을 생성합니다.
요약...
이 녹음에 대해 AI에게 물어보기
이 녹음에 대해 질문하십시오 — AI는 관련 섹션을 찾아 답변합니다.