Ecoer Logo
VOTING POWER100.00%
DOWNVOTE POWER100.00%
RESOURCE CREDITS100.00%
REPUTATION PROGRESS54.70%
Net Worth
0.084USD
STEEM
0.183STEEM
SBD
0.077SBD
Effective Power
5.001SP
├── Own SP
0.676SP
└── Incoming Deleg
+4.325SP

Detailed Balance

STEEM
balance
0.183STEEM
market_balance
0.000STEEM
savings_balance
0.000STEEM
reward_steem_balance
0.000STEEM
STEEM POWER
Own SP
0.676SP
Delegated Out
0.000SP
Delegation In
4.325SP
Effective Power
5.001SP
Reward SP (pending)
0.047SP
SBD
sbd_balance
0.068SBD
sbd_conversions
0.000SBD
sbd_market_balance
0.000SBD
savings_sbd_balance
0.000SBD
reward_sbd_balance
0.009SBD
{
  "balance": "0.183 STEEM",
  "savings_balance": "0.000 STEEM",
  "reward_steem_balance": "0.000 STEEM",
  "vesting_shares": "1100.546575 VESTS",
  "delegated_vesting_shares": "0.000000 VESTS",
  "received_vesting_shares": "7043.113231 VESTS",
  "sbd_balance": "0.068 SBD",
  "savings_sbd_balance": "0.000 SBD",
  "reward_sbd_balance": "0.009 SBD",
  "conversions": []
}

Account Info

namefirosolutions
id1357615
rank1,259,239
reputation32005145910
created2020-01-22T17:06:57
recovery_accountsteem
proxyNone
post_count23
comment_count0
lifetime_vote_count0
witnesses_voted_for0
last_post2020-08-20T15:52:18
last_root_post2020-08-20T15:52:18
last_vote_time2020-04-02T15:26:57
proxied_vsf_votes0, 0, 0, 0
can_vote1
voting_power0
delayed_votes0
balance0.183 STEEM
savings_balance0.000 STEEM
sbd_balance0.068 SBD
savings_sbd_balance0.000 SBD
vesting_shares1100.546575 VESTS
delegated_vesting_shares0.000000 VESTS
received_vesting_shares7043.113231 VESTS
reward_vesting_balance91.106226 VESTS
vesting_balance0.000 STEEM
vesting_withdraw_rate0.000000 VESTS
next_vesting_withdrawal1969-12-31T23:59:59
withdrawn0
to_withdraw0
withdraw_routes0
savings_withdraw_requests0
last_account_recovery1970-01-01T00:00:00
reset_accountnull
last_owner_update1970-01-01T00:00:00
last_account_update2020-01-31T10:36:30
minedNo
sbd_seconds0
sbd_last_interest_payment1970-01-01T00:00:00
savings_sbd_last_interest_payment1970-01-01T00:00:00
{
  "id": 1357615,
  "name": "firosolutions",
  "owner": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM873FZtNnUkbck2porc9uFqgyPUYuHUsnjyPRPpZhe4Yi1agbaB",
        1
      ]
    ]
  },
  "active": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM6qGVbJ5Fnc9ziAS52Meqv6BJHiADzNrGWsFpzCQaWqT3B6QDqA",
        1
      ]
    ]
  },
  "posting": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM7TqCuVakZANhtfUiVsZmGh1t3s7eCKMBRD2jHM3B2z4YFcbtR1",
        1
      ]
    ]
  },
  "memo_key": "STM81DZPCzthZfpNJaAYjRHbh6UxmnMxGoPBBUmDCZ3caVXdWHHGn",
  "json_metadata": "{\"profile\":{\"profile_image\":\"https://cdn.steemitimages.com/DQmdxt1ZFfkCcNjYVbbfFDoGy13yoYmVE7rD8Hk74v3BEtf/FS.png\",\"website\":\"https://firosolutions.com\"}}",
  "posting_json_metadata": "",
  "proxy": "",
  "last_owner_update": "1970-01-01T00:00:00",
  "last_account_update": "2020-01-31T10:36:30",
  "created": "2020-01-22T17:06:57",
  "mined": false,
  "recovery_account": "steem",
  "last_account_recovery": "1970-01-01T00:00:00",
  "reset_account": "null",
  "comment_count": 0,
  "lifetime_vote_count": 0,
  "post_count": 23,
  "can_vote": true,
  "voting_manabar": {
    "current_mana": "8143659806",
    "last_update_time": 1779063582
  },
  "downvote_manabar": {
    "current_mana": 2035914951,
    "last_update_time": 1779063582
  },
  "voting_power": 0,
  "balance": "0.183 STEEM",
  "savings_balance": "0.000 STEEM",
  "sbd_balance": "0.068 SBD",
  "sbd_seconds": "0",
  "sbd_seconds_last_update": "2020-07-08T16:12:18",
  "sbd_last_interest_payment": "1970-01-01T00:00:00",
  "savings_sbd_balance": "0.000 SBD",
  "savings_sbd_seconds": "0",
  "savings_sbd_seconds_last_update": "1970-01-01T00:00:00",
  "savings_sbd_last_interest_payment": "1970-01-01T00:00:00",
  "savings_withdraw_requests": 0,
  "reward_sbd_balance": "0.009 SBD",
  "reward_steem_balance": "0.000 STEEM",
  "reward_vesting_balance": "91.106226 VESTS",
  "reward_vesting_steem": "0.047 STEEM",
  "vesting_shares": "1100.546575 VESTS",
  "delegated_vesting_shares": "0.000000 VESTS",
  "received_vesting_shares": "7043.113231 VESTS",
  "vesting_withdraw_rate": "0.000000 VESTS",
  "next_vesting_withdrawal": "1969-12-31T23:59:59",
  "withdrawn": 0,
  "to_withdraw": 0,
  "withdraw_routes": 0,
  "curation_rewards": 0,
  "posting_rewards": 1215,
  "proxied_vsf_votes": [
    0,
    0,
    0,
    0
  ],
  "witnesses_voted_for": 0,
  "last_post": "2020-08-20T15:52:18",
  "last_root_post": "2020-08-20T15:52:18",
  "last_vote_time": "2020-04-02T15:26:57",
  "post_bandwidth": 0,
  "pending_claimed_accounts": 0,
  "vesting_balance": "0.000 STEEM",
  "reputation": "32005145910",
  "transfer_history": [],
  "market_history": [],
  "post_history": [],
  "vote_history": [],
  "other_history": [],
  "witness_votes": [],
  "tags_usage": [],
  "guest_bloggers": [],
  "rank": 1259239
}

Withdraw Routes

IncomingOutgoing
Empty
Empty
{
  "incoming": [],
  "outgoing": []
}
From Date
To Date
steemdelegated 4.325 SP to @firosolutions
2026/05/18 00:19:42
delegatorsteem
delegateefirosolutions
vesting shares7043.113231 VESTS
Transaction InfoBlock #106143539/Trx d1e950449e6261d20e68aae70859e216409bfaf4
View Raw JSON Data
{
  "trx_id": "d1e950449e6261d20e68aae70859e216409bfaf4",
  "block": 106143539,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-05-18T00:19:42",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "firosolutions",
      "vesting_shares": "7043.113231 VESTS"
    }
  ]
}
steemdelegated 2.660 SP to @firosolutions
2026/05/12 04:09:36
delegatorsteem
delegateefirosolutions
vesting shares4330.902826 VESTS
Transaction InfoBlock #105976094/Trx 50bbf8273d0908a0d0756d0ee1b6705a56812e88
View Raw JSON Data
{
  "trx_id": "50bbf8273d0908a0d0756d0ee1b6705a56812e88",
  "block": 105976094,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-05-12T04:09:36",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "firosolutions",
      "vesting_shares": "4330.902826 VESTS"
    }
  ]
}
steemdelegated 4.333 SP to @firosolutions
2026/04/25 23:40:27
delegatorsteem
delegateefirosolutions
vesting shares7055.628987 VESTS
Transaction InfoBlock #105511187/Trx c517cc675bc581463371dce0784e3b70a6c7485e
View Raw JSON Data
{
  "trx_id": "c517cc675bc581463371dce0784e3b70a6c7485e",
  "block": 105511187,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-04-25T23:40:27",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "firosolutions",
      "vesting_shares": "7055.628987 VESTS"
    }
  ]
}
steemdelegated 2.685 SP to @firosolutions
2026/01/23 08:00:30
delegatorsteem
delegateefirosolutions
vesting shares4372.449645 VESTS
Transaction InfoBlock #102852057/Trx ab119e05170227bd44270d2d7f21a52bb7e9140c
View Raw JSON Data
{
  "trx_id": "ab119e05170227bd44270d2d7f21a52bb7e9140c",
  "block": 102852057,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2026-01-23T08:00:30",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "firosolutions",
      "vesting_shares": "4372.449645 VESTS"
    }
  ]
}
steemdelegated 2.786 SP to @firosolutions
2024/12/17 03:19:27
delegatorsteem
delegateefirosolutions
vesting shares4536.668842 VESTS
Transaction InfoBlock #91298463/Trx d7d01f61aa9c8794fbc2e7ad8827c0bbf37a2408
View Raw JSON Data
{
  "trx_id": "d7d01f61aa9c8794fbc2e7ad8827c0bbf37a2408",
  "block": 91298463,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2024-12-17T03:19:27",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "firosolutions",
      "vesting_shares": "4536.668842 VESTS"
    }
  ]
}
2024/04/30 11:44:00
parent authorfirosolutions
parent permlinkpython-django-postgresql
authorjordansanders
permlinkscr79d
title
bodyIf you work with PostgreSQL, you can try <a href="https://www.devart.com/odbc/postgresql/">ODBC for PostgreSQL</a> for a better connection.
json metadata{"links":["https://www.devart.com/odbc/postgresql/"],"app":"steemit/0.2"}
Transaction InfoBlock #84681679/Trx 20f2e21884ef5acde89de781e3aefc5431e6eb7d
View Raw JSON Data
{
  "trx_id": "20f2e21884ef5acde89de781e3aefc5431e6eb7d",
  "block": 84681679,
  "trx_in_block": 7,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2024-04-30T11:44:00",
  "op": [
    "comment",
    {
      "parent_author": "firosolutions",
      "parent_permlink": "python-django-postgresql",
      "author": "jordansanders",
      "permlink": "scr79d",
      "title": "",
      "body": "If you work with PostgreSQL, you can try <a href=\"https://www.devart.com/odbc/postgresql/\">ODBC for PostgreSQL</a> for a better connection.",
      "json_metadata": "{\"links\":[\"https://www.devart.com/odbc/postgresql/\"],\"app\":\"steemit/0.2\"}"
    }
  ]
}
steemdelegated 2.890 SP to @firosolutions
2023/11/13 19:02:21
delegatorsteem
delegateefirosolutions
vesting shares4705.802374 VESTS
Transaction InfoBlock #79852663/Trx b57d450e83ccee4b8bf8b96dae5bb2fb84feca76
View Raw JSON Data
{
  "trx_id": "b57d450e83ccee4b8bf8b96dae5bb2fb84feca76",
  "block": 79852663,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2023-11-13T19:02:21",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "firosolutions",
      "vesting_shares": "4705.802374 VESTS"
    }
  ]
}
steemdelegated 4.694 SP to @firosolutions
2023/09/21 21:55:06
delegatorsteem
delegateefirosolutions
vesting shares7643.081160 VESTS
Transaction InfoBlock #78347933/Trx 63e12c263fb48e2ee44376541607c3d2f467cefd
View Raw JSON Data
{
  "trx_id": "63e12c263fb48e2ee44376541607c3d2f467cefd",
  "block": 78347933,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2023-09-21T21:55:06",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "firosolutions",
      "vesting_shares": "7643.081160 VESTS"
    }
  ]
}
steemdelegated 4.830 SP to @firosolutions
2022/11/03 11:42:00
delegatorsteem
delegateefirosolutions
vesting shares7864.762598 VESTS
Transaction InfoBlock #69113256/Trx fb97e123345784d5577eeb6e6c3bb3dc38e7e159
View Raw JSON Data
{
  "trx_id": "fb97e123345784d5577eeb6e6c3bb3dc38e7e159",
  "block": 69113256,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2022-11-03T11:42:00",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "firosolutions",
      "vesting_shares": "7864.762598 VESTS"
    }
  ]
}
steemdelegated 4.969 SP to @firosolutions
2022/01/09 21:23:51
delegatorsteem
delegateefirosolutions
vesting shares8091.311300 VESTS
Transaction InfoBlock #60592710/Trx 0fcf2948ef9997b8fe8ff7b2f533fc5a85dae653
View Raw JSON Data
{
  "trx_id": "0fcf2948ef9997b8fe8ff7b2f533fc5a85dae653",
  "block": 60592710,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2022-01-09T21:23:51",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "firosolutions",
      "vesting_shares": "8091.311300 VESTS"
    }
  ]
}
steemdelegated 5.082 SP to @firosolutions
2021/06/07 13:44:18
delegatorsteem
delegateefirosolutions
vesting shares8275.169994 VESTS
Transaction InfoBlock #54423013/Trx 3dbf12d05b9a2c610bf7732e6cc4bbdad08674a3
View Raw JSON Data
{
  "trx_id": "3dbf12d05b9a2c610bf7732e6cc4bbdad08674a3",
  "block": 54423013,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2021-06-07T13:44:18",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "firosolutions",
      "vesting_shares": "8275.169994 VESTS"
    }
  ]
}
blurtofficialsent 0.001 STEEM to @firosolutions- "CONGRATS! You have a 1:1 BLURT AIRDROP of 0.855 BLURT and 0.000000 BLURT POWER waiting for you. Check out https://blurtwallet.com/@firosolutions and https://blurt.blog/ TODAY!"
2020/12/16 13:13:09
fromblurtofficial
tofirosolutions
amount0.001 STEEM
memoCONGRATS! You have a 1:1 BLURT AIRDROP of 0.855 BLURT and 0.000000 BLURT POWER waiting for you. Check out https://blurtwallet.com/@firosolutions and https://blurt.blog/ TODAY!
Transaction InfoBlock #49499051/Trx 4562b8af7edf1eb108f37fd6954e394c266e5b90
View Raw JSON Data
{
  "trx_id": "4562b8af7edf1eb108f37fd6954e394c266e5b90",
  "block": 49499051,
  "trx_in_block": 7,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-12-16T13:13:09",
  "op": [
    "transfer",
    {
      "from": "blurtofficial",
      "to": "firosolutions",
      "amount": "0.001 STEEM",
      "memo": "CONGRATS! You have a 1:1 BLURT AIRDROP of 0.855 BLURT and 0.000000 BLURT POWER waiting for you. Check out https://blurtwallet.com/@firosolutions and https://blurt.blog/ TODAY!"
    }
  ]
}
steemdelegated 5.197 SP to @firosolutions
2020/12/05 14:49:54
delegatorsteem
delegateefirosolutions
vesting shares8462.694315 VESTS
Transaction InfoBlock #49190359/Trx 34591167766bc6d8c006dbd770490b8690a5f2a2
View Raw JSON Data
{
  "trx_id": "34591167766bc6d8c006dbd770490b8690a5f2a2",
  "block": 49190359,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-12-05T14:49:54",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "firosolutions",
      "vesting_shares": "8462.694315 VESTS"
    }
  ]
}
steemdelegated 1.177 SP to @firosolutions
2020/11/19 19:15:06
delegatorsteem
delegateefirosolutions
vesting shares1916.142222 VESTS
Transaction InfoBlock #48742255/Trx e19f2b4d21313827f95fa73d40678a51753f1858
View Raw JSON Data
{
  "trx_id": "e19f2b4d21313827f95fa73d40678a51753f1858",
  "block": 48742255,
  "trx_in_block": 8,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-11-19T19:15:06",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "firosolutions",
      "vesting_shares": "1916.142222 VESTS"
    }
  ]
}
steemdelegated 5.220 SP to @firosolutions
2020/11/02 15:47:18
delegatorsteem
delegateefirosolutions
vesting shares8499.539215 VESTS
Transaction InfoBlock #48257978/Trx f530d19f4b2e03169e7865cd2f9a7b0dc835279d
View Raw JSON Data
{
  "trx_id": "f530d19f4b2e03169e7865cd2f9a7b0dc835279d",
  "block": 48257978,
  "trx_in_block": 6,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-11-02T15:47:18",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "firosolutions",
      "vesting_shares": "8499.539215 VESTS"
    }
  ]
}
steemdelegated 17.450 SP to @firosolutions
2020/09/14 13:09:21
delegatorsteem
delegateefirosolutions
vesting shares28414.896046 VESTS
Transaction InfoBlock #46863371/Trx 53e55cc58426cfd53c5fa348cffff9dfab8d4d05
View Raw JSON Data
{
  "trx_id": "53e55cc58426cfd53c5fa348cffff9dfab8d4d05",
  "block": 46863371,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-09-14T13:09:21",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "firosolutions",
      "vesting_shares": "28414.896046 VESTS"
    }
  ]
}
2020/08/20 15:52:18
parent author
parent permlinkpython
authorfirosolutions
permlinkdjango-dpaste-podcast
titleDjango dpaste podcast
bodySecurity Headlines dpaste Podcast special ![image.png](https://cdn.steemitimages.com/DQmVijbXJtEEis4GiBpiAF16RF8tezV4yHGkpUMm6kMFR46/image.png) In this episode of Security Headlines we deep dive into the pastebin site dpaste.com with its founder, the Django veteran Paul Bissex. Dpaste is a pastebin service created in 2006 as Paul’s first Django project. The website has been running stable ever since, growing more and more as time goes by resulting in being Django’s default paste service. Paul learned computer programming by copying programs from computer magazines, he then moved on to creating games and selling them by mail as many did in the earlier days of personal computing. Ever since then Paul kept the interests of development and innovative problem-solving. As an active community member in various irc channels on Freenode, he quickly joined the django irc channel in the projects’ early days. And he has happily been running Django ever since. Today Paul works with a startup accelerator where he gets to help startup companies develop beta and alpha products using Django! Thanks to python, being easy to learn and deploy, Django is a perfect choice for beginners that want to quickly put an application online. We got to hear Pauls story on why he created dpaste and how the Django community has been growing over the years. Some important key points that we talked about: * Running python in production * The start of django * The success of django * Upgrading Python2 to Python3 * Keeping track of python dependencies * Going from php to python * Working with django * Early 2000 webb development * Python’s community * Pyramid, soap * Django released in 2005 * Importance of documentation * Niklaus Wirth * modula 2 * trs 80, 8 bit computing * Django’s culture * Liberation from php * Serving 40 million requests a day with django * The freenode community * Blacklisting django spam * Caching web apps * Python Virtualenv Get comfortable and give listen to Security Headlines dpaste special: https://anchor.fm/firo-solutions/episodes/Dpaste-special-eidnpv
json metadata{"tags":["python"],"image":["https://cdn.steemitimages.com/DQmVijbXJtEEis4GiBpiAF16RF8tezV4yHGkpUMm6kMFR46/image.png"],"links":["https://anchor.fm/firo-solutions/episodes/Dpaste-special-eidnpv"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #46155529/Trx 9a1fccd4f8744701068c2e3f19dbee00b95a0b5e
View Raw JSON Data
{
  "trx_id": "9a1fccd4f8744701068c2e3f19dbee00b95a0b5e",
  "block": 46155529,
  "trx_in_block": 12,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-08-20T15:52:18",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "python",
      "author": "firosolutions",
      "permlink": "django-dpaste-podcast",
      "title": "Django dpaste podcast",
      "body": "Security Headlines dpaste Podcast special\n\n\n![image.png](https://cdn.steemitimages.com/DQmVijbXJtEEis4GiBpiAF16RF8tezV4yHGkpUMm6kMFR46/image.png)\n\nIn this episode of Security Headlines we deep dive into the pastebin site dpaste.com\nwith its founder, the Django veteran Paul Bissex.\n\nDpaste is a pastebin service created in 2006 as Paul’s first Django\nproject. The website has been running stable ever since, growing more and more\nas time goes by resulting in being Django’s default paste service.\n\nPaul learned computer programming by copying programs from computer\nmagazines, he then moved on to creating games and selling them by mail\nas many did in the earlier days of personal computing.\n\nEver since then Paul kept the interests of development and\ninnovative problem-solving.\n\nAs an active community member in various irc channels on Freenode, he\nquickly joined the django irc channel in the projects’ early days.\nAnd he has happily been running Django ever since.\n\nToday Paul works with a startup accelerator where he gets to\nhelp startup companies develop beta and alpha products using Django!\nThanks to python, being easy to learn and deploy, Django is\na perfect choice for beginners that want to quickly put an application\nonline.\n\nWe got to hear Pauls story on why he created dpaste and how the Django\ncommunity has been growing over the years.\n\nSome important key points that we talked about:\n* Running python in production\n* The start of django\n* The success of django\n* Upgrading Python2 to Python3\n* Keeping track of python dependencies\n* Going from php to python\n* Working with django\n* Early 2000 webb development\n* Python’s community\n* Pyramid, soap\n* Django released in 2005\n* Importance of documentation\n* Niklaus Wirth\n* modula 2\n* trs 80, 8 bit computing\n* Django’s culture\n* Liberation from php\n* Serving 40 million requests a day with django\n* The freenode community\n* Blacklisting django spam\n* Caching web apps\n* Python Virtualenv\n\nGet comfortable and give listen to Security Headlines dpaste special:\n\n\nhttps://anchor.fm/firo-solutions/episodes/Dpaste-special-eidnpv",
      "json_metadata": "{\"tags\":[\"python\"],\"image\":[\"https://cdn.steemitimages.com/DQmVijbXJtEEis4GiBpiAF16RF8tezV4yHGkpUMm6kMFR46/image.png\"],\"links\":[\"https://anchor.fm/firo-solutions/episodes/Dpaste-special-eidnpv\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2020/08/16 11:57:18
voterunitedtogether
authorfirosolutions
permlink0shn43n2ukr
weight-10000 (-100.00%)
Transaction InfoBlock #46037267/Trx e10764c7e0d39b09e275b442e94c2f836eecda75
View Raw JSON Data
{
  "trx_id": "e10764c7e0d39b09e275b442e94c2f836eecda75",
  "block": 46037267,
  "trx_in_block": 4,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-08-16T11:57:18",
  "op": [
    "vote",
    {
      "voter": "unitedtogether",
      "author": "firosolutions",
      "permlink": "0shn43n2ukr",
      "weight": -10000
    }
  ]
}
yffupvoted (10.00%) @firosolutions / 0shn43n2ukr
2020/08/16 11:56:06
voteryff
authorfirosolutions
permlink0shn43n2ukr
weight1000 (10.00%)
Transaction InfoBlock #46037243/Trx a0269fecf874dc6857c18981d640544430c8d098
View Raw JSON Data
{
  "trx_id": "a0269fecf874dc6857c18981d640544430c8d098",
  "block": 46037243,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-08-16T11:56:06",
  "op": [
    "vote",
    {
      "voter": "yff",
      "author": "firosolutions",
      "permlink": "0shn43n2ukr",
      "weight": 1000
    }
  ]
}
firosolutionsupdated options for 0shn43n2ukr
2020/08/16 11:53:30
authorfirosolutions
permlink0shn43n2ukr
max accepted payout1000000.000 SBD
percent steem dollars0
allow votestrue
allow curation rewardstrue
extensions[[0,{"beneficiaries":[{"account":"dtube","weight":1000}]}]]
Transaction InfoBlock #46037191/Trx 6ebdde0375f3adea317c0b06849666b3c219fe74
View Raw JSON Data
{
  "trx_id": "6ebdde0375f3adea317c0b06849666b3c219fe74",
  "block": 46037191,
  "trx_in_block": 4,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-08-16T11:53:30",
  "op": [
    "comment_options",
    {
      "author": "firosolutions",
      "permlink": "0shn43n2ukr",
      "max_accepted_payout": "1000000.000 SBD",
      "percent_steem_dollars": 0,
      "allow_votes": true,
      "allow_curation_rewards": true,
      "extensions": [
        [
          0,
          {
            "beneficiaries": [
              {
                "account": "dtube",
                "weight": 1000
              }
            ]
          }
        ]
      ]
    }
  ]
}
firosolutionspublished a new post: 0shn43n2ukr
2020/08/16 11:53:30
parent author
parent permlinkhive-196037
authorfirosolutions
permlink0shn43n2ukr
titleWhat is Vulnerability Management?
