Search results

Jump to: navigation, search
  • ...nks to [[AT+XLOG Vulnerability|a new exploit]] discovered by [[User:Oranav|Oranav]].
    86 KB (10,312 words) - 17:11, 20 October 2022
  • [[User:Oranav|Oranav]] discovered another exploit (the [[AT+XLOG Vulnerability]]), and shared it
    3 KB (458 words) - 18:43, 16 September 2021
  • == ultrasn0w payload with comments (by [[User:Oranav|Oranav]]) ==
    27 KB (3,160 words) - 13:28, 17 September 2021
  • ...com/Hash.html] The hash was posted by NitroKey one day after [[User:Oranav|Oranav]] found and shared the exploit with the [[iPhone Dev Team]], making things
    1 KB (242 words) - 23:14, 16 September 2021
  • [[User:Oranav|Oranav]]
    584 bytes (77 words) - 00:35, 28 January 2013
  • * [[User:Oranav|Oranav]]
    6 KB (948 words) - 13:38, 17 September 2021
  • [[User:Oranav|Oranav]] ...ted the information and pastied it with hashes shortly after [[User:Oranav|Oranav]] had disclosed it to the [[iPhone Dev Team]].
    2 KB (105 words) - 21:00, 24 December 2012
  • * '''Vulnerability''': [[User:Oranav|Oranav]] (July) and [[User:iH8sn0w|iH8sn0w]] (September) (discovered independently *[[User:Oranav|Oranav]] discovers this crash and gives it to the [[iPhone Dev Team]].
    3 KB (353 words) - 13:35, 17 September 2021
  • ...also discovered by [[westbaer]], [[User:Geohot|geohot]] and [[User:Oranav|Oranav]] (each one independently)
    1 KB (115 words) - 23:48, 22 January 2013