Explore tweets tagged as #codeexecution
Revolutionizing AI Efficiency: Anthropicโs Code Execution with MCP Approach https://t.co/ZMWXaWiQCS
#MCPApproach #AIInnovation #TokenEfficiency #DataManagement #CodeExecution
0
0
0
FIN7 Reboot : New EDR Bypasses and Automated Attacks : https://t.co/iGzzYr4pWn FIN7 Power Hour: Adversary Archaeology and the Evolution of FIN7 : https://t.co/gzTYLBc9sC *PowerSploit : https://t.co/DqD3gPrLqX *PowerSploit - A PowerShell Post-Exploitation Framework :
0
65
146
The Brain of Your Computer: Explaining How Code Actually Thinks Read Here: https://t.co/Uf7bUfW2f0
#Programming #CodeExecution #TechExplained #SoftwareEngineering #Compilers #Interpreters #CodingLife #LearnToCode #DevCommunity #TechTwitter
0
0
5
Ivanti Flags Critical Endpoint Manager Flaw Allowing Remote Code Execution https://t.co/G7QPtn75bV
#codeexecution #IvantiEPM #RemoteExploit
0
1
0
๐๐ก๐๐ญ ๐๐๐ฉ๐ฉ๐๐ง๐ฌ ๐๐ก๐๐ง ๐๐จ๐ฎ ๐๐ข๐ญ โ๐๐ฎ๐งโ: ๐๐ก๐ ๐๐๐๐ซ๐๐ญ ๐๐ข๐๐ ๐จ๐ ๐๐จ๐ฎ๐ซ ๐๐จ๐๐ Read Here: https://t.co/8Pr6xPWpnw
#Programming #SoftwareEngineering #ComputerScience #CodeExecution #LearningToCode #Developers #CodingJourney #AI #SourceCode
0
2
4
๐จ #Mozilla fixes critical Firefox #zeroday vulnerabilities from #Pwn2Own. โCVE-2024-29943 & CVE-2024-29944 await scores. Exploits include out-of-bounds read/write & privileged #codeexecution. ๐ต๏ธCVE-2024-29943 allows unauthorized access to JS objects, while CVE-2024-29944
0
1
3
๐ Grok 4.1 Fast is Live! Unlock the power of our Agent Tools API now with direct access to ๐ data, seamless web browsing, and real-time code execution. Take your AI projects to the next level! #GrokAI #Grok4_1 #AgentToolsAPI #AIInnovation #WebBrowsingAI #CodeExecution
0
0
0
1/14 Writing code is one thing, but understanding what happens when you run it is another. Every program goes through multiple steps before producing an output. Let's break it down. #Programming #CodeExecution #Computer #Technology #TechExplained #TechBasics
1
1
1
#VulnerabilityReport #CodeExecution DLL Hijacking Flaw (CVE-2025-56383) Found in Notepad++, Allowing Arbitrary Code Execution, PoC Available
0
0
0
CISA adds critical Adobe Experience Manager flaw CVE-2025-54253 to KEV list with a perfect 10.0 score. Active exploitation observed; vulnerability allows arbitrary code execution via misconfigured servlet. #AdobeAEM #CodeExecution #USA
https://t.co/Z62AdVaOyB
0
0
0
โ ๏ธ๐ขA critical #vulnerability in #Syrus4 #IoT Gateway (CVE-2023-6248) could allow attackers to simultaneously perform #codeexecution on thousands of vehicles. Find out more on the SOCRadar blog๐ https://t.co/BxAN777ZE5
#cybersecurity
0
1
0
๐ก๏ธ#Ivanti fixed 13 critical #RCE vulnerabilities in #Avalanche, requiring urgent attention. Also, #Google fixed an actively exploited #Chrome #zeroday #vulnerability, CVE-2023-7024, potentially causing program crashes or #codeexecution. Learn more๐ https://t.co/f2M3hs8b4B
0
0
1
#CybersecurityNEWS๐ด๐จ๐ป๐พย Los detalles sobre las dos vulnerabilidades se han ocultado a la luz de la explotaciรณn activa para evitar que mรกs actores de amenazas abusen de ellas. Ver Mรกs: https://t.co/rWXbLXWhr8
#DevelNews #CodeExecution
0
0
0
PoC Exploit Released for Apache NiFi Code Execution Vulnerability (CVE-2023-34212) https://t.co/TeD5ijqID4
#PoC #Exploit #Apache #ApacheNiFi #CodeExecution #Vulnerability
0
0
0
Over 700 self-hosted Gogs Git instances hit by a zero-day (CVE-2025-8110) enabling remote code execution via symlink abuse. The bug bypasses patches, allowing attackers to overwrite critical files globally. #GogsBreach #CodeExecution #GlobalRisk
https://t.co/g0B3nfDWNc
0
0
0
Over 600 Laravel Apps Exposed to Remote Code Execution Due to Leaked APP_KEYs on GitHub https://t.co/UvaMtIg05u
#Cybersecurity #Laravel #AppSecurity #CodeExecution #DataBreach
1
0
4
0
11
17
๐ปOver 660,000 Rsync servers exposed to code execution attacks๐ป https://t.co/jRIX5FRLLe
#Rsync #CyberSecurity #DataBreach #CodeExecution #SecurityVulnerabilities #Hacking #ServerSecurity #CyberAttack #InfoSec
0
0
0