body<center><a href='https://d.tube/#!/v/firosolutions/0shn43n2ukr'><img src='https://snap1.d.tube/ipfs/QmUjxXfsTXBvwAnXnBocEmMpAcDESUKJ1EZ7Yijt9AsJqR' ></a></center><hr> Vulnerability Management is a new field in the cybersecurity space. More and more companies are hiring people to do this manually, while we at Firo Solutions are continuing to provide an automated solution. The art of Vulnerability Management is simply to Identify, Notify and Solve security bugs that affect the software that you are running. Failing to do so will result in having nasty security holes in your infrastructure that can and probably will leak out information to third parties. https://firosolutions.com https://blog.firosolutions.com <hr><a href='https://d.tube/#!/v/firosolutions/0shn43n2ukr'> ▶️ DTube</a><br /><a href='https://btfs.d.tube/btfs/QmaJuGyXsm59diNHcfNR6EgoCrPUYLc4La3BNzMPmdRAEY'> ▶️ BTFS</a><br />
json metadata{"video":{"files":{"btfs":{"vid":{"240":"QmSR5a6CyeLXbfPHtS4pHHQYvxYgVakXBRARfsUqpJVgq7","480":"QmVvRGbHEGYNzPSxWxPPKd3nBMJfueJMp6jPGycCK7yTBm","src":"QmaJuGyXsm59diNHcfNR6EgoCrPUYLc4La3BNzMPmdRAEY"},"img":{"spr":"QmcRD5zjLnLbzHGfTvazd4rh7V3Qh4D84KEEzUGvbnfi2b"}},"ipfs":{"img":{"118":"QmRDcHJqNRRELRL58xZkpjveGtTSibkWSw1rQa2b9sJgWp","360":"QmUjxXfsTXBvwAnXnBocEmMpAcDESUKJ1EZ7Yijt9AsJqR"}}},"dur":"203","title":"What is Vulnerability Management?","desc":"Vulnerability Management is a new field in the cybersecurity space. More and more companies are hiring people to do this manually, while we at Firo Solutions are continuing to provide an automated solution.\n\nhttps://firosolutions.com\nhttps://blog.firosolutions.com","tag":"security","hide":0,"nsfw":0,"oc":1,"refs":[]},"tags":["dtube","security"],"app":"dtube/0.9"}
Transaction InfoBlock #46037191/Trx 6ebdde0375f3adea317c0b06849666b3c219fe74
View Raw JSON Data
{
  "trx_id": "6ebdde0375f3adea317c0b06849666b3c219fe74",
  "block": 46037191,
  "trx_in_block": 4,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-08-16T11:53:30",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "hive-196037",
      "author": "firosolutions",
      "permlink": "0shn43n2ukr",
      "title": "What is Vulnerability Management?",
      "body": "<center><a href='https://d.tube/#!/v/firosolutions/0shn43n2ukr'><img src='https://snap1.d.tube/ipfs/QmUjxXfsTXBvwAnXnBocEmMpAcDESUKJ1EZ7Yijt9AsJqR' ></a></center><hr>\n\nVulnerability Management is a new field in the cybersecurity space. More and more companies are hiring people to do this manually, while we at Firo Solutions are continuing to provide an automated solution.\n\nThe art of Vulnerability Management is simply to Identify, Notify and Solve security bugs that affect the software that you are running. Failing to do so will result in having nasty security holes in your infrastructure that can and probably will leak out information to third parties.\n\nhttps://firosolutions.com\nhttps://blog.firosolutions.com\n\n<hr><a href='https://d.tube/#!/v/firosolutions/0shn43n2ukr'> ▶️ DTube</a><br /><a href='https://btfs.d.tube/btfs/QmaJuGyXsm59diNHcfNR6EgoCrPUYLc4La3BNzMPmdRAEY'> ▶️ BTFS</a><br />",
      "json_metadata": "{\"video\":{\"files\":{\"btfs\":{\"vid\":{\"240\":\"QmSR5a6CyeLXbfPHtS4pHHQYvxYgVakXBRARfsUqpJVgq7\",\"480\":\"QmVvRGbHEGYNzPSxWxPPKd3nBMJfueJMp6jPGycCK7yTBm\",\"src\":\"QmaJuGyXsm59diNHcfNR6EgoCrPUYLc4La3BNzMPmdRAEY\"},\"img\":{\"spr\":\"QmcRD5zjLnLbzHGfTvazd4rh7V3Qh4D84KEEzUGvbnfi2b\"}},\"ipfs\":{\"img\":{\"118\":\"QmRDcHJqNRRELRL58xZkpjveGtTSibkWSw1rQa2b9sJgWp\",\"360\":\"QmUjxXfsTXBvwAnXnBocEmMpAcDESUKJ1EZ7Yijt9AsJqR\"}}},\"dur\":\"203\",\"title\":\"What is Vulnerability Management?\",\"desc\":\"Vulnerability Management is a new field in the cybersecurity space. More and more companies are hiring people to do this manually, while we at Firo Solutions are continuing to provide an automated solution.\\n\\nhttps://firosolutions.com\\nhttps://blog.firosolutions.com\",\"tag\":\"security\",\"hide\":0,\"nsfw\":0,\"oc\":1,\"refs\":[]},\"tags\":[\"dtube\",\"security\"],\"app\":\"dtube/0.9\"}"
    }
  ]
}
2020/08/10 13:29:06
authorfirosolutions
permlinkthe-spread-of-the-corona-virus-through-letters-and-posts
sbd payout0.009 SBD
steem payout0.000 STEEM
vesting payout91.106226 VESTS
Transaction InfoBlock #45868153/Virtual Operation #3
View Raw JSON Data
{
  "trx_id": "0000000000000000000000000000000000000000",
  "block": 45868153,
  "trx_in_block": 4294967295,
  "op_in_trx": 0,
  "virtual_op": 3,
  "timestamp": "2020-08-10T13:29:06",
  "op": [
    "author_reward",
    {
      "author": "firosolutions",
      "permlink": "the-spread-of-the-corona-virus-through-letters-and-posts",
      "sbd_payout": "0.009 SBD",
      "steem_payout": "0.000 STEEM",
      "vesting_payout": "91.106226 VESTS"
    }
  ]
}
2020/08/03 14:01:54
voteryehey
authorfirosolutions
permlinkthe-spread-of-the-corona-virus-through-letters-and-posts
weight1000 (10.00%)
Transaction InfoBlock #45670746/Trx ed255d91305f27facc2f14973ac30f3db840e778
View Raw JSON Data
{
  "trx_id": "ed255d91305f27facc2f14973ac30f3db840e778",
  "block": 45670746,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-08-03T14:01:54",
  "op": [
    "vote",
    {
      "voter": "yehey",
      "author": "firosolutions",
      "permlink": "the-spread-of-the-corona-virus-through-letters-and-posts",
      "weight": 1000
    }
  ]
}
2020/08/03 13:29:06
parent author
parent permlinkcovid19
authorfirosolutions
permlinkthe-spread-of-the-corona-virus-through-letters-and-posts
titleThe spread of the corona virus through letters and posts
bodyThe spread of the covid19 virus is something that has truly shaken the world. ![image.png](https://cdn.steemitimages.com/DQmV5vqj1rzH7oKjdnDHeW1RkDS5A2j5KTtUS6Xkkii26hB/image.png) Since we are still using snail mail for receiving bills, postcards and other various letters. We are physically interacting with potential germs on the envelopes. What if the postman has corona? or someone working with physically handling your letters? If that’s the case, there is a big chance your post has gotten some type of germ that could potentially be related to corona. What do the experts say? Several studies explain that the virus can stay on various surfaces for a different amount of time A study by The Lancet shows that the virus only stays for up to 3 hours on regular printing paper, 4 days on glass and banknotes, 7 days for stainless steel and plastic, and up to 2 days on treated wood. Strikingly, a detectable level of infectious virus could still be present on the outer layer of a surgical mask on day 7 Corona surgical mask Funny enough, one of the surfaces the coronavirus was tested on was one of the widely used surgical masks that has taken the market by storm. The virus can live up to 7 days on the mask! Making it the outside of the mask on of the surfaces where the coronavirus lives the longest. Source: https://www.thelancet.com/action/showPdf?pii=S2666-5247%2820%2930003-3 The new England journal of medicine has published a research report that shows that the virus lives up to 24 hours on cardboard, 4 hours on copper Source: https://www.nejm.org/doi/full/10.1056/NEJMc2004973 Does this mean we all need to switch to using cryptocurrency, since the coronavirus last 4 days on paper money, 4 hours on copper coins and up to 7 days on plastic credit cards? Several economists have suggested that we switch to a Bimetallic standard. Where the currency is based and backed by Gold, Silver and copper. So far no research has been done on how long the covid-19 lifespan is on gold and silver. Although it has caused an increase in the demand for gold. A myth has arised that packages from china carry the corona virus with them. Yes, it is possible that the packages might be infected but due to the long shipping time. The virus is not able to stick around throughout the entire ride. If you are worried about getting the covid-19 virus from packages, we recommend that you disinfect the packages by applying an alcohol based solution to, such as spraying the cardboard packages with. Waiting a couple of days to open the package is also a recommended approach. The United States environmental protection agency has a list of recommended disinfectants to use against the covid-19 virus. You can find the list here: https://www.epa.gov/pesticide-registration/list-n-disinfectants-use-against-sars-cov-2-covid-19 However, letters and cardboard packages are likely to spread the covid-19 virus if they have traveled a shorter distance. Read more articles like this here: https://blog.nomadpostbox.com/
json metadata{"tags":["covid19"],"image":["https://cdn.steemitimages.com/DQmV5vqj1rzH7oKjdnDHeW1RkDS5A2j5KTtUS6Xkkii26hB/image.png"],"links":["https://www.thelancet.com/action/showPdf?pii=S2666-5247%2820%2930003-3","https://www.nejm.org/doi/full/10.1056/NEJMc2004973","https://www.epa.gov/pesticide-registration/list-n-disinfectants-use-against-sars-cov-2-covid-19","https://blog.nomadpostbox.com/"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #45670095/Trx c88c8f397c973dbdef363e3b8a14d36cecd90fd3
View Raw JSON Data
{
  "trx_id": "c88c8f397c973dbdef363e3b8a14d36cecd90fd3",
  "block": 45670095,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-08-03T13:29:06",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "covid19",
      "author": "firosolutions",
      "permlink": "the-spread-of-the-corona-virus-through-letters-and-posts",
      "title": "The spread of the corona virus through letters and posts",
      "body": "The spread of the covid19 virus is something that has truly shaken\nthe world.\n\n\n![image.png](https://cdn.steemitimages.com/DQmV5vqj1rzH7oKjdnDHeW1RkDS5A2j5KTtUS6Xkkii26hB/image.png)\n\n\nSince we are still using snail mail for receiving bills, postcards and\nother various letters. We are physically interacting with potential\ngerms on the envelopes.\nWhat if the postman has corona? or someone working with physically\nhandling your letters?\n\nIf that’s the case, there is a big chance your post has gotten some\ntype of germ that could potentially be related to corona.\nWhat do the experts say?\n\nSeveral studies explain that the virus can stay on various surfaces\nfor a different amount of time\n\nA study by The Lancet shows that the virus only stays for up to 3 hours\non regular printing paper, 4 days on glass and banknotes, 7 days for\nstainless steel and plastic, and up to 2 days on treated wood.\n\nStrikingly, a detectable level of infectious virus could still be present on the outer layer of a surgical mask on day 7\n\nCorona surgical mask\n\nFunny enough, one of the surfaces the coronavirus was tested on\nwas one of the widely used surgical masks that has taken the market\nby storm.\nThe virus can live up to 7 days on the mask!\nMaking it the outside of the mask on of the surfaces where the\ncoronavirus lives the longest.\n\nSource:\nhttps://www.thelancet.com/action/showPdf?pii=S2666-5247%2820%2930003-3\n\nThe new England journal of medicine has published a research report\nthat shows that the virus lives up to 24 hours on cardboard, 4 hours on\ncopper\n\nSource:\nhttps://www.nejm.org/doi/full/10.1056/NEJMc2004973\n\nDoes this mean we all need to switch to using cryptocurrency, since\nthe coronavirus last 4 days on paper money, 4 hours on copper coins\nand up to 7 days on plastic credit cards?\n\nSeveral economists have suggested that we switch to a Bimetallic standard.\nWhere the currency is based and backed by Gold, Silver and copper.\nSo far no research has been done on how long the covid-19 lifespan\nis on gold and silver.\nAlthough it has caused an increase in the demand for gold.\n\nA myth has arised that packages from china carry the corona\nvirus with them.\nYes, it is possible that the packages might be infected but due to\nthe long shipping time. The virus is not able to stick around throughout\nthe entire ride.\n\nIf you are worried about getting the covid-19 virus from packages,\nwe recommend that you disinfect the packages by applying an alcohol\nbased solution to, such as spraying the cardboard packages with.\nWaiting a couple of days to open the package is also a recommended approach.\n\nThe United States environmental protection agency has a list\nof recommended disinfectants to use against\nthe covid-19 virus.\nYou can find the list here:\nhttps://www.epa.gov/pesticide-registration/list-n-disinfectants-use-against-sars-cov-2-covid-19\n\nHowever, letters and cardboard packages are likely to spread the\ncovid-19 virus if they have traveled a shorter distance.\n\n\nRead more articles like this here:\nhttps://blog.nomadpostbox.com/",
      "json_metadata": "{\"tags\":[\"covid19\"],\"image\":[\"https://cdn.steemitimages.com/DQmV5vqj1rzH7oKjdnDHeW1RkDS5A2j5KTtUS6Xkkii26hB/image.png\"],\"links\":[\"https://www.thelancet.com/action/showPdf?pii=S2666-5247%2820%2930003-3\",\"https://www.nejm.org/doi/full/10.1056/NEJMc2004973\",\"https://www.epa.gov/pesticide-registration/list-n-disinfectants-use-against-sars-cov-2-covid-19\",\"https://blog.nomadpostbox.com/\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2020/07/15 19:04:27
parent author
parent permlinksecurity
authorfirosolutions
permlinknew-episode-of-security-headlines-podcast
titleNew episode of Security Headlines Podcast
body## Security headlines is baaack! With a fresh episode talking with klondike about: How klondike got in to the security field Gentoo Getting in to Gentoo Installing Gentoo linux manually How to install Gentoo linux Gentoo linux for beginners. hardend gentoo GRSEC patches Manditory access control Security Capture the flag Lan party Internet of things IoT password security Rolling release nftables vs iptables Cryptography WannaCry Ransomeware ChaCha20 Malware developers Chalmers Sec-t Petya Malware Vault 7 Safe cryptography libsodium Easy to use, clear api and cross platform best practices Breaking Petyas encryption with pen and paper Running gentoo in production Quantum Cryptography Breaking Bitcoin Swedish military Cryptography Shamir’s Secret Sharing Future of cryptography Hackerspaces Gentoo in production libressl Listen to it here: https://anchor.fm/firo-solutions/episodes/Security-Headlines-with-Klondike-egpo1g/a-a2n5m6h
json metadata{"tags":["security"],"links":["https://anchor.fm/firo-solutions/episodes/Security-Headlines-with-Klondike-egpo1g/a-a2n5m6h"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #45134192/Trx cc3670d426dfe44d44612bf065fcc5a694668cac
View Raw JSON Data
{
  "trx_id": "cc3670d426dfe44d44612bf065fcc5a694668cac",
  "block": 45134192,
  "trx_in_block": 7,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-07-15T19:04:27",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "security",
      "author": "firosolutions",
      "permlink": "new-episode-of-security-headlines-podcast",
      "title": "New episode of Security Headlines Podcast",
      "body": "## Security headlines is baaack! \n        \n\n\n\n\nWith a fresh episode talking with klondike about: \nHow klondike got in to the security field\nGentoo\nGetting in to Gentoo\nInstalling Gentoo linux manually\nHow to install Gentoo linux\nGentoo linux for beginners.\nhardend gentoo\nGRSEC patches\nManditory access control\nSecurity Capture the flag\nLan party\nInternet of things IoT\npassword security\nRolling release\nnftables vs iptables\nCryptography\nWannaCry Ransomeware\nChaCha20\nMalware developers\nChalmers\nSec-t\nPetya Malware\nVault 7\nSafe cryptography\nlibsodium\nEasy to use, clear api and cross platform best practices\nBreaking Petyas encryption with pen and paper\nRunning gentoo in production\nQuantum Cryptography\nBreaking Bitcoin\nSwedish military Cryptography\nShamir’s Secret Sharing\nFuture of cryptography\nHackerspaces\nGentoo in production\nlibressl\n\nListen to it here:\nhttps://anchor.fm/firo-solutions/episodes/Security-Headlines-with-Klondike-egpo1g/a-a2n5m6h",
      "json_metadata": "{\"tags\":[\"security\"],\"links\":[\"https://anchor.fm/firo-solutions/episodes/Security-Headlines-with-Klondike-egpo1g/a-a2n5m6h\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
firosolutionspublished a new post: fsve4rr434p
2020/07/10 13:58:06
parent author
parent permlinkhive-196037
authorfirosolutions
permlinkfsve4rr434p
titleFuzzing Rust with Shnatsel Podcast
body<center><a href='https://d.tube/#!/v/firosolutions/fsve4rr434p'><img src='https://snap1.d.tube/ipfs/QmQ7tH7yoxHFibJcgtmmjvM6q7uZ7d41szPUnGRnMWPGk3' ></a></center><hr> Fuzzing Rust with Shnatsel In this fresh episode of Security headlines we interview Shnatsel about rust fuzzing, we jump in the rabbit holes of Rust and fuzzing and explore the magical world. In this episode we cover: Fuzzing in rust i side track to openbsd ofc we talk about internal builds using clippy to inform people about best pratices clippy in Rust CI systems Rust in enterprise systems linting in rust the cargo build system security exploits rebuilding binaries cloud binaries cargo rfc cargo fuzz AFL/american fuzzyloop, hongfuzz, libfuzzer statical binaries dependencies in rust finding zero days unmaintained code in production versions in binaries auditing binaries finding bugs in rust, C and C++ code claiming CVEs address sanitizer going beyond address sanitizer to find use after free/Use of uninitialized memory bugs binary parser angola fuzzer memory sanitizer finding new and interesting bugs in your codebase rust sub reddit libdfuzz Podcast link: https://anchor.fm/firo-solutions/episodes/Fuzzing-Rust-with-Shnatsel-egfb3j External links: https://github.com/rust-fuzz/auto-fuzz-test https://github.com/Shnatsel/rust-audit https://github.com/AngoraFuzzer/Angora https://web.cs.ucdavis.edu/~hchen/paper/chen2018angora.pdf https://github.com/rust-fuzz/cargo-fuzz https://github.com/avadacatavra/unsafe-unicorn https://rust.firosolutions.com https://reddit.com/r/Rust https://lcamtuf.coredump.cx/afl/ https://github.com/rust-fuzz https://github.com/rust-fuzz/trophy-case https://blog.firosolutions.com/2020/07/superhero-rust-fuzzing/ <hr><a href='https://d.tube/#!/v/firosolutions/fsve4rr434p'> ▶️ DTube</a><br /><a href='https://btfs.d.tube/btfs/QmbVF3F2BBHN2XJaHJUfzhkqR7DCCRbKpdvfVUDkwVcZFG'> ▶️ BTFS</a><br />
