Posts
3115
Following
708
Followers
1551
"I'm interested in all kinds of astronomy."
repeated

Do Smart People Ever Say They’re Smart? (SmarterTools SmarterMail Pre-Auth RCE CVE-2025-52691) - watchTowr Labs https://labs.watchtowr.com/do-smart-people-ever-say-theyre-smart-smartertools-smartermail-pre-auth-rce-cve-2025-52691/

0
3
0
repeated

Full House

3
17
0
[RSS] Clang Hardening Cheat Sheet - Ten Years Later

http://blog.quarkslab.com/clang-hardening-cheat-sheet-ten-years-later.html
0
2
0
repeated

“The Conscience of a Hacker” by The Mentor is 40 years old today.

1
6
0
Edited 6 hours ago
"IDA 9.3 is on the horizon [...] type system enhancements"

God have mercy on my soul!

(context: https://scrapco.de/blog/reshare-ramblings-bad-vibes-with-ida.html )
0
0
1
repeated

We're now accepting applications for our 2026 summer internship program!

Trail of Bits is hiring interns across our software assurance, security engineering, and research & development teams. Over the summer, you'll work on real projects that might include conducting security assessments for critical systems, developing open-source tools, and contributing research that advances the field.

Applications are open now through February! Learn more and apply here!
https://apply.workable.com/trailofbits/j/0C784B6D41/

0
3
0
repeated
repeated

Cloudflare says that BGP routing anomalies right before the US intervention and arrest of Nicolas Maduro appear to have been just "an accident"

https://blog.cloudflare.com/bgp-route-leak-venezuela/

1
3
0
repeated

No, there's no major security vulnerability in zlib.

There's a stack buffer overflow in the contrib/untgz tool. However, these tools are unsupported as described by the README.contrib file: https://github.com/madler/zlib/blob/develop/contrib/README.contrib

"
All files under this contrib directory are UNSUPPORTED. They were
provided by users of zlib and were not tested by the authors of zlib.
Use at your own risk. Please contact the authors of the contributions
for help about these, not the zlib authors. Thanks.
"

0
4
0
[RSS] Ni8mare - Unauthenticated Remote Code Execution in n8n (CVE-2026-21858)

https://www.cyera.com/research-labs/ni8mare-unauthenticated-remote-code-execution-in-n8n-cve-2026-21858
0
1
2
[RSS] TrustZone Break-in Vulnerabilities in Ampere UEFI MM Drivers (Arbitrary Out-of-Bounds Write)

https://github.com/google/security-research/security/advisories/GHSA-jxxm-gxxf-64mg
0
1
1
[RSS] TrustZone Break-in Vulnerabilities in Ampere UEFI MM Drivers (Buffer Overflow and Stack Information Leak)

https://github.com/google/security-research/security/advisories/GHSA-46qj-g894-vrxr
0
1
1
[RSS] Breaking Down the Attack Surface of the Kenwood DNR1007XR - Part One

https://www.thezdi.com/blog/2026/1/6/breaking-down-the-attack-surface-of-the-kenwood-dnr1007xr-part-one
0
0
1
@cR0w @maaneeack @troed Don't take my word for it, I really didn't have time to dig in, but that's kind of the problem with slop isn't it?
1
0
2
@troed @maaneeack @cR0w The person who posted this also posted a bunch of other stuff in different projects. This is their "repro" for MongoDB:

```
./mdb_load -T /tmp/lmdb_asan < [crash_input_file]
```

...but I don't see `crash_input_file` anywhere. I smell slop.

(Source: https://seclists.org/fulldisclosure/2026/Jan/5 )
1
0
2
repeated

: Critical Path Traversal Vulnerability (CVE-2025-68428) in jsPDF - a widely-adopted package for generating PDF documents in JavaScript applications allows attackers to read & exfiltrate arbitrary files from the local filesystem:
👇
https://www.endorlabs.com/learn/cve-2025-68428-critical-path-traversal-in-jspdf

0
2
0
repeated
Edited yesterday
20
45
2
Show older