json metadata{"video":{"files":{"btfs":{"vid":{"src":"QmRoCijCg9Q5k4WHCEetBuUPHmZSmyqhbbQNVtXXoNWAAz"},"img":{"spr":"QmZq4KE7uVzrraixQjizJmARTHCgrXx2GDWS5hNCG3bg6V"}},"ipfs":{"img":{}}},"dur":"3816","title":"Fuzzing Rust with Shnatsel Podcast","desc":"Fuzzing Rust with Shnatsel interview\n\n\nIn this fresh episode of Security headlines we interview Shnatsel\nabout rust fuzzing, we jump in the rabbit holes of Rust and fuzzing and\nexplore the magical world.\nIn this episode we cover:\nFuzzing in rust\ni side track to openbsd ofc\nwe talk about internal builds\nusing clippy to inform people about best pratices\nclippy in Rust CI systems\nRust in enterprise systems\nlinting in rust\nthe cargo build system\nsecurity exploits\nrebuilding binaries\ncloud binaries\ncargo rfc\ncargo fuzz\nAFL/american fuzzyloop, hongfuzz, libfuzzer\nstatical binaries\ndependencies in rust\nfinding zero days\nunmaintained code in production\nversions in binaries\nauditing binaries\nfinding bugs in rust, C and C++ code\nclaiming CVEs\naddress sanitizer\ngoing beyond address sanitizer to find use after free/Use of uninitialized memory bugs\nbinary parser\nangola fuzzer\nmemory sanitizer\nfinding new and interesting bugs in your codebase\nrust sub reddit\nlibdfuzz\n\nPodcast link:\nhttps://anchor.fm/firo-solutions/episodes/Fuzzing-Rust-with-Shnatsel-egfb3j\n\nExternal links:\nhttps://github.com/rust-fuzz/auto-fuzz-test\nhttps://github.com/Shnatsel/rust-audit\nhttps://github.com/AngoraFuzzer/Angora\nhttps://web.cs.ucdavis.edu/~hchen/paper/chen2018angora.pdf\nhttps://github.com/rust-fuzz/cargo-fuzz\nhttps://github.com/avadacatavra/unsafe-unicorn\nhttps://rust.firosolutions.com\nhttps://reddit.com/r/Rust\nhttps://lcamtuf.coredump.cx/afl/\nhttps://github.com/rust-fuzz\nhttps://github.com/rust-fuzz/trophy-case\nhttps://blog.firosolutions.com/2020/07/superhero-rust-fuzzing/","tag":"security","hide":0,"nsfw":0,"oc":1,"refs":[],"app":"dtube/0.9","tags":["dtube","security"],"thumbnailUrl":"https://snap1.d.tube/ipfs/QmZN4tvYY5LiE6QWpHvMMdV5yhf7ru14fPh2WwSPrnJv9u"},"tags":["dtube","security"],"app":"dtube/0.9"}
Transaction InfoBlock #44985507/Trx e02e8133b8f7b03f50c20a92c02878a75ac66c20
View Raw JSON Data
{
  "trx_id": "e02e8133b8f7b03f50c20a92c02878a75ac66c20",
  "block": 44985507,
  "trx_in_block": 6,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-07-10T13:58:06",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "hive-196037",
      "author": "firosolutions",
      "permlink": "fsve4rr434p",
      "title": "Fuzzing Rust with Shnatsel Podcast",
      "body": "<center><a href='https://d.tube/#!/v/firosolutions/fsve4rr434p'><img src='https://snap1.d.tube/ipfs/QmQ7tH7yoxHFibJcgtmmjvM6q7uZ7d41szPUnGRnMWPGk3' ></a></center><hr>\n\nFuzzing Rust with Shnatsel\n\n\nIn this fresh episode of Security headlines we interview Shnatsel\nabout rust fuzzing, we jump in the rabbit holes of Rust and fuzzing and\nexplore the magical world.\nIn this episode we cover:\nFuzzing in rust\ni side track to openbsd ofc\nwe talk about internal builds\nusing clippy to inform people about best pratices\nclippy in Rust CI systems\nRust in enterprise systems\nlinting in rust\nthe cargo build system\nsecurity exploits\nrebuilding binaries\ncloud binaries\ncargo rfc\ncargo fuzz\nAFL/american fuzzyloop, hongfuzz, libfuzzer\nstatical binaries\ndependencies in rust\nfinding zero days\nunmaintained code in production\nversions in binaries\nauditing binaries\nfinding bugs in rust, C and C++ code\nclaiming CVEs\naddress sanitizer\ngoing beyond address sanitizer to find use after free/Use of uninitialized memory bugs\nbinary parser\nangola fuzzer\nmemory sanitizer\nfinding new and interesting bugs in your codebase\nrust sub reddit\nlibdfuzz\n\nPodcast link:\nhttps://anchor.fm/firo-solutions/episodes/Fuzzing-Rust-with-Shnatsel-egfb3j\n\nExternal links:\nhttps://github.com/rust-fuzz/auto-fuzz-test\nhttps://github.com/Shnatsel/rust-audit\nhttps://github.com/AngoraFuzzer/Angora\nhttps://web.cs.ucdavis.edu/~hchen/paper/chen2018angora.pdf\nhttps://github.com/rust-fuzz/cargo-fuzz\nhttps://github.com/avadacatavra/unsafe-unicorn\nhttps://rust.firosolutions.com\nhttps://reddit.com/r/Rust\nhttps://lcamtuf.coredump.cx/afl/\nhttps://github.com/rust-fuzz\nhttps://github.com/rust-fuzz/trophy-case\nhttps://blog.firosolutions.com/2020/07/superhero-rust-fuzzing/\n\n<hr><a href='https://d.tube/#!/v/firosolutions/fsve4rr434p'> ▶️ DTube</a><br /><a href='https://btfs.d.tube/btfs/QmbVF3F2BBHN2XJaHJUfzhkqR7DCCRbKpdvfVUDkwVcZFG'> ▶️ BTFS</a><br />",
      "json_metadata": "{\"video\":{\"files\":{\"btfs\":{\"vid\":{\"src\":\"QmRoCijCg9Q5k4WHCEetBuUPHmZSmyqhbbQNVtXXoNWAAz\"},\"img\":{\"spr\":\"QmZq4KE7uVzrraixQjizJmARTHCgrXx2GDWS5hNCG3bg6V\"}},\"ipfs\":{\"img\":{}}},\"dur\":\"3816\",\"title\":\"Fuzzing Rust with Shnatsel Podcast\",\"desc\":\"Fuzzing Rust with Shnatsel interview\\n\\n\\nIn this fresh episode of Security headlines we interview Shnatsel\\nabout rust fuzzing, we jump in the rabbit holes of Rust and fuzzing and\\nexplore the magical world.\\nIn this episode we cover:\\nFuzzing in rust\\ni side track to openbsd ofc\\nwe talk about internal builds\\nusing clippy to inform people about best pratices\\nclippy in Rust CI systems\\nRust in enterprise systems\\nlinting in rust\\nthe cargo build system\\nsecurity exploits\\nrebuilding binaries\\ncloud binaries\\ncargo rfc\\ncargo fuzz\\nAFL/american fuzzyloop, hongfuzz, libfuzzer\\nstatical binaries\\ndependencies in rust\\nfinding zero days\\nunmaintained code in production\\nversions in binaries\\nauditing binaries\\nfinding bugs in rust, C and C++ code\\nclaiming CVEs\\naddress sanitizer\\ngoing beyond address sanitizer to find use after free/Use of uninitialized memory bugs\\nbinary parser\\nangola fuzzer\\nmemory sanitizer\\nfinding new and interesting bugs in your codebase\\nrust sub reddit\\nlibdfuzz\\n\\nPodcast link:\\nhttps://anchor.fm/firo-solutions/episodes/Fuzzing-Rust-with-Shnatsel-egfb3j\\n\\nExternal links:\\nhttps://github.com/rust-fuzz/auto-fuzz-test\\nhttps://github.com/Shnatsel/rust-audit\\nhttps://github.com/AngoraFuzzer/Angora\\nhttps://web.cs.ucdavis.edu/~hchen/paper/chen2018angora.pdf\\nhttps://github.com/rust-fuzz/cargo-fuzz\\nhttps://github.com/avadacatavra/unsafe-unicorn\\nhttps://rust.firosolutions.com\\nhttps://reddit.com/r/Rust\\nhttps://lcamtuf.coredump.cx/afl/\\nhttps://github.com/rust-fuzz\\nhttps://github.com/rust-fuzz/trophy-case\\nhttps://blog.firosolutions.com/2020/07/superhero-rust-fuzzing/\",\"tag\":\"security\",\"hide\":0,\"nsfw\":0,\"oc\":1,\"refs\":[],\"app\":\"dtube/0.9\",\"tags\":[\"dtube\",\"security\"],\"thumbnailUrl\":\"https://snap1.d.tube/ipfs/QmZN4tvYY5LiE6QWpHvMMdV5yhf7ru14fPh2WwSPrnJv9u\"},\"tags\":[\"dtube\",\"security\"],\"app\":\"dtube/0.9\"}"
    }
  ]
}
steemdelegated 17.569 SP to @firosolutions
2020/07/08 17:00:21
delegatorsteem
delegateefirosolutions
vesting shares28608.627730 VESTS
Transaction InfoBlock #44932064/Trx 81fd9dea42687aaf8ed8b74bd36d2f79641ccf4b
View Raw JSON Data
{
  "trx_id": "81fd9dea42687aaf8ed8b74bd36d2f79641ccf4b",
  "block": 44932064,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-07-08T17:00:21",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "firosolutions",
      "vesting_shares": "28608.627730 VESTS"
    }
  ]
}
firosolutionsclaimed reward balance: 0.179 STEEM, 0.068 SBD, 0.676 SP
2020/07/08 16:12:18
accountfirosolutions
reward steem0.179 STEEM
reward sbd0.068 SBD
reward vests1100.546575 VESTS
Transaction InfoBlock #44931110/Trx 01497f39a321bcc67330324b5aee411e26cbd525
View Raw JSON Data
{
  "trx_id": "01497f39a321bcc67330324b5aee411e26cbd525",
  "block": 44931110,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-07-08T16:12:18",
  "op": [
    "claim_reward_balance",
    {
      "account": "firosolutions",
      "reward_steem": "0.179 STEEM",
      "reward_sbd": "0.068 SBD",
      "reward_vests": "1100.546575 VESTS"
    }
  ]
}
firosolutionsupdated options for fsve4rr434p
2020/07/08 14:50:36
authorfirosolutions
permlinkfsve4rr434p
max accepted payout1000000.000 SBD
percent steem dollars0
allow votestrue
allow curation rewardstrue
extensions[[0,{"beneficiaries":[{"account":"dtube","weight":1000}]}]]
Transaction InfoBlock #44929492/Trx 4646f722258b62c80c96585881bfc0baf3fd13b2
View Raw JSON Data
{
  "trx_id": "4646f722258b62c80c96585881bfc0baf3fd13b2",
  "block": 44929492,
  "trx_in_block": 5,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-07-08T14:50:36",
  "op": [
    "comment_options",
    {
      "author": "firosolutions",
      "permlink": "fsve4rr434p",
      "max_accepted_payout": "1000000.000 SBD",
      "percent_steem_dollars": 0,
      "allow_votes": true,
      "allow_curation_rewards": true,
      "extensions": [
        [
          0,
          {
            "beneficiaries": [
              {
                "account": "dtube",
                "weight": 1000
              }
            ]
          }
        ]
      ]
    }
  ]
}
firosolutionspublished a new post: fsve4rr434p
2020/07/08 14:50:36
parent author
parent permlinkhive-196037
authorfirosolutions
permlinkfsve4rr434p
titleFuzzing Rust with Shnatsel Podcast
body<center><a href='https://d.tube/#!/v/firosolutions/fsve4rr434p'><img src='https://snap1.d.tube/ipfs/QmQ7tH7yoxHFibJcgtmmjvM6q7uZ7d41szPUnGRnMWPGk3' ></a></center><hr> Fuzzing Rust with Shnatsel In this fresh episode of Security headlines we interview Shnatsel about rust fuzzing, we jump in the rabbit holes of Rust and fuzzing and explore the magical world. In this episode we cover: Fuzzing in rust i side track to openbsd ofc we talk about internal builds using clippy to inform people about best pratices clippy in Rust CI systems Rust in enterprise systems linting in rust the cargo build system security exploits rebuilding binaries cloud binaries cargo rfc cargo fuzz AFL/american fuzzyloop, hongfuzz, libfuzzer statical binaries dependencies in rust finding zero days unmaintained code in production versions in binaries auditing binaries finding bugs in rust, C and C++ code claiming CVEs address sanitizer going beyond address sanitizer to find use after free/Use of uninitialized memory bugs binary parser angola fuzzer memory sanitizer finding new and interesting bugs in your codebase rust sub reddit libdfuzz Podcast link: https://anchor.fm/firo-solutions/episodes/Fuzzing-Rust-with-Shnatsel-egfb3j External links: https://github.com/rust-fuzz/auto-fuzz-test https://github.com/Shnatsel/rust-audit https://github.com/AngoraFuzzer/Angora https://web.cs.ucdavis.edu/~hchen/paper/chen2018angora.pdf https://github.com/rust-fuzz/cargo-fuzz https://github.com/avadacatavra/unsafe-unicorn https://rust.firosolutions.com https://reddit.com/r/Rust https://lcamtuf.coredump.cx/afl/ https://github.com/rust-fuzz https://github.com/rust-fuzz/trophy-case https://blog.firosolutions.com/2020/07/superhero-rust-fuzzing/ <hr><a href='https://d.tube/#!/v/firosolutions/fsve4rr434p'> ▶️ DTube</a><br /><a href='https://btfs.d.tube/btfs/QmbVF3F2BBHN2XJaHJUfzhkqR7DCCRbKpdvfVUDkwVcZFG'> ▶️ BTFS</a><br />
json metadata{"video":{"files":{"btfs":{"vid":{"src":"QmbVF3F2BBHN2XJaHJUfzhkqR7DCCRbKpdvfVUDkwVcZFG"},"img":{"spr":"QmZq4KE7uVzrraixQjizJmARTHCgrXx2GDWS5hNCG3bg6V"}},"ipfs":{"img":{"118":"QmZN4tvYY5LiE6QWpHvMMdV5yhf7ru14fPh2WwSPrnJv9u","360":"QmQ7tH7yoxHFibJcgtmmjvM6q7uZ7d41szPUnGRnMWPGk3"}}},"dur":"3816","title":"Fuzzing Rust with Shnatsel Podcast","desc":"Fuzzing Rust with Shnatsel\n\n\nIn this fresh episode of Security headlines we interview Shnatsel\nabout rust fuzzing, we jump in the rabbit holes of Rust and fuzzing and\nexplore the magical world.\nIn this episode we cover:\nFuzzing in rust\ni side track to openbsd ofc\nwe talk about internal builds\nusing clippy to inform people about best pratices\nclippy in Rust CI systems\nRust in enterprise systems\nlinting in rust\nthe cargo build system\nsecurity exploits\nrebuilding binaries\ncloud binaries\ncargo rfc\ncargo fuzz\nAFL/american fuzzyloop, hongfuzz, libfuzzer\nstatical binaries\ndependencies in rust\nfinding zero days\nunmaintained code in production\nversions in binaries\nauditing binaries\nfinding bugs in rust, C and C++ code\nclaiming CVEs\naddress sanitizer\ngoing beyond address sanitizer to find use after free/Use of uninitialized memory bugs\nbinary parser\nangola fuzzer\nmemory sanitizer\nfinding new and interesting bugs in your codebase\nrust sub reddit\nlibdfuzz\n\nPodcast link:\nhttps://anchor.fm/firo-solutions/episodes/Fuzzing-Rust-with-Shnatsel-egfb3j\n\nExternal links:\nhttps://github.com/rust-fuzz/auto-fuzz-test\nhttps://github.com/Shnatsel/rust-audit\nhttps://github.com/AngoraFuzzer/Angora\nhttps://web.cs.ucdavis.edu/~hchen/paper/chen2018angora.pdf\nhttps://github.com/rust-fuzz/cargo-fuzz\nhttps://github.com/avadacatavra/unsafe-unicorn\nhttps://rust.firosolutions.com\nhttps://reddit.com/r/Rust\nhttps://lcamtuf.coredump.cx/afl/\nhttps://github.com/rust-fuzz\nhttps://github.com/rust-fuzz/trophy-case\nhttps://blog.firosolutions.com/2020/07/superhero-rust-fuzzing/","tag":"security","hide":0,"nsfw":0,"oc":1,"refs":[]},"tags":["dtube","security"],"app":"dtube/0.9"}
Transaction InfoBlock #44929492/Trx 4646f722258b62c80c96585881bfc0baf3fd13b2
View Raw JSON Data
{
  "trx_id": "4646f722258b62c80c96585881bfc0baf3fd13b2",
  "block": 44929492,
  "trx_in_block": 5,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-07-08T14:50:36",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "hive-196037",
      "author": "firosolutions",
      "permlink": "fsve4rr434p",
      "title": "Fuzzing Rust with Shnatsel Podcast",
      "body": "<center><a href='https://d.tube/#!/v/firosolutions/fsve4rr434p'><img src='https://snap1.d.tube/ipfs/QmQ7tH7yoxHFibJcgtmmjvM6q7uZ7d41szPUnGRnMWPGk3' ></a></center><hr>\n\nFuzzing Rust with Shnatsel\n\n\nIn this fresh episode of Security headlines we interview Shnatsel\nabout rust fuzzing, we jump in the rabbit holes of Rust and fuzzing and\nexplore the magical world.\nIn this episode we cover:\nFuzzing in rust\ni side track to openbsd ofc\nwe talk about internal builds\nusing clippy to inform people about best pratices\nclippy in Rust CI systems\nRust in enterprise systems\nlinting in rust\nthe cargo build system\nsecurity exploits\nrebuilding binaries\ncloud binaries\ncargo rfc\ncargo fuzz\nAFL/american fuzzyloop, hongfuzz, libfuzzer\nstatical binaries\ndependencies in rust\nfinding zero days\nunmaintained code in production\nversions in binaries\nauditing binaries\nfinding bugs in rust, C and C++ code\nclaiming CVEs\naddress sanitizer\ngoing beyond address sanitizer to find use after free/Use of uninitialized memory bugs\nbinary parser\nangola fuzzer\nmemory sanitizer\nfinding new and interesting bugs in your codebase\nrust sub reddit\nlibdfuzz\n\nPodcast link:\nhttps://anchor.fm/firo-solutions/episodes/Fuzzing-Rust-with-Shnatsel-egfb3j\n\nExternal links:\nhttps://github.com/rust-fuzz/auto-fuzz-test\nhttps://github.com/Shnatsel/rust-audit\nhttps://github.com/AngoraFuzzer/Angora\nhttps://web.cs.ucdavis.edu/~hchen/paper/chen2018angora.pdf\nhttps://github.com/rust-fuzz/cargo-fuzz\nhttps://github.com/avadacatavra/unsafe-unicorn\nhttps://rust.firosolutions.com\nhttps://reddit.com/r/Rust\nhttps://lcamtuf.coredump.cx/afl/\nhttps://github.com/rust-fuzz\nhttps://github.com/rust-fuzz/trophy-case\nhttps://blog.firosolutions.com/2020/07/superhero-rust-fuzzing/\n\n<hr><a href='https://d.tube/#!/v/firosolutions/fsve4rr434p'> ▶️ DTube</a><br /><a href='https://btfs.d.tube/btfs/QmbVF3F2BBHN2XJaHJUfzhkqR7DCCRbKpdvfVUDkwVcZFG'> ▶️ BTFS</a><br />",
      "json_metadata": "{\"video\":{\"files\":{\"btfs\":{\"vid\":{\"src\":\"QmbVF3F2BBHN2XJaHJUfzhkqR7DCCRbKpdvfVUDkwVcZFG\"},\"img\":{\"spr\":\"QmZq4KE7uVzrraixQjizJmARTHCgrXx2GDWS5hNCG3bg6V\"}},\"ipfs\":{\"img\":{\"118\":\"QmZN4tvYY5LiE6QWpHvMMdV5yhf7ru14fPh2WwSPrnJv9u\",\"360\":\"QmQ7tH7yoxHFibJcgtmmjvM6q7uZ7d41szPUnGRnMWPGk3\"}}},\"dur\":\"3816\",\"title\":\"Fuzzing Rust with Shnatsel Podcast\",\"desc\":\"Fuzzing Rust with Shnatsel\\n\\n\\nIn this fresh episode of Security headlines we interview Shnatsel\\nabout rust fuzzing, we jump in the rabbit holes of Rust and fuzzing and\\nexplore the magical world.\\nIn this episode we cover:\\nFuzzing in rust\\ni side track to openbsd ofc\\nwe talk about internal builds\\nusing clippy to inform people about best pratices\\nclippy in Rust CI systems\\nRust in enterprise systems\\nlinting in rust\\nthe cargo build system\\nsecurity exploits\\nrebuilding binaries\\ncloud binaries\\ncargo rfc\\ncargo fuzz\\nAFL/american fuzzyloop, hongfuzz, libfuzzer\\nstatical binaries\\ndependencies in rust\\nfinding zero days\\nunmaintained code in production\\nversions in binaries\\nauditing binaries\\nfinding bugs in rust, C and C++ code\\nclaiming CVEs\\naddress sanitizer\\ngoing beyond address sanitizer to find use after free/Use of uninitialized memory bugs\\nbinary parser\\nangola fuzzer\\nmemory sanitizer\\nfinding new and interesting bugs in your codebase\\nrust sub reddit\\nlibdfuzz\\n\\nPodcast link:\\nhttps://anchor.fm/firo-solutions/episodes/Fuzzing-Rust-with-Shnatsel-egfb3j\\n\\nExternal links:\\nhttps://github.com/rust-fuzz/auto-fuzz-test\\nhttps://github.com/Shnatsel/rust-audit\\nhttps://github.com/AngoraFuzzer/Angora\\nhttps://web.cs.ucdavis.edu/~hchen/paper/chen2018angora.pdf\\nhttps://github.com/rust-fuzz/cargo-fuzz\\nhttps://github.com/avadacatavra/unsafe-unicorn\\nhttps://rust.firosolutions.com\\nhttps://reddit.com/r/Rust\\nhttps://lcamtuf.coredump.cx/afl/\\nhttps://github.com/rust-fuzz\\nhttps://github.com/rust-fuzz/trophy-case\\nhttps://blog.firosolutions.com/2020/07/superhero-rust-fuzzing/\",\"tag\":\"security\",\"hide\":0,\"nsfw\":0,\"oc\":1,\"refs\":[]},\"tags\":[\"dtube\",\"security\"],\"app\":\"dtube/0.9\"}"
    }
  ]
}
2020/07/08 14:46:33
voterhillybilly
authorfirosolutions
permlinkfuzzing-rust-with-shnatsel-podcast
weight10000 (100.00%)
Transaction InfoBlock #44929412/Trx fce23cb07e946846b5f80ce7b934f16a8ab0e4d9
View Raw JSON Data
{
  "trx_id": "fce23cb07e946846b5f80ce7b934f16a8ab0e4d9",
  "block": 44929412,
  "trx_in_block": 5,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-07-08T14:46:33",
  "op": [
    "vote",
    {
      "voter": "hillybilly",
      "author": "firosolutions",
      "permlink": "fuzzing-rust-with-shnatsel-podcast",
      "weight": 10000
    }
  ]
}
2020/07/08 14:43:27
parent author
parent permlinksecurity
authorfirosolutions
permlinkfuzzing-rust-with-shnatsel-podcast
titleFuzzing Rust with Shnatsel Podcast
bodyFuzzing Rust with Shnatsel In this fresh episode of Security headlines we interview Shnatsel about rust fuzzing, we jump in the rabbit holes of Rust and fuzzing and explore the magical world. In this episode we cover: Fuzzing in rust i side track to openbsd ofc we talk about internal builds using clippy to inform people about best pratices clippy in Rust CI systems Rust in enterprise systems linting in rust the cargo build system security exploits rebuilding binaries cloud binaries cargo rfc cargo fuzz AFL/american fuzzyloop, hongfuzz, libfuzzer statical binaries dependencies in rust finding zero days unmaintained code in production versions in binaries auditing binaries finding bugs in rust, C and C++ code claiming CVEs address sanitizer going beyond address sanitizer to find use after free/Use of uninitialized memory bugs binary parser angola fuzzer memory sanitizer finding new and interesting bugs in your codebase rust sub reddit libdfuzz Listen to it here: https://anchor.fm/firo-solutions/episodes/Fuzzing-Rust-with-Shnatsel-egfb3j External links: https://github.com/rust-fuzz/auto-fuzz-test https://github.com/Shnatsel/rust-audit https://github.com/AngoraFuzzer/Angora https://web.cs.ucdavis.edu/~hchen/paper/chen2018angora.pdf https://github.com/rust-fuzz/cargo-fuzz https://github.com/avadacatavra/unsafe-unicorn https://rust.firosolutions.com https://reddit.com/r/Rust https://lcamtuf.coredump.cx/afl/ https://github.com/rust-fuzz https://github.com/rust-fuzz/trophy-case https://blog.firosolutions.com/2020/07/superhero-rust-fuzzing/
json metadata{"tags":["security"],"links":["https://anchor.fm/firo-solutions/episodes/Fuzzing-Rust-with-Shnatsel-egfb3j","https://github.com/rust-fuzz/auto-fuzz-test","https://github.com/Shnatsel/rust-audit","https://github.com/AngoraFuzzer/Angora","https://web.cs.ucdavis.edu/~hchen/paper/chen2018angora.pdf","https://github.com/rust-fuzz/cargo-fuzz","https://github.com/avadacatavra/unsafe-unicorn","https://rust.firosolutions.com","https://reddit.com/r/Rust","https://lcamtuf.coredump.cx/afl/","https://github.com/rust-fuzz","https://github.com/rust-fuzz/trophy-case","https://blog.firosolutions.com/2020/07/superhero-rust-fuzzing/"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #44929351/Trx afcef3feea57e1afb12773a73bcc1dda53117865
View Raw JSON Data
{
  "trx_id": "afcef3feea57e1afb12773a73bcc1dda53117865",
  "block": 44929351,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-07-08T14:43:27",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "security",
      "author": "firosolutions",
      "permlink": "fuzzing-rust-with-shnatsel-podcast",
      "title": "Fuzzing Rust with Shnatsel Podcast",
      "body": "Fuzzing Rust with Shnatsel\nIn this fresh episode of Security headlines we interview Shnatsel\nabout rust fuzzing, we jump in the rabbit holes of Rust and fuzzing and\nexplore the magical world.\nIn this episode we cover:\nFuzzing in rust\ni side track to openbsd ofc\nwe talk about internal builds\nusing clippy to inform people about best pratices\nclippy in Rust CI systems\nRust in enterprise systems\nlinting in rust\nthe cargo build system\nsecurity exploits\nrebuilding binaries\ncloud binaries\ncargo rfc\ncargo fuzz\nAFL/american fuzzyloop, hongfuzz, libfuzzer\nstatical binaries\ndependencies in rust\nfinding zero days\nunmaintained code in production\nversions in binaries\nauditing binaries\nfinding bugs in rust, C and C++ code\nclaiming CVEs\naddress sanitizer\ngoing beyond address sanitizer to find use after free/Use of uninitialized memory bugs\nbinary parser\nangola fuzzer\nmemory sanitizer\nfinding new and interesting bugs in your codebase\nrust sub reddit\nlibdfuzz\nListen to it here:\nhttps://anchor.fm/firo-solutions/episodes/Fuzzing-Rust-with-Shnatsel-egfb3j\nExternal links:\nhttps://github.com/rust-fuzz/auto-fuzz-test\nhttps://github.com/Shnatsel/rust-audit\nhttps://github.com/AngoraFuzzer/Angora\nhttps://web.cs.ucdavis.edu/~hchen/paper/chen2018angora.pdf\nhttps://github.com/rust-fuzz/cargo-fuzz\nhttps://github.com/avadacatavra/unsafe-unicorn\nhttps://rust.firosolutions.com\nhttps://reddit.com/r/Rust\nhttps://lcamtuf.coredump.cx/afl/\nhttps://github.com/rust-fuzz\nhttps://github.com/rust-fuzz/trophy-case\nhttps://blog.firosolutions.com/2020/07/superhero-rust-fuzzing/",
      "json_metadata": "{\"tags\":[\"security\"],\"links\":[\"https://anchor.fm/firo-solutions/episodes/Fuzzing-Rust-with-Shnatsel-egfb3j\",\"https://github.com/rust-fuzz/auto-fuzz-test\",\"https://github.com/Shnatsel/rust-audit\",\"https://github.com/AngoraFuzzer/Angora\",\"https://web.cs.ucdavis.edu/~hchen/paper/chen2018angora.pdf\",\"https://github.com/rust-fuzz/cargo-fuzz\",\"https://github.com/avadacatavra/unsafe-unicorn\",\"https://rust.firosolutions.com\",\"https://reddit.com/r/Rust\",\"https://lcamtuf.coredump.cx/afl/\",\"https://github.com/rust-fuzz\",\"https://github.com/rust-fuzz/trophy-case\",\"https://blog.firosolutions.com/2020/07/superhero-rust-fuzzing/\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
firosolutionsreceived 0.015 SBD, 0.090 SP author reward for @firosolutions / php-fusion-security-vulnerabilities-2020
2020/06/24 11:14:03
authorfirosolutions
permlinkphp-fusion-security-vulnerabilities-2020
sbd payout0.015 SBD
steem payout0.000 STEEM
vesting payout145.985107 VESTS
Transaction InfoBlock #44525931/Virtual Operation #9
View Raw JSON Data
{
  "trx_id": "0000000000000000000000000000000000000000",
  "block": 44525931,
  "trx_in_block": 4294967295,
  "op_in_trx": 0,
  "virtual_op": 9,
  "timestamp": "2020-06-24T11:14:03",
  "op": [
    "author_reward",
    {
      "author": "firosolutions",
      "permlink": "php-fusion-security-vulnerabilities-2020",
      "sbd_payout": "0.015 SBD",
      "steem_payout": "0.000 STEEM",
      "vesting_payout": "145.985107 VESTS"
    }
  ]
}
2020/06/17 13:15:42
voterteam
authorfirosolutions
permlinkphp-fusion-security-vulnerabilities-2020
weight1000 (10.00%)
Transaction InfoBlock #44328875/Trx a39c638db7ca33402a181f532a93977e9c91a90f
View Raw JSON Data
{
  "trx_id": "a39c638db7ca33402a181f532a93977e9c91a90f",
  "block": 44328875,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-06-17T13:15:42",
  "op": [
    "vote",
    {
      "voter": "team",
      "author": "firosolutions",
      "permlink": "php-fusion-security-vulnerabilities-2020",
      "weight": 1000
    }
  ]
}
2020/06/17 12:02:54
voteryehey
authorfirosolutions
permlinkphp-fusion-security-vulnerabilities-2020
weight1000 (10.00%)
Transaction InfoBlock #44327434/Trx c30289e4f809424f803f5da0a6056d27eb3d1f8c
View Raw JSON Data
{
  "trx_id": "c30289e4f809424f803f5da0a6056d27eb3d1f8c",
  "block": 44327434,
  "trx_in_block": 5,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-06-17T12:02:54",
  "op": [
    "vote",
    {
      "voter": "yehey",
      "author": "firosolutions",
      "permlink": "php-fusion-security-vulnerabilities-2020",
      "weight": 1000
    }
  ]
}
2020/06/17 11:14:03
parent author
parent permlinksecurity
authorfirosolutions
permlinkphp-fusion-security-vulnerabilities-2020
titlePHP-fusion security vulnerabilities 2020
body![image.png](https://cdn.steemitimages.com/DQmeqocspzwzQfmZhAxxUUR4ocr5i9i6CLy2w3mLouaXsMX/image.png) In today’s exploit of the day we cover recent security vulnerabilities released for PHP-fusion. PHP-fusion is an opensource Wordpress and Joomla content management system alternative dating back as far as 2003. PHP-fusion has so far been able to score 5 major vulnerabilities with the CVE’s of: ### CVE-2020-12718 A stored cross-site scripting vulnerability was found in the comments function, the bug was quickly patched. ### CVE-2020-12708 Both PHP-fusion’s article and download function are allowing malicious third parties to inject malicious links and cause Cross Site Scripting Vulnerabilities. ### CVE-2020-12706 PHP-fusion’s Q&A and shoutbox areas are both vulnerable to Cross-site scripting vulnerabilities. ### CVE-2020-12461 SecGus was able to find out that the members.php search function does not properly validate the input(being the order the data is displayed in, resulting in manipulating the order by sql query) before it is passed into the mysql backend database. This is allowing third parties to execute malicious sql commands resulting in a SQL injection. ### CVE-2020-12438 PHP-fusion has implemented a protection against cross-site scripting attacks in the banner.php part of its codebase by removing html script tags, However html allows img tags to execute javascript. This was quickly found and reported in issue #2307. Another interesting vulnerability that has not made it to a CVE yet is a php object injection released 2020-05-26. By injecting sql commands and submitting them as comments using the “Feedback/Comments.ajax.php” function a malicious third party is allowed to execute and trigger Link to writeup: https://therealcoiffeur.github.io/c111 Proof of concept exploit: https://github.com/therealcoiffeur/therealcoiffeur.github.io/blob/master/tools/PHP-Fusion/poi_to_sqli_9.03.50.py ### Find hosts We did a quick google dork for php-fusion and got 97 000 results ![image.png](https://cdn.steemitimages.com/DQmXm5e8S7FbhwHgQvBJTJwnFtAr9FnF9rLwHYar6JnHCrz/image.png) ### Find vulnerabilities in your codebase A chunk of these vulnerabilities was made possible due to a lack of input validation. If you audit source code we recommend that you check all inputs that are being passed in to the backend database, if you are passing raw user input into a sql query then your application is most likely vulnerable to sql injection attacks. A great cure for this is to use MySQL’s escape function to escape user input as well as writing a proper input validation function. ## External links: https://en.wikipedia.org/wiki/PHP-Fusion https://vulns.firosolutions.com/cve/CVE-2020-12718/ https://vulns.firosolutions.com/cve/CVE-2020-12708/ https://vulns.firosolutions.com/cve/CVE-2020-12706/ https://vulns.firosolutions.com/cve/CVE-2020-12461/ https://vulns.firosolutions.com/cve/CVE-2020-12438/ https://packetstormsecurity.com/files/158077/PHP-Fusion-9.03.60-PHP-Object-Injection-SQL-Injection.html https://www.php-fusion.co.uk/home.php
json metadata{"tags":["security"],"image":["https://cdn.steemitimages.com/DQmeqocspzwzQfmZhAxxUUR4ocr5i9i6CLy2w3mLouaXsMX/image.png","https://cdn.steemitimages.com/DQmXm5e8S7FbhwHgQvBJTJwnFtAr9FnF9rLwHYar6JnHCrz/image.png"],"links":["https://therealcoiffeur.github.io/c111","https://github.com/therealcoiffeur/therealcoiffeur.github.io/blob/master/tools/PHP-Fusion/poi_to_sqli_9.03.50.py","https://en.wikipedia.org/wiki/PHP-Fusion","https://vulns.firosolutions.com/cve/CVE-2020-12718/","https://vulns.firosolutions.com/cve/CVE-2020-12708/","https://vulns.firosolutions.com/cve/CVE-2020-12706/","https://vulns.firosolutions.com/cve/CVE-2020-12461/","https://vulns.firosolutions.com/cve/CVE-2020-12438/","https://packetstormsecurity.com/files/158077/PHP-Fusion-9.03.60-PHP-Object-Injection-SQL-Injection.html","https://www.php-fusion.co.uk/home.php"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #44326467/Trx 5a823259f577b73e20eb3c2d468fc024143b0e74
View Raw JSON Data
{
  "trx_id": "5a823259f577b73e20eb3c2d468fc024143b0e74",
  "block": 44326467,
  "trx_in_block": 10,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-06-17T11:14:03",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "security",
      "author": "firosolutions",
      "permlink": "php-fusion-security-vulnerabilities-2020",
      "title": "PHP-fusion security vulnerabilities 2020",
      "body": "![image.png](https://cdn.steemitimages.com/DQmeqocspzwzQfmZhAxxUUR4ocr5i9i6CLy2w3mLouaXsMX/image.png)\nIn today’s exploit of the day we cover recent security vulnerabilities released for PHP-fusion.\n\nPHP-fusion is an opensource Wordpress and Joomla content management system alternative dating back as far as 2003.\nPHP-fusion has so far been able to score 5 major vulnerabilities with the CVE’s of:\n\n### CVE-2020-12718\nA stored cross-site scripting vulnerability was found in the comments\nfunction, the bug was quickly patched.\n\n### CVE-2020-12708\nBoth PHP-fusion’s article and download function are allowing malicious\nthird parties to inject malicious links and cause Cross Site Scripting Vulnerabilities.\n\n### CVE-2020-12706\n\n\nPHP-fusion’s Q&A and shoutbox areas are both vulnerable to Cross-site scripting vulnerabilities.\n\n### CVE-2020-12461\nSecGus was able to find out that the members.php\nsearch function does not properly validate the input(being the\norder the data is displayed in, resulting in manipulating the order by sql query)\nbefore it is passed into the mysql backend database.\nThis is allowing third parties to execute malicious sql commands resulting in a SQL injection.\n\n### CVE-2020-12438\nPHP-fusion has implemented a protection against cross-site scripting attacks\nin the banner.php part of its codebase by removing html script tags, However\nhtml allows img tags to execute javascript.\nThis was quickly found and reported in issue #2307.\n\nAnother interesting vulnerability that has not made it to a CVE yet\nis a php object injection released 2020-05-26.\nBy injecting sql commands and submitting them as comments\nusing the “Feedback/Comments.ajax.php” function a\nmalicious third party is allowed to execute and trigger\n\nLink to writeup:\nhttps://therealcoiffeur.github.io/c111\n\nProof of concept exploit:\nhttps://github.com/therealcoiffeur/therealcoiffeur.github.io/blob/master/tools/PHP-Fusion/poi_to_sqli_9.03.50.py\n\n### Find hosts\nWe did a quick google dork for php-fusion and got 97 000 results\n\n![image.png](https://cdn.steemitimages.com/DQmXm5e8S7FbhwHgQvBJTJwnFtAr9FnF9rLwHYar6JnHCrz/image.png)\n\n\n### Find vulnerabilities in your codebase\nA chunk of these vulnerabilities was made possible due to a lack of input validation.\nIf you audit source code we recommend that you check all inputs that are being passed\nin to the backend database, if you are passing\nraw user input into a sql query then your application is\nmost likely vulnerable to sql injection attacks.\n\nA great cure for this is to use MySQL’s escape function to escape user input as well as writing\na proper input validation function.\n\n## External links:\nhttps://en.wikipedia.org/wiki/PHP-Fusion\nhttps://vulns.firosolutions.com/cve/CVE-2020-12718/\nhttps://vulns.firosolutions.com/cve/CVE-2020-12708/\nhttps://vulns.firosolutions.com/cve/CVE-2020-12706/\nhttps://vulns.firosolutions.com/cve/CVE-2020-12461/\nhttps://vulns.firosolutions.com/cve/CVE-2020-12438/\nhttps://packetstormsecurity.com/files/158077/PHP-Fusion-9.03.60-PHP-Object-Injection-SQL-Injection.html\nhttps://www.php-fusion.co.uk/home.php",
      "json_metadata": "{\"tags\":[\"security\"],\"image\":[\"https://cdn.steemitimages.com/DQmeqocspzwzQfmZhAxxUUR4ocr5i9i6CLy2w3mLouaXsMX/image.png\",\"https://cdn.steemitimages.com/DQmXm5e8S7FbhwHgQvBJTJwnFtAr9FnF9rLwHYar6JnHCrz/image.png\"],\"links\":[\"https://therealcoiffeur.github.io/c111\",\"https://github.com/therealcoiffeur/therealcoiffeur.github.io/blob/master/tools/PHP-Fusion/poi_to_sqli_9.03.50.py\",\"https://en.wikipedia.org/wiki/PHP-Fusion\",\"https://vulns.firosolutions.com/cve/CVE-2020-12718/\",\"https://vulns.firosolutions.com/cve/CVE-2020-12708/\",\"https://vulns.firosolutions.com/cve/CVE-2020-12706/\",\"https://vulns.firosolutions.com/cve/CVE-2020-12461/\",\"https://vulns.firosolutions.com/cve/CVE-2020-12438/\",\"https://packetstormsecurity.com/files/158077/PHP-Fusion-9.03.60-PHP-Object-Injection-SQL-Injection.html\",\"https://www.php-fusion.co.uk/home.php\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
firosolutionsreceived 0.010 SBD, 0.062 SP author reward for @firosolutions / building-vulnerability-explorer
2020/06/08 16:55:36
authorfirosolutions
permlinkbuilding-vulnerability-explorer
sbd payout0.010 SBD
steem payout0.000 STEEM
vesting payout101.351829 VESTS
Transaction InfoBlock #44077203/Virtual Operation #4
View Raw JSON Data
{
  "trx_id": "0000000000000000000000000000000000000000",
  "block": 44077203,
  "trx_in_block": 4294967295,
  "op_in_trx": 0,
  "virtual_op": 4,
  "timestamp": "2020-06-08T16:55:36",
  "op": [
    "author_reward",
    {
      "author": "firosolutions",
      "permlink": "building-vulnerability-explorer",
      "sbd_payout": "0.010 SBD",
      "steem_payout": "0.000 STEEM",
      "vesting_payout": "101.351829 VESTS"
    }
  ]
}
2020/06/01 18:04:00
voteryehey
authorfirosolutions
permlinkbuilding-vulnerability-explorer
weight1000 (10.00%)
Transaction InfoBlock #43880289/Trx 858873e578850d56c13a2cb51f0f19f4fe357177
View Raw JSON Data
{
  "trx_id": "858873e578850d56c13a2cb51f0f19f4fe357177",
  "block": 43880289,
  "trx_in_block": 4,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-06-01T18:04:00",
  "op": [
    "vote",
    {
      "voter": "yehey",
      "author": "firosolutions",
      "permlink": "building-vulnerability-explorer",
      "weight": 1000
    }
  ]
}
2020/06/01 17:31:30
voterfilipino
authorfirosolutions
permlinkbuilding-vulnerability-explorer
weight1000 (10.00%)
Transaction InfoBlock #43879649/Trx ac7335746963173e58d9257fa3c02abfb50c278e
View Raw JSON Data
{
  "trx_id": "ac7335746963173e58d9257fa3c02abfb50c278e",
  "block": 43879649,
  "trx_in_block": 9,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-06-01T17:31:30",
  "op": [
    "vote",
    {
      "voter": "filipino",
      "author": "firosolutions",
      "permlink": "building-vulnerability-explorer",
      "weight": 1000
    }
  ]
}
executive-boardsent 0.001 STEEM to @firosolutions- "❗ Hello firosolutions, great that you are using the STEEM blockchain. The Executive Board invites you to visit https://discord.gg/KyBbmhh where you will get some insider infos on how you will earn the..."
2020/06/01 16:57:03
fromexecutive-board
tofirosolutions
amount0.001 STEEM
memo❗ Hello firosolutions, great that you are using the STEEM blockchain. The Executive Board invites you to visit https://discord.gg/KyBbmhh where you will get some insider infos on how you will earn the most coins. It's easy, just follow the instructions. Warm regards, The Executive Board.
Transaction InfoBlock #43878969/Trx 3855b518d8f6fa718f1d56a0bab161a2ed12dd6f
View Raw JSON Data
{
  "trx_id": "3855b518d8f6fa718f1d56a0bab161a2ed12dd6f",
  "block": 43878969,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-06-01T16:57:03",
  "op": [
    "transfer",
    {
      "from": "executive-board",
      "to": "firosolutions",
      "amount": "0.001 STEEM",
      "memo": "❗ Hello firosolutions, great that you are using the STEEM blockchain. The Executive Board invites you to visit https://discord.gg/KyBbmhh where you will get some insider infos on how you will earn the most coins. It's easy, just follow the instructions. Warm regards, The Executive Board."
    }
  ]
}
2020/06/01 16:55:36
parent author
parent permlinkblockchain
authorfirosolutions
permlinkbuilding-vulnerability-explorer
titleBuilding Vulnerability Explorer
body![image.png](https://cdn.steemitimages.com/DQmZHFS5gcLRVuXnoSW2j4t1JnnwYSzQh9Y794Y9PjKHgzn/image.png) We wanted to make a love child between a blockchain block explorer and our api. In order to demostrate the true power of our api :) We have been using Bitcoin for a couple of years now and the true power of a block explorer in order to view transactions with a fancy interface is also pretty nice. The result is live and can be viewed at: https://vulns.firosolutions.com Using our api So vulns.firosolutions.com is a frontend that is running with our api as engine. View vulnerability You can simply press any vulnerability and it will display description, CVE, external links and a lot more! You can also: View Platforms We want it to be more then just search and find so when you press on a exploit/vulnerability or search for a special platform you can view more vulnerabilities affecting that platform. We ofcourse support CMS systems such as wordpress, joomla, drupal and so on wordpress vulnerability explorer We had to add cisco :) cisco vulnerability explorer You can even view similar platforms: ![image.png](https://cdn.steemitimages.com/DQmbeivqTZuVoPAxZJPiFVZJeXCfV5mXxxvyJ44TcNYB6oK/image.png) cisco vulnerability explorer The list of platforms goes on and on .. microsoft vulnerability explorer View language We support to view programming languages such as Rust and NodeJS. View operating system You can view different operating systems such as: OpenSUSE: opensuse vulnerability explorer Debian: debian vulnerability explorer Freebsd bfreebsd vulnerability explorer And many more! Api end points being used: So this is done with our api using: https://api.firosolutions.com/cvesearch We have 2 different cve search endpoints, this api endpoint returns information about the cve you give to it. As an example if i give it a “fluffy” cve let’s say “CVE-2012-5604” then it returns: ``` { "result": { "CVE": "CVE-2012-5604", "date": "2012-10-24", "description": "The ldap_fluff gem for Rub", "link": "['http://rhn.redhat.com/errata/RHSA-2013-0544.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=882136']" } } ``` https://api.firosolutions.com/cveloosesearch This is our second api end point, This searches for a CVE and returns, lets try this with a joomla cve for example: CVE-2020-8420 ``` { "result": [ { "CVE": "CVE-2020-8420", "date": "2020-01-28", "description": "An issue was discovered in Joomla! before 3.9.15. ...", "link": "['https://developer.joomla.org/security-centre/799-20200102-core-csrf-com-templates-less-compiler']" }, { "CVE": "CVE-2020-11690", "date": "2020-04-10", "description": "In JetBrains IntelliJ IDEA before 2020.", "link": "['https://blog.jetbrains.com/blog/2020/04/22/jetbrains-security-bulletin-q1-2020/']" }, { "CVE": "CVE-2020-10794", "date": "2020-03-20", "description": "Gira TKS-IP-Gateway 4.0.7.7 is vulnerable to..." "link": "['https://research.hisolutions.com/2020/04/open-the-gates-insecurity-of-cloudless-smart-door-systems/']" }, { "CVE": "CVE-2020-10795", "date": "2020-03-20", "description": "Gira TKS-IP-Gateway 4.0.7.7 is vulnerable to ...", "link": "['https://research.hisolutions.com/2020/04/open-the-gates-insecurity-of-cloudless-smart-door-systems/']" }, { "CVE": "CVE-2020-7051", "date": "2020-01-14", "description": "Codologic Codoforum through 4.8.4 ...", "link": "['https://codologic.com/forum/index.php?u=/topic/12638/codoforum-4-8-8-released-and-the-future#post-23845', 'https://www.linkedin.com/posts/polina-voronina-896819b5_discovered-by-polina-voronina-jan-15-activity-6634436086540054528-dDgg/']" }, { "CVE": "CVE-2020-11795", "date": "2020-04-15", "description": "In JetBrains Space through 2020-04-2", "link": "['https://blog.jetbrains.com/blog/2020/04/22/jetbrains-security-bulletin-q1-2020/']" }, { "CVE": "CVE-2020-11796", "date": "2020-04-15", "description": "In JetBrains Space through 2020-04-2", "link": "['https://blog.jetbrains.com/blog/2020/04/22/jetbrains-security-bulletin-q1-2020/']" }, { "CVE": "CVE-2020-12286", "date": "2020-04-28", "description": "In Octopus Deploy before 2019.12.9 and 2020 before 2020.1.1", "link": "['https://github.com/OctopusDeploy/Issues/issues/6331', 'https://github.com/OctopusDeploy/Issues/issues/6332', 'https://github.com/OctopusDeploy/Issues/issues/6333']" } ] } ``` https://api.firosolutions.com/latestplatform/ https://api.firosolutions.com/getvuln/ Returns information about a vulnerability based on the title it is being used when you press on the title of a vulnerability, so let’s find “Roundcube v 1.4.2 xss” ```json { "result": { "category": "Cross-Site Scripting", "cve": "no cve found", "date": "2020-01-21 14:18:20", "description": "# Exploit Title: Roundcube v 1.4.2 xss - Persistent..." "link": "['https://cxsecurity.com/issue/WLB-2020010153']", "os": "unknown", "platform": "not sure about the platform", "risk": "medium", "title": "Roundcube v 1.4.2 xss" } } ``` https://vulns.firosolutions.com/view/exploit/Roundcube%20v%201.4.2%20xss/ https://api.firosolutions.com/luckysearch/ Lucky search is what is being used when someone search for something. If we where to search for something like “roundcube” the api would output. ```json { "found": [ { "category": "unset", "cve": "unset", "description": "Roundcube Webmail before 1.4.4 allows attackers to.." "link": "['https://cxsecurity.com/cveshow/CVE-2020-12640']", "os": "unknown", "platform": "unset", "published_date": "2020-05-04", "recommendation": "We recommend that you update your system", "risk": "medium", "title": "Medium CVE-2020-12640: Roundcube Webmail" }, { "category": "Cross-Site Scripting", "cve": "unset", "description": "An issue was discovered in Roundcube Webmail ...." "link": "['https://cxsecurity.com/cveshow/CVE-2020-12625']", "os": "unknown", "platform": "Webapp", "published_date": "2020-05-04", "recommendation": "We recommend that you update your system", "risk": "medium", "title": "Low CVE-2020-12625: Roundcube Webmail" }, { "category": "Cross Site Requests Forgery", "cve": "unset", "description": "An issue was discovered in Roundcube Webmail ...", "link": "['https://cxsecurity.com/cveshow/CVE-2020-12626']", "os": "unknown", "platform": "unset", "published_date": "2020-05-04", "recommendation": "We recommend that you update your system", "risk": "medium", "title": "Low CVE-2020-12626: Roundcube Webmail" }, { "author": "published on ['https://www.debian.org/security/2020/dsa-4674']", "category": "unset", "cve": "['CVE-2020-12625', 'CVE-2020-12625', 'CVE-2020-12626', 'CVE-2020-12626']", "description": "<p>It was discovered that roundcube, ...." "link": "['https://www.debian.org/security/2020/dsa-4674', 'https://security-tracker.debian.org/tracker/source-package/roundcube']", "os": "Debian", "platform": "roundcube", "published_date": "2017-09-27", "recommendation": "We recommend that you update your system", "risk": "medium", "title": "DSA-4674 roundcube" }, { "author": "published on cxsecurity.com", "category": "Cross-Site Scripting", "cve": "unset", "description": "# Exploit Title: Roundcube v 1.4.2 xss - ..." "link": "['https://cxsecurity.com/issue/WLB-2020010153']", "os": "unknown", "platform": "unset", "published_date": "2020-01-21", "recommendation": "We recommend that you update your system", "risk": "medium", "title": "Roundcube v 1.4.2 xss" }, .... ], "total": 12 } ``` https://api.firosolutions.com/latestrust/ If you got the view the language rust on vulns.firosolutions.com this api function will be used to return the latest vulnerabilities affecting rust librarires. You can find a more detailed description of our api with code examples on our github: https://github.com/FiroSolutions/api.firosolutions.com Blockchain nodes That we are heavy in to crypto currency is no lie. We have happily accepted crypto currency as payment since the first day we went out of Beta to paid product. But we go even deeper in this rabbit hole, We offer notifications to people that run a blockchain node telling them when a new version has been released and it’s time to update. It’s pretty simple just sign in to https://watchers.firosolutions.com select templates and pick the blockchain node of choice. We also have templates for creating profiles for other software such as drupal, wordpress and so on. https://vulns.firosolutions.com/blockchain We support for viewing vulnerabilities for several blockchains such as: ## Ethereum ![image.png](https://cdn.steemitimages.com/DQmNmopKCQZaCvANjGxrMma7JNb89majjGHRKMqi6JjkUaY/image.png) ## Bitcoin ![image.png](https://cdn.steemitimages.com/DQmZbNditBWwMVX644UbGbSpXG8j5pSdVaCj8dZCMeVA6hF/image.png) ### Monero ![image.png](https://cdn.steemitimages.com/DQmX5uXwr97Jg7GLMqe3aZakE8AyjXqdfCojkFBSVhqFor3/image.png) We are also continuously updating vulns.firosolutions.com so bookmark it to stay up to date! https://blog.firosolutions.com
json metadata{"tags":["blockchain"],"image":["https://cdn.steemitimages.com/DQmZHFS5gcLRVuXnoSW2j4t1JnnwYSzQh9Y794Y9PjKHgzn/image.png","https://cdn.steemitimages.com/DQmbeivqTZuVoPAxZJPiFVZJeXCfV5mXxxvyJ44TcNYB6oK/image.png","https://cdn.steemitimages.com/DQmNmopKCQZaCvANjGxrMma7JNb89majjGHRKMqi6JjkUaY/image.png","https://cdn.steemitimages.com/DQmZbNditBWwMVX644UbGbSpXG8j5pSdVaCj8dZCMeVA6hF/image.png","https://cdn.steemitimages.com/DQmX5uXwr97Jg7GLMqe3aZakE8AyjXqdfCojkFBSVhqFor3/image.png"],"links":["https://vulns.firosolutions.com","https://api.firosolutions.com/cvesearch","https://api.firosolutions.com/cveloosesearch","https://api.firosolutions.com/latestplatform/","https://api.firosolutions.com/getvuln/","https://vulns.firosolutions.com/view/exploit/Roundcube%20v%201.4.2%20xss/","https://api.firosolutions.com/luckysearch/","https://api.firosolutions.com/latestrust/","https://github.com/FiroSolutions/api.firosolutions.com","https://watchers.firosolutions.com","https://vulns.firosolutions.com/blockchain","https://blog.firosolutions.com"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #43878941/Trx 6cccbe4ac74e47233cb46ab506f956feec01e486
View Raw JSON Data
{
  "trx_id": "6cccbe4ac74e47233cb46ab506f956feec01e486",
  "block": 43878941,
  "trx_in_block": 5,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-06-01T16:55:36",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "blockchain",
      "author": "firosolutions",
      "permlink": "building-vulnerability-explorer",
      "title": "Building Vulnerability Explorer",
      "body": "![image.png](https://cdn.steemitimages.com/DQmZHFS5gcLRVuXnoSW2j4t1JnnwYSzQh9Y794Y9PjKHgzn/image.png)\nWe wanted to make a love child between a blockchain block explorer\nand our api. In order to demostrate the true power of our api :)\nWe have been using Bitcoin for a couple of years now and the true power of\na block explorer in order to view transactions with a fancy interface is also pretty nice.\n\nThe result is live and can be viewed at:\nhttps://vulns.firosolutions.com\n\nUsing our api\nSo vulns.firosolutions.com is a frontend that\nis running with our api as engine.\n\nView vulnerability\nYou can simply press any vulnerability and it will display description,\nCVE, external links and a lot more!\n\nYou can also:\n\nView Platforms\nWe want it to be more then just search and find so when you press\non a exploit/vulnerability or search for a special platform\nyou can view more vulnerabilities affecting that platform.\n\nWe ofcourse support CMS systems such as wordpress, joomla, drupal and so on\nwordpress vulnerability explorer\nWe had to add cisco :)\ncisco vulnerability explorer\nYou can even view similar platforms:\n\n\n![image.png](https://cdn.steemitimages.com/DQmbeivqTZuVoPAxZJPiFVZJeXCfV5mXxxvyJ44TcNYB6oK/image.png)\ncisco vulnerability explorer\nThe list of platforms goes on and on ..\n\nmicrosoft vulnerability explorer\n\nView language\nWe support to view programming languages such as Rust and NodeJS.\n\nView operating system\nYou can view different operating systems such as:\n\nOpenSUSE:\nopensuse vulnerability explorer\nDebian:\ndebian vulnerability explorer\nFreebsd\nbfreebsd vulnerability explorer\nAnd many more!\n\nApi end points being used:\nSo this is done with our api using:\n\nhttps://api.firosolutions.com/cvesearch\nWe have 2 different cve search endpoints, this api endpoint returns information about the cve you give to it. As an example if i give it a “fluffy” cve let’s say “CVE-2012-5604” then it returns:\n```\n{\n    \"result\": {\n        \"CVE\": \"CVE-2012-5604\",\n        \"date\": \"2012-10-24\",\n        \"description\": \"The ldap_fluff gem for Rub\",\n        \"link\": \"['http://rhn.redhat.com/errata/RHSA-2013-0544.html', \n        'https://bugzilla.redhat.com/show_bug.cgi?id=882136']\"\n    }\n}\n```\n\nhttps://api.firosolutions.com/cveloosesearch\nThis is our second api end point, This searches for a CVE and returns, lets try this with a joomla cve for example:\nCVE-2020-8420\n```\n{\n    \"result\": [\n        {\n            \"CVE\": \"CVE-2020-8420\",\n            \"date\": \"2020-01-28\",\n            \"description\": \"An issue was discovered in Joomla! before 3.9.15. ...\",\n            \"link\": \"['https://developer.joomla.org/security-centre/799-20200102-core-csrf-com-templates-less-compiler']\"\n        },\n        {\n            \"CVE\": \"CVE-2020-11690\",\n            \"date\": \"2020-04-10\",\n            \"description\": \"In JetBrains IntelliJ IDEA before 2020.\",\n            \"link\": \"['https://blog.jetbrains.com/blog/2020/04/22/jetbrains-security-bulletin-q1-2020/']\"\n        },\n        {\n            \"CVE\": \"CVE-2020-10794\",\n            \"date\": \"2020-03-20\",\n            \"description\": \"Gira TKS-IP-Gateway 4.0.7.7 is vulnerable to...\"\n            \"link\": \n            \"['https://research.hisolutions.com/2020/04/open-the-gates-insecurity-of-cloudless-smart-door-systems/']\"\n        },\n        {\n            \"CVE\": \"CVE-2020-10795\",\n            \"date\": \"2020-03-20\",\n            \"description\": \"Gira TKS-IP-Gateway 4.0.7.7 is vulnerable to ...\",\n            \"link\": \n            \"['https://research.hisolutions.com/2020/04/open-the-gates-insecurity-of-cloudless-smart-door-systems/']\"\n        },\n        {\n            \"CVE\": \"CVE-2020-7051\",\n            \"date\": \"2020-01-14\",\n            \"description\": \"Codologic Codoforum through 4.8.4 ...\",\n            \"link\": \n            \"['https://codologic.com/forum/index.php?u=/topic/12638/codoforum-4-8-8-released-and-the-future#post-23845', \n            'https://www.linkedin.com/posts/polina-voronina-896819b5_discovered-by-polina-voronina-jan-15-activity-6634436086540054528-dDgg/']\"\n        },\n        {\n            \"CVE\": \"CVE-2020-11795\",\n            \"date\": \"2020-04-15\",\n            \"description\": \"In JetBrains Space through 2020-04-2\",\n            \"link\": \n            \"['https://blog.jetbrains.com/blog/2020/04/22/jetbrains-security-bulletin-q1-2020/']\"\n        },\n        {\n            \"CVE\": \"CVE-2020-11796\",\n            \"date\": \"2020-04-15\",\n            \"description\": \"In JetBrains Space through 2020-04-2\",\n            \"link\": \n            \"['https://blog.jetbrains.com/blog/2020/04/22/jetbrains-security-bulletin-q1-2020/']\"\n        },\n        {\n            \"CVE\": \"CVE-2020-12286\",\n            \"date\": \"2020-04-28\",\n            \"description\": \"In Octopus Deploy before 2019.12.9 and 2020 before 2020.1.1\",\n            \"link\": \"['https://github.com/OctopusDeploy/Issues/issues/6331', \n            'https://github.com/OctopusDeploy/Issues/issues/6332', \n            'https://github.com/OctopusDeploy/Issues/issues/6333']\"\n        }\n    ]\n}\n```\nhttps://api.firosolutions.com/latestplatform/\nhttps://api.firosolutions.com/getvuln/\nReturns information about a vulnerability based on the title it is being used when you press on the title of a vulnerability, so let’s find “Roundcube v 1.4.2 xss”\n```json\n{\n    \"result\": {\n        \"category\": \"Cross-Site Scripting\",\n        \"cve\": \"no cve found\",\n        \"date\": \"2020-01-21 14:18:20\",\n        \"description\": \"# Exploit Title: Roundcube v 1.4.2 xss  - Persistent...\"\n        \n        \"link\": \"['https://cxsecurity.com/issue/WLB-2020010153']\",\n        \"os\": \"unknown\",\n        \"platform\": \"not sure about the platform\",\n        \"risk\": \"medium\",\n        \"title\": \"Roundcube v 1.4.2 xss\"\n    }\n}\n```\n\nhttps://vulns.firosolutions.com/view/exploit/Roundcube%20v%201.4.2%20xss/\n\nhttps://api.firosolutions.com/luckysearch/\nLucky search is what is being used when someone search for something. If we where to search for something like “roundcube” the api would output.\n```json\n{\n    \"found\": [\n        {\n            \"category\": \"unset\",\n            \"cve\": \"unset\",\n            \"description\": \"Roundcube Webmail before 1.4.4 allows attackers to..\" \n            \"link\": \"['https://cxsecurity.com/cveshow/CVE-2020-12640']\",\n            \"os\": \"unknown\",\n            \"platform\": \"unset\",\n            \"published_date\": \"2020-05-04\",\n            \"recommendation\": \"We recommend that you update your system\",\n            \"risk\": \"medium\",\n            \"title\": \"Medium CVE-2020-12640: Roundcube Webmail\"\n        },\n        {\n            \"category\": \"Cross-Site Scripting\",\n            \"cve\": \"unset\",\n            \"description\": \"An issue was discovered in Roundcube Webmail ....\"\n            \"link\": \"['https://cxsecurity.com/cveshow/CVE-2020-12625']\",\n            \"os\": \"unknown\",\n            \"platform\": \"Webapp\",\n            \"published_date\": \"2020-05-04\",\n            \"recommendation\": \"We recommend that you update your system\",\n            \"risk\": \"medium\",\n            \"title\": \"Low CVE-2020-12625: Roundcube Webmail\"\n        },\n        {\n            \"category\": \"Cross Site Requests Forgery\",\n            \"cve\": \"unset\",\n            \"description\": \"An issue was discovered in Roundcube Webmail ...\",\n            \"link\": \"['https://cxsecurity.com/cveshow/CVE-2020-12626']\",\n            \"os\": \"unknown\",\n            \"platform\": \"unset\",\n            \"published_date\": \"2020-05-04\",\n            \"recommendation\": \"We recommend that you update your system\",\n            \"risk\": \"medium\",\n            \"title\": \"Low CVE-2020-12626: Roundcube Webmail\"\n        },\n        {\n            \"author\": \"published on ['https://www.debian.org/security/2020/dsa-4674']\",\n            \"category\": \"unset\",\n            \"cve\": \"['CVE-2020-12625', 'CVE-2020-12625',\n            'CVE-2020-12626', 'CVE-2020-12626']\",\n            \"description\": \"<p>It was discovered that roundcube, ....\"\n            \"link\": \"['https://www.debian.org/security/2020/dsa-4674', \n            'https://security-tracker.debian.org/tracker/source-package/roundcube']\",\n            \"os\": \"Debian\",\n            \"platform\": \"roundcube\",\n            \"published_date\": \"2017-09-27\",\n            \"recommendation\": \"We recommend that you update your system\",\n            \"risk\": \"medium\",\n            \"title\": \"DSA-4674 roundcube\"\n        },\n        {\n            \"author\": \"published on cxsecurity.com\",\n            \"category\": \"Cross-Site Scripting\",\n            \"cve\": \"unset\",\n            \"description\": \"# Exploit Title: Roundcube v 1.4.2 xss  - ...\"\n            \"link\": \"['https://cxsecurity.com/issue/WLB-2020010153']\",\n            \"os\": \"unknown\",\n            \"platform\": \"unset\",\n            \"published_date\": \"2020-01-21\",\n            \"recommendation\": \"We recommend that you update your system\",\n            \"risk\": \"medium\",\n            \"title\": \"Roundcube v 1.4.2 xss\"\n        },\n\t....\n    ],\n    \"total\": 12\n}\n```\n\nhttps://api.firosolutions.com/latestrust/\nIf you got the view the language rust on vulns.firosolutions.com\nthis api function will be used to return the latest\nvulnerabilities affecting rust librarires.\n\nYou can find a more detailed description of our api with code examples on our github:\nhttps://github.com/FiroSolutions/api.firosolutions.com\n\nBlockchain nodes\nThat we are heavy in to crypto currency is no lie.\nWe have happily accepted crypto currency as payment\nsince the first day we went out of Beta to paid product.\nBut we go even deeper in this rabbit hole, We offer notifications\nto people that run a blockchain node telling them when a new version\nhas been released and it’s time to update.\nIt’s pretty simple just sign in to https://watchers.firosolutions.com\nselect templates and pick the blockchain node of choice.\nWe also have templates for creating profiles for other software such as\ndrupal, wordpress and so on.\n\nhttps://vulns.firosolutions.com/blockchain\n\nWe support for viewing vulnerabilities for several blockchains such as:\n\n## Ethereum   \n\n![image.png](https://cdn.steemitimages.com/DQmNmopKCQZaCvANjGxrMma7JNb89majjGHRKMqi6JjkUaY/image.png)\n\n\n\n## Bitcoin   \n\n![image.png](https://cdn.steemitimages.com/DQmZbNditBWwMVX644UbGbSpXG8j5pSdVaCj8dZCMeVA6hF/image.png)\n\n\n\n\n### Monero\n\n![image.png](https://cdn.steemitimages.com/DQmX5uXwr97Jg7GLMqe3aZakE8AyjXqdfCojkFBSVhqFor3/image.png)\n\nWe are also continuously updating vulns.firosolutions.com so bookmark it to stay\nup to date!\n\nhttps://blog.firosolutions.com",
      "json_metadata": "{\"tags\":[\"blockchain\"],\"image\":[\"https://cdn.steemitimages.com/DQmZHFS5gcLRVuXnoSW2j4t1JnnwYSzQh9Y794Y9PjKHgzn/image.png\",\"https://cdn.steemitimages.com/DQmbeivqTZuVoPAxZJPiFVZJeXCfV5mXxxvyJ44TcNYB6oK/image.png\",\"https://cdn.steemitimages.com/DQmNmopKCQZaCvANjGxrMma7JNb89majjGHRKMqi6JjkUaY/image.png\",\"https://cdn.steemitimages.com/DQmZbNditBWwMVX644UbGbSpXG8j5pSdVaCj8dZCMeVA6hF/image.png\",\"https://cdn.steemitimages.com/DQmX5uXwr97Jg7GLMqe3aZakE8AyjXqdfCojkFBSVhqFor3/image.png\"],\"links\":[\"https://vulns.firosolutions.com\",\"https://api.firosolutions.com/cvesearch\",\"https://api.firosolutions.com/cveloosesearch\",\"https://api.firosolutions.com/latestplatform/\",\"https://api.firosolutions.com/getvuln/\",\"https://vulns.firosolutions.com/view/exploit/Roundcube%20v%201.4.2%20xss/\",\"https://api.firosolutions.com/luckysearch/\",\"https://api.firosolutions.com/latestrust/\",\"https://github.com/FiroSolutions/api.firosolutions.com\",\"https://watchers.firosolutions.com\",\"https://vulns.firosolutions.com/blockchain\",\"https://blog.firosolutions.com\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
steemdelegated 3.599 SP to @firosolutions
2020/05/08 09:23:09
delegatorsteem
delegateefirosolutions
vesting shares5859.933421 VESTS
Transaction InfoBlock #43193186/Trx a329ce19639e6a53ba8556a05aac5a89eab98dd0
View Raw JSON Data
{
  "trx_id": "a329ce19639e6a53ba8556a05aac5a89eab98dd0",
  "block": 43193186,
  "trx_in_block": 11,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-05-08T09:23:09",
  "op": [
    "delegate_vesting_shares",
    {
      "delegator": "steem",
      "delegatee": "firosolutions",
      "vesting_shares": "5859.933421 VESTS"
    }
  ]
}
2020/05/02 16:12:45
votertennya
authorfirosolutions
permlinknomad-postbox-now-accepting-crypto-currency
weight-10000 (-100.00%)
Transaction InfoBlock #43032582/Trx f5456a684074fc32a63497d7b5047ff2545661e0
View Raw JSON Data
{
  "trx_id": "f5456a684074fc32a63497d7b5047ff2545661e0",
  "block": 43032582,
  "trx_in_block": 4,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-05-02T16:12:45",
  "op": [
    "vote",
    {
      "voter": "tennya",
      "author": "firosolutions",
      "permlink": "nomad-postbox-now-accepting-crypto-currency",
      "weight": -10000
    }
  ]
}
2020/05/01 22:47:33
voterisstick
authorfirosolutions
permlinknomad-postbox-now-accepting-crypto-currency
weight-10000 (-100.00%)
Transaction InfoBlock #43012186/Trx dd792f8fb4ffbd8501a12471735fe837fce9ece7
View Raw JSON Data
{
  "trx_id": "dd792f8fb4ffbd8501a12471735fe837fce9ece7",
  "block": 43012186,
  "trx_in_block": 12,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-05-01T22:47:33",
  "op": [
    "vote",
    {
      "voter": "isstick",
      "author": "firosolutions",
      "permlink": "nomad-postbox-now-accepting-crypto-currency",
      "weight": -10000
    }
  ]
}
p2pbullionsent 0.001 STEEM to @firosolutions- "Did you know you can buy silver and gold directly using steem? Checkout https://peertopeerbullion.com. More products being added daily. "
2020/05/01 20:29:57
fromp2pbullion
tofirosolutions
amount0.001 STEEM
memoDid you know you can buy silver and gold directly using steem? Checkout https://peertopeerbullion.com. More products being added daily.
Transaction InfoBlock #43009500/Trx f46458cb0e8f83de95c32de5f311b0d0c6f1830c
View Raw JSON Data
{
  "trx_id": "f46458cb0e8f83de95c32de5f311b0d0c6f1830c",
  "block": 43009500,
  "trx_in_block": 19,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-05-01T20:29:57",
  "op": [
    "transfer",
    {
      "from": "p2pbullion",
      "to": "firosolutions",
      "amount": "0.001 STEEM",
      "memo": "Did you know you can buy silver and gold directly using steem?  Checkout https://peertopeerbullion.com.  More products being added daily. \r\n\t"
    }
  ]
}
2020/05/01 15:35:09
parent author
parent permlinkcryptocurrencies
authorfirosolutions
permlinknomad-postbox-now-accepting-crypto-currency
titleNomad Postbox now accepting Crypto Currency
body## Nomad Postbox is now accepting crypto currencies ![Nomad postbox crypto currencies](https://cdn.steemitimages.com/DQmeUsnN3iHYySFtSx9959RWoH3C3yYXrMFr4FLMk9CEodb/image.png) We are happy to announce that we are not only accepting payments with Visa, Mastercard and American Express, We are now live with the option to pay with crypto currency! As lovers of technology we wanted to support our favorite crypto currencies such as Bitcoin, Ethereum, Monero, Komodo and others! We have not yet had the chance to add support for Bitcoin Lightning but we will with in a soon future :) So which crypto currencies are supported? Bitcoin Litecoin Ripple Bitcoin Diamond Bitcoin Cash Dai Dash Decred DigiByte Dogecoin EOS Ether Classic Ether Fuel Token Groestlcoin Komodo Lisk MaidSafeCoin NEO Peercoin Qtum Ravencoin SkinCoin SmartCash Sirin StorjToken Stratis TRON TrueUSD USD//C Tether USD (Omni Layer) Tether USD (ERC20) Waves NEM Monero VERGE ZCoin As we are moving in to more freer currencies we are happy to help the adoption of crypto currencies! If you want to know more and check it out, you can do so at: https://nomadpostbox.com
json metadata{"tags":["cryptocurrencies"],"image":["https://cdn.steemitimages.com/DQmeUsnN3iHYySFtSx9959RWoH3C3yYXrMFr4FLMk9CEodb/image.png"],"links":["https://nomadpostbox.com"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #43003753/Trx a163c850605f69f10391177cd45225086639a119
View Raw JSON Data
{
  "trx_id": "a163c850605f69f10391177cd45225086639a119",
  "block": 43003753,
  "trx_in_block": 31,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-05-01T15:35:09",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "cryptocurrencies",
      "author": "firosolutions",
      "permlink": "nomad-postbox-now-accepting-crypto-currency",
      "title": "Nomad Postbox now accepting Crypto Currency",
      "body": "## Nomad Postbox is now accepting crypto currencies\n![Nomad postbox crypto currencies](https://cdn.steemitimages.com/DQmeUsnN3iHYySFtSx9959RWoH3C3yYXrMFr4FLMk9CEodb/image.png)  \n\nWe are happy to announce that we are not only accepting payments with Visa, Mastercard and American Express, We are now live with the option to pay with crypto currency!   \n\nAs lovers of technology we wanted to support our favorite crypto currencies such as Bitcoin, Ethereum, Monero, Komodo and others!\nWe have not yet had the chance to add support for Bitcoin Lightning but we will with in a soon future :)    \n\nSo which crypto currencies are supported?\nBitcoin\nLitecoin\nRipple\nBitcoin Diamond\nBitcoin Cash\nDai\nDash\nDecred\nDigiByte\nDogecoin\nEOS\nEther Classic\nEther\nFuel Token\nGroestlcoin\nKomodo\nLisk\nMaidSafeCoin\nNEO\nPeercoin\nQtum\nRavencoin\nSkinCoin\nSmartCash\nSirin\nStorjToken\nStratis\nTRON\nTrueUSD\nUSD//C\nTether USD (Omni Layer)\nTether USD (ERC20)\nWaves\nNEM\nMonero\nVERGE\nZCoin\n\nAs we are moving in to more freer currencies we are happy to help the adoption of crypto currencies!\nIf you want to know more and check it out, you can do so at:\n\nhttps://nomadpostbox.com",
      "json_metadata": "{\"tags\":[\"cryptocurrencies\"],\"image\":[\"https://cdn.steemitimages.com/DQmeUsnN3iHYySFtSx9959RWoH3C3yYXrMFr4FLMk9CEodb/image.png\"],\"links\":[\"https://nomadpostbox.com\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2020/04/29 16:55:36
parent author
parent permlinkslack
authorfirosolutions
permlinkvulnerability-management-with-slack
titleVulnerability Management with slack
body![Vulnerability Management with slack](https://cdn.steemitimages.com/DQmNd2jGakAc8D4Jqsezh5DzjCX2icNpt3NkmXbvqt5uYmf/image.png) A year ago we created a slack bot but we where never happy with it. So we spent some time in the workshop and created a new one, as a very lightway version of our web interface. We also have an irc bot, but people can make whatever bot they want with our api. The api is really becomming better and better and happily runs vulns.firosolutions.com ### Features: Firo Solutions slack bot options #### /loadapikey Import api key #### /listwatchers List the name of my watchers #### /solveall Mark all vulnerabilities as solved #### /listvulns List amount of solved and unsolved vulnerabilities per watcher #### /vulnerabilitysearch Nice easteregg we added where you can search for vulnerabilities ## Integration So we wanted it to make it as easy as possible so all you need is your api key. And then to load the apikey you just type /loadapikey followed by your api key. You can find your api key over at watchers.firosolutions.com/profile. we also added a nice button on the /profile page so with one click of a button you can install the bot in to your slack space. ## Extra: slack rss subscribe Did you know you can import rss feeds in to slack? well we did not know that :) with: ```text /feed subscribe https://blog.firosolutions.com/posts/index.xml /feed subscribe https://blog.firosolutions.com/exploits/index.xml ``` Build your own bots with our api: https://github.com/FiroSolutions/api.firosolutions.com
json metadata{"tags":["slack"],"image":["https://cdn.steemitimages.com/DQmNd2jGakAc8D4Jqsezh5DzjCX2icNpt3NkmXbvqt5uYmf/image.png"],"links":["https://github.com/FiroSolutions/api.firosolutions.com"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #42949147/Trx 95097b169ec4760259a230de7248b48afe422646
View Raw JSON Data
{
  "trx_id": "95097b169ec4760259a230de7248b48afe422646",
  "block": 42949147,
  "trx_in_block": 11,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-04-29T16:55:36",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "slack",
      "author": "firosolutions",
      "permlink": "vulnerability-management-with-slack",
      "title": "Vulnerability Management with slack",
      "body": "![Vulnerability Management with slack](https://cdn.steemitimages.com/DQmNd2jGakAc8D4Jqsezh5DzjCX2icNpt3NkmXbvqt5uYmf/image.png)\n\n\nA year ago we created a slack bot but we where never happy with it.\nSo we spent some time in the workshop and created a new one, as a very lightway version\nof our web interface.\nWe also have an irc bot, but people can make whatever bot they want with our api.\nThe api is really becomming better and better and happily runs vulns.firosolutions.com\n\n### Features:      \nFiro Solutions slack bot options      \n####  /loadapikey    \nImport api key\n\n####  /listwatchers         \nList the name of my watchers\n\n####  /solveall       \nMark all vulnerabilities as solved\n\n####  /listvulns     \nList amount of solved and unsolved vulnerabilities per watcher\n\n####  /vulnerabilitysearch    \nNice easteregg we added where you can search for vulnerabilities\n\n##  Integration    \nSo we wanted it to make it as easy as possible so all you need is your api key.\nAnd then to load the apikey you just type /loadapikey followed by your api key.\nYou can find your api key over at watchers.firosolutions.com/profile.\nwe also added a nice button on the /profile page so with one click of a button\nyou can install the bot in to your slack space.\n\n\n\n## Extra:\nslack rss subscribe\nDid you know you can import rss feeds in to slack?\nwell we did not know that :)\nwith:\n```text  \n/feed subscribe https://blog.firosolutions.com/posts/index.xml\n/feed subscribe https://blog.firosolutions.com/exploits/index.xml\n```\n\nBuild your own bots with our api:\nhttps://github.com/FiroSolutions/api.firosolutions.com",
      "json_metadata": "{\"tags\":[\"slack\"],\"image\":[\"https://cdn.steemitimages.com/DQmNd2jGakAc8D4Jqsezh5DzjCX2icNpt3NkmXbvqt5uYmf/image.png\"],\"links\":[\"https://github.com/FiroSolutions/api.firosolutions.com\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2020/04/27 16:01:03
voterdufbes
authorfirosolutions
permlinkbuilding-a-cargo-toml-scanner-for-rust
weight-10000 (-100.00%)
Transaction InfoBlock #42891936/Trx eb7a74a39d8d3af292ee1bf256b37b9c0f103847
View Raw JSON Data
{
  "trx_id": "eb7a74a39d8d3af292ee1bf256b37b9c0f103847",
  "block": 42891936,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-04-27T16:01:03",
  "op": [
    "vote",
    {
      "voter": "dufbes",
      "author": "firosolutions",
      "permlink": "building-a-cargo-toml-scanner-for-rust",
      "weight": -10000
    }
  ]
}
2020/04/27 11:09:39
voterkramis
authorfirosolutions
permlinkbuilding-a-cargo-toml-scanner-for-rust
weight-10000 (-100.00%)
Transaction InfoBlock #42886259/Trx c850d88a869c10813514c6038d3910764eaacf6b
View Raw JSON Data
{
  "trx_id": "c850d88a869c10813514c6038d3910764eaacf6b",
  "block": 42886259,
  "trx_in_block": 18,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-04-27T11:09:39",
  "op": [
    "vote",
    {
      "voter": "kramis",
      "author": "firosolutions",
      "permlink": "building-a-cargo-toml-scanner-for-rust",
      "weight": -10000
    }
  ]
}
2020/04/26 17:19:09
votertechken
authorfirosolutions
permlinkbuilding-a-cargo-toml-scanner-for-rust
weight100 (1.00%)
Transaction InfoBlock #42865393/Trx 3d04a0e1fc7a53efd901638fac99dc33f439cbda
View Raw JSON Data
{
  "trx_id": "3d04a0e1fc7a53efd901638fac99dc33f439cbda",
  "block": 42865393,
  "trx_in_block": 9,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-04-26T17:19:09",
  "op": [
    "vote",
    {
      "voter": "techken",
      "author": "firosolutions",
      "permlink": "building-a-cargo-toml-scanner-for-rust",
      "weight": 100
    }
  ]
}
2020/04/26 17:19:03
voterteam
authorfirosolutions
permlinkbuilding-a-cargo-toml-scanner-for-rust
weight1000 (10.00%)
Transaction InfoBlock #42865391/Trx 50b3bca478a64cf8ebcfe852e7648c4139f62e91
View Raw JSON Data
{
  "trx_id": "50b3bca478a64cf8ebcfe852e7648c4139f62e91",
  "block": 42865391,
  "trx_in_block": 10,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-04-26T17:19:03",
  "op": [
    "vote",
    {
      "voter": "team",
      "author": "firosolutions",
      "permlink": "building-a-cargo-toml-scanner-for-rust",
      "weight": 1000
    }
  ]
}
2020/04/26 17:03:39
parent author
parent permlinkrust
authorfirosolutions
permlinkbuilding-a-cargo-toml-scanner-for-rust
titleBuilding a Cargo.toml scanner for Rust
bodyNew fresh rusty updates ![rust firosolutions rust crab](https://cdn.steemitimages.com/DQmeRQrv8QGzSqkJoZFJfjQ1K5QdbQ63apw3M6Qudpd8CWT/image.png) So we wanted to make a command line version of rust.firosolutions.com for quickly being able to check and validate current crate(/library) versions in the Cargo.toml file. So when building a rust project we could simply validate the external crate(’s) versions. Because running with = “*” where the version is equal to just get the latest version is dangerous and will mostly break things in the future, luckily we could just run cargo search to grab the latest version from crates.io. We added /apiadd which takes json as input and the url of the Cargo.toml file as a json key, So it can look like: ```python >>> >>> aa = requests.get('https://rust.firosolutions.com/apiadd', json={'urllink':'https://raw.githubusercontent.com/FiroSolutions/vuln_rust/master/Cargo.toml'}) >>> aa.text '{"pasteid":"cVQGCgcBYXoftYSGNWjzd84vAvmVMCkZPbQiGSHGmmg"}\n' ``` or use curl: ```shell $ curl -H "Accept: application/json" -H "Content-type: application/json" -X POST -d '{"urllink":"https://raw.githubusercontent.com/FiroSolutions/vuln_rust/master/Cargo.toml"}' https://rust.firosolutions.com/apiadd ``` then it returns a paste id that we can go to https://rust.firosolutions.com/paste/ to view it in a regular browser like if you where just using the site as regularly. In order for you to integrate it in to your applications we added support so you can get the response in a json back instead of html by just adding /jsonresponse to the url. An example of this would be: https://rust.firosolutions.com/paste/uoXgZ9hRqXh7798F0UCMpCFYnYEzqf6iGlSGqYCgdc/jsonresponse Hacking together a script rust python script We summoned our inner spaghetti coder and wrote a script in python :) $ cat checklibs.py ```python #python >=3.6 import requests, json import os, sys from subprocess import Popen, PIPE, STDOUT print('Checking Cargo.toml') #check if file is here print('Uploading Cargo.toml') command = "cat Cargo.toml | nc termbin.com 9999" fluff = Popen(command, shell=True, stdin=PIPE, stdout=PIPE, stderr=STDOUT) link = fluff.stdout.read()#b'https://termbin.com/7a3u\n\x00' link = link.decode().split('\n')[0] aa = requests.get('https://rust.firosolutions.com/apiadd', json={'urllink':link}) print('Result:') for x in json.loads(requests.get("https://rust.firosolutions.com/paste/{}/jsonresponse".format(json.loads(aa.text).get('pasteid'))).text).get('libs'): if len(x)==4: print('\033[1;31m Found a vulnerability for {} \033[0;0m'.format(x[0])) print('\033[0;92m Description: \033[0;0m') print(x[3].get(list(x[3].keys())[0]).get('description')) print("Link:", x[3].get(list(x[3].keys())[0]).get('link')) else: print("Library:",x[0], 'Your Version:', x[1], 'Latest Version', x[2]) print('View result on:') print('https://rust.firosolutions.com/paste/{}/jsonresponse'.format(json.loads(aa.text).get('pasteid'))) ``` Sidenote termbin.com: While looking for a alternative to dpaste.com that: * 0: is a paste service * 1: supports syntax highlighting * 2: can be used from the command line Scratch syntax highlighting(feature request if you read this termbin) and we cherry picked termbin. Which lets simply upload a file using netcat. Normally we love dpaste.com as our main paste tool(which do in fact support syntax highlighting). Feature requests are welcome :) Our github app We have a github application which continuously scans your Cargo.toml file and creates an issue if you are using a crate with a bad version ## Link: https://blog.firosolutions.com/2019/09/github-rust-firo/ ## Cifiro If you wanna do more cool thing we have another python script called Cifiro which you can use together with Jenkins! You find it on our github linked bellow. ## Links: https://en.wikipedia.org/wiki/Jenkins_(software) https://rust.firosolutions.com https://github.com/firosolutions https://vulns.firosolutions.com https://blog.firosolutions.com/2020/04/cargo-scanner-updates/
json metadata{"tags":["rust"],"image":["https://cdn.steemitimages.com/DQmeRQrv8QGzSqkJoZFJfjQ1K5QdbQ63apw3M6Qudpd8CWT/image.png"],"links":["https://rust.firosolutions.com/paste/","https://rust.firosolutions.com/paste/uoXgZ9hRqXh7798F0UCMpCFYnYEzqf6iGlSGqYCgdc/jsonresponse","https://blog.firosolutions.com/2019/09/github-rust-firo/","https://en.wikipedia.org/wiki/Jenkins_","https://rust.firosolutions.com","https://github.com/firosolutions","https://vulns.firosolutions.com","https://blog.firosolutions.com/2020/04/cargo-scanner-updates/"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #42865093/Trx 542b091b2706ca1dcd3e1a18eddff48d03f06d03
View Raw JSON Data
{
  "trx_id": "542b091b2706ca1dcd3e1a18eddff48d03f06d03",
  "block": 42865093,
  "trx_in_block": 20,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-04-26T17:03:39",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "rust",
      "author": "firosolutions",
      "permlink": "building-a-cargo-toml-scanner-for-rust",
      "title": "Building a Cargo.toml scanner for Rust",
      "body": "New fresh rusty updates\n\n![rust firosolutions rust crab](https://cdn.steemitimages.com/DQmeRQrv8QGzSqkJoZFJfjQ1K5QdbQ63apw3M6Qudpd8CWT/image.png)\n\nSo we wanted to make a command line version of rust.firosolutions.com for\nquickly being able to check and validate current crate(/library) versions\nin the Cargo.toml file.\nSo when building a rust project we could simply validate the external crate(’s)\nversions.\nBecause running with = “*” where the version is equal to just get the latest version is dangerous\nand will mostly break things in the future, luckily we could\njust run cargo search to grab the latest version from crates.io.\nWe added /apiadd which takes json as input and the url of the Cargo.toml file as\na json key, So it can look like:\n```python  \n>>> \n>>> aa = requests.get('https://rust.firosolutions.com/apiadd', json={'urllink':'https://raw.githubusercontent.com/FiroSolutions/vuln_rust/master/Cargo.toml'}) \n>>> aa.text\n'{\"pasteid\":\"cVQGCgcBYXoftYSGNWjzd84vAvmVMCkZPbQiGSHGmmg\"}\\n'\n```   \n\nor use curl:\n```shell  \n$ curl -H \"Accept: application/json\" -H \"Content-type: application/json\" -X POST -d '{\"urllink\":\"https://raw.githubusercontent.com/FiroSolutions/vuln_rust/master/Cargo.toml\"}' https://rust.firosolutions.com/apiadd\n\n```\nthen it returns a paste id that we can go to https://rust.firosolutions.com/paste/\nto view it in a regular browser like if you where just using the site as regularly. In order for you to integrate it in to your applications we added support so you\ncan get the response in a json back instead of html by just adding /jsonresponse\nto the url.\nAn example of this would be:\nhttps://rust.firosolutions.com/paste/uoXgZ9hRqXh7798F0UCMpCFYnYEzqf6iGlSGqYCgdc/jsonresponse\nHacking together a script\nrust python script\nWe summoned our inner spaghetti coder and wrote a script in python :)\n$ cat checklibs.py\n```python   \n#python >=3.6\nimport requests, json\nimport os, sys\nfrom subprocess import Popen, PIPE, STDOUT\nprint('Checking Cargo.toml')\n#check if file is here\nprint('Uploading Cargo.toml')\ncommand = \"cat Cargo.toml | nc termbin.com 9999\"\nfluff = Popen(command, shell=True, stdin=PIPE, stdout=PIPE, stderr=STDOUT)\nlink = fluff.stdout.read()#b'https://termbin.com/7a3u\\n\\x00'\nlink = link.decode().split('\\n')[0]\naa = requests.get('https://rust.firosolutions.com/apiadd', json={'urllink':link})\nprint('Result:')\nfor x in json.loads(requests.get(\"https://rust.firosolutions.com/paste/{}/jsonresponse\".format(json.loads(aa.text).get('pasteid'))).text).get('libs'):\n\tif len(x)==4:\n\t\tprint('\\033[1;31m Found a vulnerability for {} \\033[0;0m'.format(x[0]))\n\t\tprint('\\033[0;92m Description: \\033[0;0m')\n\t\tprint(x[3].get(list(x[3].keys())[0]).get('description'))\n\t\tprint(\"Link:\", x[3].get(list(x[3].keys())[0]).get('link'))\n\telse:\n\t\tprint(\"Library:\",x[0], 'Your Version:', x[1], 'Latest Version', x[2])\nprint('View result on:')\nprint('https://rust.firosolutions.com/paste/{}/jsonresponse'.format(json.loads(aa.text).get('pasteid')))\n```\n\n\nSidenote termbin.com:\nWhile looking for a alternative to dpaste.com that:       \n* 0: is a paste service      \n* 1: supports syntax highlighting     \n* 2: can be used from the command line              \n\nScratch syntax highlighting(feature request if you read this termbin) and we\ncherry picked termbin.\nWhich lets simply upload a file using netcat.\nNormally we love dpaste.com as our main paste tool(which do in fact support syntax highlighting).\nFeature requests are welcome :)\nOur github app\nWe have a github application which continuously scans your Cargo.toml file\nand creates an issue if you are using a crate with a bad version\n## Link:\nhttps://blog.firosolutions.com/2019/09/github-rust-firo/\n\n## Cifiro    \nIf you wanna do more cool thing we have another python script called Cifiro        \nwhich you can use together with Jenkins! You find it on our github linked bellow.       \n\n## Links:      \nhttps://en.wikipedia.org/wiki/Jenkins_(software)\nhttps://rust.firosolutions.com\nhttps://github.com/firosolutions\nhttps://vulns.firosolutions.com\nhttps://blog.firosolutions.com/2020/04/cargo-scanner-updates/",
      "json_metadata": "{\"tags\":[\"rust\"],\"image\":[\"https://cdn.steemitimages.com/DQmeRQrv8QGzSqkJoZFJfjQ1K5QdbQ63apw3M6Qudpd8CWT/image.png\"],\"links\":[\"https://rust.firosolutions.com/paste/\",\"https://rust.firosolutions.com/paste/uoXgZ9hRqXh7798F0UCMpCFYnYEzqf6iGlSGqYCgdc/jsonresponse\",\"https://blog.firosolutions.com/2019/09/github-rust-firo/\",\"https://en.wikipedia.org/wiki/Jenkins_\",\"https://rust.firosolutions.com\",\"https://github.com/firosolutions\",\"https://vulns.firosolutions.com\",\"https://blog.firosolutions.com/2020/04/cargo-scanner-updates/\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2020/04/26 16:55:24
voternidezem
authorfirosolutions
permlinkvulnerability-index-updates
weight-10000 (-100.00%)
Transaction InfoBlock #42864931/Trx 04f86635c38f8e1e5142c176be1a6466f206d4f7
View Raw JSON Data
{
  "trx_id": "04f86635c38f8e1e5142c176be1a6466f206d4f7",
  "block": 42864931,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-04-26T16:55:24",
  "op": [
    "vote",
    {
      "voter": "nidezem",
      "author": "firosolutions",
      "permlink": "vulnerability-index-updates",
      "weight": -10000
    }
  ]
}
2020/04/25 11:12:39
parent author
parent permlinksecurity
authorfirosolutions
permlinkvulnerability-index-updates
titleVulnerability index updates!
body![vulns.firosolutions.com microsoft](https://cdn.steemitimages.com/DQmSVCpGNbaSeMMy3g9cAhBKff22kjmDRSD8YgoSB7DCBmV/image.png) We are happy to give you updates on our latest features for vulns.firosolutions.com! We have updated vulns.firosolutions.com to be faster and better for displaying the platforms and also for finding similar platforms. For example here is a screen shot of similar microsoft products with security vulnerabilities in them: ![microsoft vulnerabilities firo solutions](https://cdn.steemitimages.com/DQmZzmWWcHMoeuxAKUapoTFGB8jhC5x1wes16YrAyx4wuUD/image.png) The similar platform function of course applies to all platforms such as cisco: ![cisco vulnerabilities on vulns.firosolutions.com](https://cdn.steemitimages.com/DQmNjfMryrcuGCimBAQkWzFxuyDK8eCpgfDt4H7pGJnVfh9/image.png) As always we are happy to get your feedback :) Enjoy the new updates! Links: https://vulns.firosolutions.com/view/exploit/ASB-2020.0090%20-%20%5BWin%5D%20Microsoft%20products%20utilising%20the%20Autodesk%20FBX%20library:%20Multiple%20vulnerabilities/ vulns.firosolutions.com https://vulns.firosolutions.com/view/platform/Microsoft%20Windows
json metadata{"tags":["security"],"image":["https://cdn.steemitimages.com/DQmSVCpGNbaSeMMy3g9cAhBKff22kjmDRSD8YgoSB7DCBmV/image.png","https://cdn.steemitimages.com/DQmZzmWWcHMoeuxAKUapoTFGB8jhC5x1wes16YrAyx4wuUD/image.png","https://cdn.steemitimages.com/DQmNjfMryrcuGCimBAQkWzFxuyDK8eCpgfDt4H7pGJnVfh9/image.png"],"links":["https://vulns.firosolutions.com/view/exploit/ASB-2020.0090%20-%20%5BWin%5D%20Microsoft%20products%20utilising%20the%20Autodesk%20FBX%20library:%20Multiple%20vulnerabilities/","https://vulns.firosolutions.com/view/platform/Microsoft%20Windows"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #42830211/Trx e527de45a74de2a01d658913361080810ae40bda
View Raw JSON Data
{
  "trx_id": "e527de45a74de2a01d658913361080810ae40bda",
  "block": 42830211,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-04-25T11:12:39",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "security",
      "author": "firosolutions",
      "permlink": "vulnerability-index-updates",
      "title": "Vulnerability index updates!",
      "body": "![vulns.firosolutions.com microsoft](https://cdn.steemitimages.com/DQmSVCpGNbaSeMMy3g9cAhBKff22kjmDRSD8YgoSB7DCBmV/image.png)\n\nWe are happy to give you updates on our latest features for vulns.firosolutions.com!\n\n\nWe have updated vulns.firosolutions.com to be faster and better for displaying the platforms and also for finding similar platforms.\nFor example here is a screen shot of similar microsoft products with security vulnerabilities in them:\n\n![microsoft vulnerabilities firo solutions](https://cdn.steemitimages.com/DQmZzmWWcHMoeuxAKUapoTFGB8jhC5x1wes16YrAyx4wuUD/image.png)\n\nThe similar platform function of course applies to all platforms such as cisco:\n\n![cisco vulnerabilities on vulns.firosolutions.com](https://cdn.steemitimages.com/DQmNjfMryrcuGCimBAQkWzFxuyDK8eCpgfDt4H7pGJnVfh9/image.png)\n\n\nAs always we are happy to get your feedback :)   \n\nEnjoy the new updates!\n\nLinks:\nhttps://vulns.firosolutions.com/view/exploit/ASB-2020.0090%20-%20%5BWin%5D%20Microsoft%20products%20utilising%20the%20Autodesk%20FBX%20library:%20Multiple%20vulnerabilities/\nvulns.firosolutions.com\nhttps://vulns.firosolutions.com/view/platform/Microsoft%20Windows",
      "json_metadata": "{\"tags\":[\"security\"],\"image\":[\"https://cdn.steemitimages.com/DQmSVCpGNbaSeMMy3g9cAhBKff22kjmDRSD8YgoSB7DCBmV/image.png\",\"https://cdn.steemitimages.com/DQmZzmWWcHMoeuxAKUapoTFGB8jhC5x1wes16YrAyx4wuUD/image.png\",\"https://cdn.steemitimages.com/DQmNjfMryrcuGCimBAQkWzFxuyDK8eCpgfDt4H7pGJnVfh9/image.png\"],\"links\":[\"https://vulns.firosolutions.com/view/exploit/ASB-2020.0090%20-%20%5BWin%5D%20Microsoft%20products%20utilising%20the%20Autodesk%20FBX%20library:%20Multiple%20vulnerabilities/\",\"https://vulns.firosolutions.com/view/platform/Microsoft%20Windows\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
firosolutionsreceived 0.032 STEEM, 0.001 SBD, 0.050 SP author reward for @firosolutions / rust-hyper-request-smuggling
2020/04/14 15:20:00
authorfirosolutions
permlinkrust-hyper-request-smuggling
sbd payout0.001 SBD
steem payout0.032 STEEM
vesting payout82.151425 VESTS
Transaction InfoBlock #42527139/Virtual Operation #3
View Raw JSON Data
{
  "trx_id": "0000000000000000000000000000000000000000",
  "block": 42527139,
  "trx_in_block": 4294967295,
  "op_in_trx": 0,
  "virtual_op": 3,
  "timestamp": "2020-04-14T15:20:00",
  "op": [
    "author_reward",
    {
      "author": "firosolutions",
      "permlink": "rust-hyper-request-smuggling",
      "sbd_payout": "0.001 SBD",
      "steem_payout": "0.032 STEEM",
      "vesting_payout": "82.151425 VESTS"
    }
  ]
}
firosolutionsreceived 0.015 SBD, 0.107 SP author reward for @firosolutions / joomla-and-wordpress-scanner
2020/04/09 15:26:45
authorfirosolutions
permlinkjoomla-and-wordpress-scanner
sbd payout0.015 SBD
steem payout0.000 STEEM
vesting payout174.128937 VESTS
Transaction InfoBlock #42386531/Virtual Operation #3
View Raw JSON Data
{
  "trx_id": "0000000000000000000000000000000000000000",
  "block": 42386531,
  "trx_in_block": 4294967295,
  "op_in_trx": 0,
  "virtual_op": 3,
  "timestamp": "2020-04-09T15:26:45",
  "op": [
    "author_reward",
    {
      "author": "firosolutions",
      "permlink": "joomla-and-wordpress-scanner",
      "sbd_payout": "0.015 SBD",
      "steem_payout": "0.000 STEEM",
      "vesting_payout": "174.128937 VESTS"
    }
  ]
}
firosolutionsreceived 0.027 SBD, 0.190 SP author reward for @firosolutions / security-headlines-second-episode
2020/04/08 13:23:15
authorfirosolutions
permlinksecurity-headlines-second-episode
sbd payout0.027 SBD
steem payout0.000 STEEM
vesting payout309.145237 VESTS
Transaction InfoBlock #42356008/Virtual Operation #3
View Raw JSON Data
{
  "trx_id": "0000000000000000000000000000000000000000",
  "block": 42356008,
  "trx_in_block": 4294967295,
  "op_in_trx": 0,
  "virtual_op": 3,
  "timestamp": "2020-04-08T13:23:15",
  "op": [
    "author_reward",
    {
      "author": "firosolutions",
      "permlink": "security-headlines-second-episode",
      "sbd_payout": "0.027 SBD",
      "steem_payout": "0.000 STEEM",
      "vesting_payout": "309.145237 VESTS"
    }
  ]
}
2020/04/08 00:37:33
voterdeeppurple2
authorfirosolutions
permlinkrust-hyper-request-smuggling
weight-10000 (-100.00%)
Transaction InfoBlock #42341053/Trx e24335f1296baa0ef638b235d8d7cd999639cf15
View Raw JSON Data
{
  "trx_id": "e24335f1296baa0ef638b235d8d7cd999639cf15",
  "block": 42341053,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-04-08T00:37:33",
  "op": [
    "vote",
    {
      "voter": "deeppurple2",
      "author": "firosolutions",
      "permlink": "rust-hyper-request-smuggling",
      "weight": -10000
    }
  ]
}
2020/04/07 15:56:45
voterfreislpi
authorfirosolutions
permlinkrust-hyper-request-smuggling
weight-10000 (-100.00%)
Transaction InfoBlock #42330879/Trx 40ee702537a01c25b3b0c69f664e7e8bfedb89b7
View Raw JSON Data
{
  "trx_id": "40ee702537a01c25b3b0c69f664e7e8bfedb89b7",
  "block": 42330879,
  "trx_in_block": 7,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-04-07T15:56:45",
  "op": [
    "vote",
    {
      "voter": "freislpi",
      "author": "firosolutions",
      "permlink": "rust-hyper-request-smuggling",
      "weight": -10000
    }
  ]
}
firosolutionscustom json: notify
2020/04/07 15:54:09
required auths[]
required posting auths["firosolutions"]
idnotify
json["setLastRead",{"date":"2020-04-07T15:54:07"}]
Transaction InfoBlock #42330828/Trx f366034b2cf934caa1eaaa0f92fb1b74234c55e0
View Raw JSON Data
{
  "trx_id": "f366034b2cf934caa1eaaa0f92fb1b74234c55e0",
  "block": 42330828,
  "trx_in_block": 11,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-04-07T15:54:09",
  "op": [
    "custom_json",
    {
      "required_auths": [],
      "required_posting_auths": [
        "firosolutions"
      ],
      "id": "notify",
      "json": "[\"setLastRead\",{\"date\":\"2020-04-07T15:54:07\"}]"
    }
  ]
}
2020/04/07 15:41:39
voterpayroll
authorfirosolutions
permlinkrust-hyper-request-smuggling
weight400 (4.00%)
Transaction InfoBlock #42330582/Trx b0a051a0d87907978ffa8297cc7cc0718527bb30
View Raw JSON Data
{
  "trx_id": "b0a051a0d87907978ffa8297cc7cc0718527bb30",
  "block": 42330582,
  "trx_in_block": 17,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-04-07T15:41:39",
  "op": [
    "vote",
    {
      "voter": "payroll",
      "author": "firosolutions",
      "permlink": "rust-hyper-request-smuggling",
      "weight": 400
    }
  ]
}
2020/04/07 15:20:00
parent author
parent permlinksecurity
authorfirosolutions
permlinkrust-hyper-request-smuggling
titleRust Hyper Request smuggling
bodyThe exploit of the day is a request smuggling vulnerability found in the HTTP Rust library Hyper. ![Firo Solutions request smuggling](https://cdn.steemitimages.com/DQmXyciGd2KKtHWmXpRnWZgQ9zg8osB6WpdZKFvF8NG68TU/image.png) Request Smuggling Request smuggling is sending 2 requests inside one payload so normally you would go to the website and one request is sent but with request smuggling you send 1 payload of data and fool the server that the request is 2 different request instead of one. This method of attacking got very popular after affecting the popular HAProxy and the great security researcher https://twitter.com/albinowax published a blog post talking about it. HTTP smuggling has affected a lot of software like: Netty CVE-2020–7238 https://github.com/jdordonezn/CVE-2020-72381/issues/1 Apache tomcat Nginx HAProxy Waitress Gitlab And many more even squid. It even got a CWE(Common Weakness Enumeration) definition: “When malformed or abnormal HTTP requests are interpreted by one or more entities in the data flow between the user and the web server, such as a proxy or firewall, they can be interpreted inconsistently, allowing the attacker to “smuggle” a request to one device without the other device being aware of it.” https://cwe.mitre.org/data/definitions/444.html An interesting discovery was found in the hyper HTTP crate. It’s a simple bug the client that handles the “transfer-encoding: chunked” part of the GET request wrongly. HAProxy Nathan Davison reported a vulnerability in HAProxy: Nathan Davison (@ndavison) reported that in legacy mode we didn't correctly rejected messages featuring a transfer-encoding header missing the "chunked" value. The impact was limited, but if combined with "http-reuse always", it could be used as an help to construct a content smuggling attack against a vulnerable component employing a lenient parser which would ignore the content-length header as soon as it sees a transfer-encoding one, without even parsing it. He then wrote a blog post about using HAProxy as a load balancer and a python flask backend then by exploiting that HAProxy doesnt reject the bad “Transfer-Encoding: chunked” messages was able to cause a http-smuggling attack. https://nathandavison.com/blog/haproxy-http-request-smuggling https://www.mail-archive.com/[email protected]/msg34926.html ### Poc example exploit ```python import socket website = input('gime website:') s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect((website, 80)) stuff = """ GET /stuff HTTP/1.1 Host: {} Content-Type: application/x-www-form-urlencoded Content-Length: 60 Transfer-Encoding: chunked 0 GET /admin HTTP/1.1 Host: {} Foo: xGET /home HTTP/1.1 Host: {} """.format(website, website, website) s.sendall(stuff) response = s.recv(1024) # change if needed print('got back: ', response) ``` ## Links to hyper https://crates.io/crates/hyper https://docs.rs/hyper/ Check your cargo.toml files here: https://rust.firosolutions.com The hyper crate has been patched since 0.12.34 ### External links: https://github.com/jdordonezn/CVE-2020-72381/issues/1 https://portswigger.net/web-security/request-smuggling/ https://regilero.github.io/english/security/2019/10/17/security_apache_traffic_server_http_smuggling/ https://nathandavison.com/blog/haproxy-http-request-smuggling https://blog.firosolutions.com/exploits/request-smuggling-rust-hyper/
json metadata{"tags":["security"],"users":["ndavison"],"image":["https://cdn.steemitimages.com/DQmXyciGd2KKtHWmXpRnWZgQ9zg8osB6WpdZKFvF8NG68TU/image.png"],"links":["https://twitter.com/albinowax","https://github.com/jdordonezn/CVE-2020-72381/issues/1","https://cwe.mitre.org/data/definitions/444.html","https://nathandavison.com/blog/haproxy-http-request-smuggling","https://www.mail-archive.com/[email protected]/msg34926.html","https://crates.io/crates/hyper","https://docs.rs/hyper/","https://rust.firosolutions.com","https://portswigger.net/web-security/request-smuggling/","https://regilero.github.io/english/security/2019/10/17/security_apache_traffic_server_http_smuggling/","https://blog.firosolutions.com/exploits/request-smuggling-rust-hyper/"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #42330158/Trx 23f7e38aa5f086f5a215691c59096eb9ae57712b
View Raw JSON Data
{
  "trx_id": "23f7e38aa5f086f5a215691c59096eb9ae57712b",
  "block": 42330158,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-04-07T15:20:00",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "security",
      "author": "firosolutions",
      "permlink": "rust-hyper-request-smuggling",
      "title": "Rust Hyper Request smuggling",
      "body": "The exploit of the day is a request smuggling vulnerability found in the HTTP Rust library Hyper.\n\n![Firo Solutions request smuggling](https://cdn.steemitimages.com/DQmXyciGd2KKtHWmXpRnWZgQ9zg8osB6WpdZKFvF8NG68TU/image.png)\nRequest Smuggling\nRequest smuggling is sending 2 requests inside one payload so normally you would go to the website and one request is sent\nbut with request smuggling you send 1 payload of data and fool the server that the request is 2 different request instead of one.\nThis method of attacking got very popular after affecting the popular HAProxy and the great security researcher https://twitter.com/albinowax\npublished a blog post talking about it.\nHTTP smuggling has affected a lot of software like:\nNetty\nCVE-2020–7238\nhttps://github.com/jdordonezn/CVE-2020-72381/issues/1\nApache tomcat\nNginx\nHAProxy\nWaitress\nGitlab\nAnd many more even squid.\nIt even got a CWE(Common Weakness Enumeration) definition: “When malformed or abnormal HTTP requests are interpreted by one or more entities in the data flow between the user and the web server, such as a proxy or firewall, they can be interpreted inconsistently, allowing the attacker to “smuggle” a request to one device without the other device being aware of it.” https://cwe.mitre.org/data/definitions/444.html\nAn interesting discovery was found in the hyper HTTP crate.\nIt’s a simple bug the client that handles the “transfer-encoding: chunked” part of the\nGET request wrongly.\nHAProxy\nNathan Davison reported a vulnerability in HAProxy:\nNathan Davison (@ndavison) reported that in legacy mode we didn't correctly\nrejected messages featuring a transfer-encoding header missing the \"chunked\"\nvalue. The impact was limited, but if combined with \"http-reuse always\", it\ncould be used as an help to construct a content smuggling attack against a\nvulnerable component employing a lenient parser which would ignore the\ncontent-length header as soon as it sees a transfer-encoding one, without even\nparsing it.\nHe then wrote a blog post about using HAProxy as a load balancer and a python flask backend\nthen by exploiting that HAProxy doesnt reject the bad “Transfer-Encoding: chunked” messages\nwas able to cause a http-smuggling attack.\nhttps://nathandavison.com/blog/haproxy-http-request-smuggling https://www.mail-archive.com/[email protected]/msg34926.html\n\n\n### Poc example exploit    \n```python \nimport socket \nwebsite = input('gime website:')\ns = socket.socket(socket.AF_INET, socket.SOCK_STREAM)\ns.connect((website, 80))\nstuff = \"\"\"\nGET /stuff HTTP/1.1\nHost: {}\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 60\nTransfer-Encoding: chunked\n0\nGET /admin HTTP/1.1\nHost: {}\nFoo: xGET /home HTTP/1.1\nHost: {}\n\"\"\".format(website, website, website)\ns.sendall(stuff)\nresponse = s.recv(1024) # change if needed \nprint('got back: ', response)\n```\n\n## Links to hyper\nhttps://crates.io/crates/hyper\nhttps://docs.rs/hyper/\n\n\nCheck your cargo.toml files here:\nhttps://rust.firosolutions.com\n\n\nThe hyper crate has been patched since 0.12.34\n### External links:   \nhttps://github.com/jdordonezn/CVE-2020-72381/issues/1\nhttps://portswigger.net/web-security/request-smuggling/\nhttps://regilero.github.io/english/security/2019/10/17/security_apache_traffic_server_http_smuggling/\nhttps://nathandavison.com/blog/haproxy-http-request-smuggling\nhttps://blog.firosolutions.com/exploits/request-smuggling-rust-hyper/",
      "json_metadata": "{\"tags\":[\"security\"],\"users\":[\"ndavison\"],\"image\":[\"https://cdn.steemitimages.com/DQmXyciGd2KKtHWmXpRnWZgQ9zg8osB6WpdZKFvF8NG68TU/image.png\"],\"links\":[\"https://twitter.com/albinowax\",\"https://github.com/jdordonezn/CVE-2020-72381/issues/1\",\"https://cwe.mitre.org/data/definitions/444.html\",\"https://nathandavison.com/blog/haproxy-http-request-smuggling\",\"https://www.mail-archive.com/[email protected]/msg34926.html\",\"https://crates.io/crates/hyper\",\"https://docs.rs/hyper/\",\"https://rust.firosolutions.com\",\"https://portswigger.net/web-security/request-smuggling/\",\"https://regilero.github.io/english/security/2019/10/17/security_apache_traffic_server_http_smuggling/\",\"https://blog.firosolutions.com/exploits/request-smuggling-rust-hyper/\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2020/04/02 15:54:45
voterpayroll
authorfirosolutions
permlinkjoomla-and-wordpress-scanner
weight400 (4.00%)
Transaction InfoBlock #42189997/Trx 814cb5caa557bb65fb78b2914714f88a6fd730a5
View Raw JSON Data
{
  "trx_id": "814cb5caa557bb65fb78b2914714f88a6fd730a5",
  "block": 42189997,
  "trx_in_block": 31,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-04-02T15:54:45",
  "op": [
    "vote",
    {
      "voter": "payroll",
      "author": "firosolutions",
      "permlink": "joomla-and-wordpress-scanner",
      "weight": 400
    }
  ]
}
firosolutionscustom json: notify
2020/04/02 15:27:24
required auths[]
required posting auths["firosolutions"]
idnotify
json["setLastRead",{"date":"2020-04-02T15:27:22"}]
Transaction InfoBlock #42189459/Trx af6961d672c5c0ed90f8dbe5822de5cc5e30867c
View Raw JSON Data
{
  "trx_id": "af6961d672c5c0ed90f8dbe5822de5cc5e30867c",
  "block": 42189459,
  "trx_in_block": 16,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-04-02T15:27:24",
  "op": [
    "custom_json",
    {
      "required_auths": [],
      "required_posting_auths": [
        "firosolutions"
      ],
      "id": "notify",
      "json": "[\"setLastRead\",{\"date\":\"2020-04-02T15:27:22\"}]"
    }
  ]
}
2020/04/02 15:26:57
voterfirosolutions
authorfirosolutions
permlinkjoomla-and-wordpress-scanner
weight10000 (100.00%)
Transaction InfoBlock #42189450/Trx 420eeb5041c2643c3eccafb1ac134aa84333c678
View Raw JSON Data
{
  "trx_id": "420eeb5041c2643c3eccafb1ac134aa84333c678",
  "block": 42189450,
  "trx_in_block": 11,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-04-02T15:26:57",
  "op": [
    "vote",
    {
      "voter": "firosolutions",
      "author": "firosolutions",
      "permlink": "joomla-and-wordpress-scanner",
      "weight": 10000
    }
  ]
}
2020/04/02 15:26:42
parent author
parent permlinkwordpress
authorfirosolutions
permlinkjoomla-and-wordpress-scanner
titleJoomla and Wordpress Scanner
body![wordpress.firosolutions.com](https://cdn.steemitimages.com/DQmT1PEpWBS6kbdXgcSXetJCMFvnS1NgYbey1sEQiKCprpU/image.png) We are finally live with our one click scan a site and import it to watchers.firosolutions.com scanner! Wordpress and Joomla security is rough and we want to make it easy for everyone. A feature we get asked for a lot is one that just is “enter a domain name and auto import” so why not :) the wordpress and joomla scanners is finally live so it makes it very easy to get emailed when a security vulnerability is affecting either your wordpress or joomla site! We first created one for wordpress which will automatically find your wordpress sites version number and plugins ![wordpress security scanner plugins](https://cdn.steemitimages.com/DQmT6mJgNW7sQYtP7Ffbyag9Sng6GdiJaLCZYyRnzKJqRxR/image.png) The scanner is also nice if you want to get a quick overview of your plugins latest versions and your wordpress version. We also added a one click import function so when a new update gets released that is affecting your site you get an email from us :) Easy peasy :) While going at it we also added a Joomla scanner :) ![image.png](https://cdn.steemitimages.com/DQmXExARsLDCC4Vk444hgH6AmiMpzS2mqGQcJoYg1pxcU2F/image.png) Both the scanners are free to use if you need to validate your site or check your versions :) ## Links: https://wordpress.firosolutions.com https://joomla.firosolutions.com
json metadata{"tags":["wordpress"],"image":["https://cdn.steemitimages.com/DQmT1PEpWBS6kbdXgcSXetJCMFvnS1NgYbey1sEQiKCprpU/image.png","https://cdn.steemitimages.com/DQmT6mJgNW7sQYtP7Ffbyag9Sng6GdiJaLCZYyRnzKJqRxR/image.png","https://cdn.steemitimages.com/DQmXExARsLDCC4Vk444hgH6AmiMpzS2mqGQcJoYg1pxcU2F/image.png"],"links":["https://wordpress.firosolutions.com","https://joomla.firosolutions.com"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #42189446/Trx 0de5168a7ee9cd028f28a36056f3b06b1a6ac222
View Raw JSON Data
{
  "trx_id": "0de5168a7ee9cd028f28a36056f3b06b1a6ac222",
  "block": 42189446,
  "trx_in_block": 12,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-04-02T15:26:42",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "wordpress",
      "author": "firosolutions",
      "permlink": "joomla-and-wordpress-scanner",
      "title": "Joomla and Wordpress Scanner",
      "body": "![wordpress.firosolutions.com](https://cdn.steemitimages.com/DQmT1PEpWBS6kbdXgcSXetJCMFvnS1NgYbey1sEQiKCprpU/image.png)\n\nWe are finally live with our one click scan a site and import it to watchers.firosolutions.com scanner!\nWordpress and Joomla security is rough and we want to make it easy for everyone.\nA feature we get asked for a lot is one that just is “enter a domain name and auto import” so why not :) the wordpress and joomla scanners is finally live so it makes it very easy to get emailed when a security vulnerability is affecting either your wordpress or joomla site!\nWe first created one for wordpress which will automatically find your wordpress sites version number and plugins\n\n\n![wordpress security scanner plugins](https://cdn.steemitimages.com/DQmT6mJgNW7sQYtP7Ffbyag9Sng6GdiJaLCZYyRnzKJqRxR/image.png)\n\n\nThe scanner is also nice if you want to get a quick overview of your plugins latest versions and your wordpress version.\n\nWe also added a one click import function so when a new update gets released that is affecting your site you get an email from us :)\nEasy peasy :)\nWhile going at it we also added a Joomla scanner :)\n\n![image.png](https://cdn.steemitimages.com/DQmXExARsLDCC4Vk444hgH6AmiMpzS2mqGQcJoYg1pxcU2F/image.png)\n\nBoth the scanners are free to use if you need to validate your site or check your versions :)\n\n## Links:\n\nhttps://wordpress.firosolutions.com  \nhttps://joomla.firosolutions.com",
      "json_metadata": "{\"tags\":[\"wordpress\"],\"image\":[\"https://cdn.steemitimages.com/DQmT1PEpWBS6kbdXgcSXetJCMFvnS1NgYbey1sEQiKCprpU/image.png\",\"https://cdn.steemitimages.com/DQmT6mJgNW7sQYtP7Ffbyag9Sng6GdiJaLCZYyRnzKJqRxR/image.png\",\"https://cdn.steemitimages.com/DQmXExARsLDCC4Vk444hgH6AmiMpzS2mqGQcJoYg1pxcU2F/image.png\"],\"links\":[\"https://wordpress.firosolutions.com\",\"https://joomla.firosolutions.com\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
2020/04/01 21:47:54
voterxerez
authorfirosolutions
permlinksecurity-headlines-second-episode
weight-10000 (-100.00%)
Transaction InfoBlock #42168626/Trx 1b1fc33304c07289c3eda4fac854871b0882944f
View Raw JSON Data
{
  "trx_id": "1b1fc33304c07289c3eda4fac854871b0882944f",
  "block": 42168626,
  "trx_in_block": 8,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-04-01T21:47:54",
  "op": [
    "vote",
    {
      "voter": "xerez",
      "author": "firosolutions",
      "permlink": "security-headlines-second-episode",
      "weight": -10000
    }
  ]
}
2020/04/01 13:50:48
parent authorsfwpexperts
parent permlinkhow-to-increase-your-wordpress-website-s-security-sfwpexperts
authorfirosolutions
permlinkq843s4
title
body@@ -55,16 +55,24 @@ dpress!%0A +https:// wordpres
json metadata{"app":"steemit/0.2","links":["https://wordpress.firosolutions.com"]}
Transaction InfoBlock #42159220/Trx 2f08ffddc8ba38061d3f39fbe9a9df1814a1dc5e
View Raw JSON Data
{
  "trx_id": "2f08ffddc8ba38061d3f39fbe9a9df1814a1dc5e",
  "block": 42159220,
  "trx_in_block": 21,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-04-01T13:50:48",
  "op": [
    "comment",
    {
      "parent_author": "sfwpexperts",
      "parent_permlink": "how-to-increase-your-wordpress-website-s-security-sfwpexperts",
      "author": "firosolutions",
      "permlink": "q843s4",
      "title": "",
      "body": "@@ -55,16 +55,24 @@\n dpress!%0A\n+https://\n wordpres\n",
      "json_metadata": "{\"app\":\"steemit/0.2\",\"links\":[\"https://wordpress.firosolutions.com\"]}"
    }
  ]
}
2020/04/01 13:50:27
parent authorsfwpexperts
parent permlinkhow-to-increase-your-wordpress-website-s-security-sfwpexperts
authorfirosolutions
permlinkq843s4
title
bodynice, we also have a wordpress scanner and support wordpress! wordpress.firosolutions.com
json metadata{"app":"steemit/0.2"}
Transaction InfoBlock #42159213/Trx 750b7efcc272fb7c168971fdbe929887a6177d75
View Raw JSON Data
{
  "trx_id": "750b7efcc272fb7c168971fdbe929887a6177d75",
  "block": 42159213,
  "trx_in_block": 19,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-04-01T13:50:27",
  "op": [
    "comment",
    {
      "parent_author": "sfwpexperts",
      "parent_permlink": "how-to-increase-your-wordpress-website-s-security-sfwpexperts",
      "author": "firosolutions",
      "permlink": "q843s4",
      "title": "",
      "body": "nice, we also have a wordpress scanner and support wordpress!\nwordpress.firosolutions.com",
      "json_metadata": "{\"app\":\"steemit/0.2\"}"
    }
  ]
}
2020/04/01 13:48:18
voterpayroll
authorfirosolutions
permlinksecurity-headlines-second-episode
weight400 (4.00%)
Transaction InfoBlock #42159171/Trx e1f6352f48641848e5a8b44b1998783c2026a2ee
View Raw JSON Data
{
  "trx_id": "e1f6352f48641848e5a8b44b1998783c2026a2ee",
  "block": 42159171,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-04-01T13:48:18",
  "op": [
    "vote",
    {
      "voter": "payroll",
      "author": "firosolutions",
      "permlink": "security-headlines-second-episode",
      "weight": 400
    }
  ]
}
2020/04/01 13:23:15
parent author
parent permlinksecurity
authorfirosolutions
permlinksecurity-headlines-second-episode
titleSecurity headlines second episode
body## Security headlines second episode ![Security Headlines podcast Firo Solutions](https://cdn.steemitimages.com/DQmeBo9g7GctiRPNwf1eYQj8qyjQwEhzsJDTYde8V3fQYVV/image.png) In this episode of security headlines the following vulnerabilities are mentioned: ## For wordpress: WordPress Aviary Image Editor Add-On For Gravity Forms Plugins 3.0 Beta R7 CSRF Shell Upload Vulnerability Wordpress Plugin Contact Form Builder 1.6.1 — Cross-Site Scripting Wordpress Plugin PicUploader 1.0 — Remote File Upload WordPress StatTraq 1.3.0 SQL Injection WordPress WP Forms 1.5.8.2 Cross Site Scripting WordPress WPForms 1.5.9 Cross Site Scripting ## Tor: Medium CVE-2020–10592: Torproject TOR Medium CVE-2020–10593: Torproject TOR TROVE-2020–002 TROVE-2020–004 remotely triggerable memory leak on relays and clients Causing denial of service https://trac.torproject.org/projects/tor/ticket/33619 ## Sharepoint: SharePoint Workflows XOML Injection which is now a metasploit module https://packetstormsecurity.com/files/156930/SharePoint-Workflows-XOML-Injection.html ## Joomla: Joomla GMapFP 3.30 Arbitrary File Upload Joomla HDWPlayer 4.2 SQL Injection Joomla! com_hdwplayer 4.2 search.php SQL Injection ## Jenkins: jenkins-2-plugins: Execute arbitrary code commands openshift/jenkins-plugin: Deserialization in snakeyaml YAML() objects allowed for remote code execution (CVE-2020–2167) ## Weechat: Medium CVE-2020–9759: Weechat Weechat Medium CVE-2020–9760: Weechat Weechat https://weechat.org/doc/security/ One crash and one buffer overflow based on nick prefixes. ## SCADA: New scada vulnerability affecting Schneider Electric IGSS SCADA Software https://www.zerodayinitiative.com/advisories/upcoming/ https://www.us-cert.gov/ics/advisories/icsa-20-084-02 http/3 QUIC vuln: Specially formatted HTTP/3 messages may cause the Traffic Management Microkernel (TMM) to produce a core file. (CVE-2020–5859) https://support.f5.com/csp/article/K61367237 Check us out at: https://firosolutions.com https://watchers.firosolutions.com https://blog.firosolutions.com status.firosolutions.com Latest Vulnerabilities and exploits Wanna get notified? We have invented Vulnerability Management and are the only once that offer it in the best form… status.firosolutions.com Listen to it here: https://anchor.fm/firo-solutions/episodes/Second-Episode-ec84rp
json metadata{"tags":["security"],"image":["https://cdn.steemitimages.com/DQmeBo9g7GctiRPNwf1eYQj8qyjQwEhzsJDTYde8V3fQYVV/image.png"],"links":["https://trac.torproject.org/projects/tor/ticket/33619","https://packetstormsecurity.com/files/156930/SharePoint-Workflows-XOML-Injection.html","https://weechat.org/doc/security/","https://www.zerodayinitiative.com/advisories/upcoming/","https://www.us-cert.gov/ics/advisories/icsa-20-084-02","https://support.f5.com/csp/article/K61367237","https://firosolutions.com","https://watchers.firosolutions.com","https://blog.firosolutions.com","https://anchor.fm/firo-solutions/episodes/Second-Episode-ec84rp"],"app":"steemit/0.2","format":"markdown"}
Transaction InfoBlock #42158676/Trx e839e5b8329c5d8fc8c3f79426b7cc5f8e1aa462
View Raw JSON Data
{
  "trx_id": "e839e5b8329c5d8fc8c3f79426b7cc5f8e1aa462",
  "block": 42158676,
  "trx_in_block": 25,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-04-01T13:23:15",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "security",
      "author": "firosolutions",
      "permlink": "security-headlines-second-episode",
      "title": "Security headlines second episode",
      "body": "## Security headlines second episode\n\n\n![Security Headlines podcast Firo Solutions](https://cdn.steemitimages.com/DQmeBo9g7GctiRPNwf1eYQj8qyjQwEhzsJDTYde8V3fQYVV/image.png)\n\n\n\n\nIn this episode of security headlines the following vulnerabilities are mentioned:\n## For wordpress:\nWordPress Aviary Image Editor Add-On For Gravity Forms Plugins 3.0 Beta R7 CSRF Shell Upload Vulnerability\nWordpress Plugin Contact Form Builder 1.6.1 — Cross-Site Scripting\nWordpress Plugin PicUploader 1.0 — Remote File Upload\nWordPress StatTraq 1.3.0 SQL Injection\nWordPress WP Forms 1.5.8.2 Cross Site Scripting\nWordPress WPForms 1.5.9 Cross Site Scripting\n## Tor:\nMedium CVE-2020–10592: Torproject TOR\nMedium CVE-2020–10593: Torproject TOR\nTROVE-2020–002 TROVE-2020–004\nremotely triggerable memory leak on relays and clients\nCausing denial of service\nhttps://trac.torproject.org/projects/tor/ticket/33619\n## Sharepoint:\nSharePoint Workflows XOML Injection which is now a metasploit module\nhttps://packetstormsecurity.com/files/156930/SharePoint-Workflows-XOML-Injection.html\n## Joomla:\nJoomla GMapFP 3.30 Arbitrary File Upload\nJoomla HDWPlayer 4.2 SQL Injection\nJoomla! com_hdwplayer 4.2 search.php SQL Injection\n## Jenkins:\njenkins-2-plugins: Execute arbitrary code commands\nopenshift/jenkins-plugin: Deserialization in snakeyaml YAML() objects\nallowed for remote code execution (CVE-2020–2167)\n## Weechat:\nMedium CVE-2020–9759: Weechat Weechat\nMedium CVE-2020–9760: Weechat Weechat\nhttps://weechat.org/doc/security/\nOne crash and one buffer overflow based on nick prefixes.\n## SCADA:\nNew scada vulnerability affecting Schneider Electric IGSS SCADA Software\nhttps://www.zerodayinitiative.com/advisories/upcoming/\nhttps://www.us-cert.gov/ics/advisories/icsa-20-084-02\nhttp/3 QUIC vuln:\nSpecially formatted HTTP/3 messages may cause the Traffic Management\nMicrokernel (TMM) to produce a core file. (CVE-2020–5859)\nhttps://support.f5.com/csp/article/K61367237\nCheck us out at:\nhttps://firosolutions.com\nhttps://watchers.firosolutions.com\nhttps://blog.firosolutions.com\nstatus.firosolutions.com Latest Vulnerabilities and exploits\nWanna get notified? We have invented Vulnerability Management and are the only once that offer it in the best form…\nstatus.firosolutions.com\nListen to it here:\nhttps://anchor.fm/firo-solutions/episodes/Second-Episode-ec84rp",
      "json_metadata": "{\"tags\":[\"security\"],\"image\":[\"https://cdn.steemitimages.com/DQmeBo9g7GctiRPNwf1eYQj8qyjQwEhzsJDTYde8V3fQYVV/image.png\"],\"links\":[\"https://trac.torproject.org/projects/tor/ticket/33619\",\"https://packetstormsecurity.com/files/156930/SharePoint-Workflows-XOML-Injection.html\",\"https://weechat.org/doc/security/\",\"https://www.zerodayinitiative.com/advisories/upcoming/\",\"https://www.us-cert.gov/ics/advisories/icsa-20-084-02\",\"https://support.f5.com/csp/article/K61367237\",\"https://firosolutions.com\",\"https://watchers.firosolutions.com\",\"https://blog.firosolutions.com\",\"https://anchor.fm/firo-solutions/episodes/Second-Episode-ec84rp\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
    }
  ]
}
firosolutionsreceived 0.147 STEEM, 0.177 SP author reward for @firosolutions / security-headlines-podcast
2020/03/28 13:10:09
authorfirosolutions
permlinksecurity-headlines-podcast
sbd payout0.000 SBD
steem payout0.147 STEEM
vesting payout287.784040 VESTS
Transaction InfoBlock #42044766/Virtual Operation #5
View Raw JSON Data
{
  "trx_id": "0000000000000000000000000000000000000000",
  "block": 42044766,
  "trx_in_block": 4294967295,
  "op_in_trx": 0,
  "virtual_op": 5,
  "timestamp": "2020-03-28T13:10:09",
  "op": [
    "author_reward",
    {
      "author": "firosolutions",
      "permlink": "security-headlines-podcast",
      "sbd_payout": "0.000 SBD",
      "steem_payout": "0.147 STEEM",
      "vesting_payout": "287.784040 VESTS"
    }
  ]
}
2020/03/26 08:27:54
voterjetesiber
authorfirosolutions
permlinkfpbyq4o1ywe
weight-10000 (-100.00%)
Transaction InfoBlock #41982337/Trx 509281e43caeeee9d0fa0b72df183cadf6439662
View Raw JSON Data
{
  "trx_id": "509281e43caeeee9d0fa0b72df183cadf6439662",
  "block": 41982337,
  "trx_in_block": 18,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-26T08:27:54",
  "op": [
    "vote",
    {
      "voter": "jetesiber",
      "author": "firosolutions",
      "permlink": "fpbyq4o1ywe",
      "weight": -10000
    }
  ]
}
zenaxflagged (-100.00%) @firosolutions / fpbyq4o1ywe
2020/03/26 05:49:33
voterzenax
authorfirosolutions
permlinkfpbyq4o1ywe
weight-10000 (-100.00%)
Transaction InfoBlock #41979209/Trx c4939a258bfaf7a6a08738070860ecf630d6e006
View Raw JSON Data
{
  "trx_id": "c4939a258bfaf7a6a08738070860ecf630d6e006",
  "block": 41979209,
  "trx_in_block": 18,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-26T05:49:33",
  "op": [
    "vote",
    {
      "voter": "zenax",
      "author": "firosolutions",
      "permlink": "fpbyq4o1ywe",
      "weight": -10000
    }
  ]
}
firosolutionscustom json: notify
2020/03/25 18:38:54
required auths[]
required posting auths["firosolutions"]
idnotify
json["setLastRead",{"date":"2020-03-25T18:38:10"}]
Transaction InfoBlock #41965962/Trx 014239089d2bd6e0a1f615c5e37cb68bb5c6ed3b
View Raw JSON Data
{
  "trx_id": "014239089d2bd6e0a1f615c5e37cb68bb5c6ed3b",
  "block": 41965962,
  "trx_in_block": 14,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2020-03-25T18:38:54",
  "op": [
    "custom_json",
    {
      "required_auths": [],
      "required_posting_auths": [
        "firosolutions"
      ],
      "id": "notify",
      "json": "[\"setLastRead\",{\"date\":\"2020-03-25T18:38:10\"}]"
    }
  ]
}

Account Metadata

POSTING JSON METADATA
None
JSON METADATA
profile{"profile_image":"https://cdn.steemitimages.com/DQmdxt1ZFfkCcNjYVbbfFDoGy13yoYmVE7rD8Hk74v3BEtf/FS.png","website":"https://firosolutions.com"}
{
  "posting_json_metadata": {},
  "json_metadata": {
    "profile": {
      "profile_image": "https://cdn.steemitimages.com/DQmdxt1ZFfkCcNjYVbbfFDoGy13yoYmVE7rD8Hk74v3BEtf/FS.png",
      "website": "https://firosolutions.com"
    }
  }
}

Auth Keys

Owner
Single Signature
Public Keys
STM873FZtNnUkbck2porc9uFqgyPUYuHUsnjyPRPpZhe4Yi1agbaB1/1
Active
Single Signature
Public Keys
STM6qGVbJ5Fnc9ziAS52Meqv6BJHiADzNrGWsFpzCQaWqT3B6QDqA1/1
Posting
Single Signature
Public Keys
STM7TqCuVakZANhtfUiVsZmGh1t3s7eCKMBRD2jHM3B2z4YFcbtR11/1
Memo
STM81DZPCzthZfpNJaAYjRHbh6UxmnMxGoPBBUmDCZ3caVXdWHHGn
{
  "owner": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM873FZtNnUkbck2porc9uFqgyPUYuHUsnjyPRPpZhe4Yi1agbaB",
        1
      ]
    ]
  },
  "active": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM6qGVbJ5Fnc9ziAS52Meqv6BJHiADzNrGWsFpzCQaWqT3B6QDqA",
        1
      ]
    ]
  },
  "posting": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM7TqCuVakZANhtfUiVsZmGh1t3s7eCKMBRD2jHM3B2z4YFcbtR1",
        1
      ]
    ]
  },
  "memo": "STM81DZPCzthZfpNJaAYjRHbh6UxmnMxGoPBBUmDCZ3caVXdWHHGn"
}

Witness Votes

0 / 30
No active witness votes.
[]