Posts
2476
Following
561
Followers
1266
A drunken debugger

Heretek of Silent Signal
repeated

We've completed a comparative security assessment of authorization policy languages: Cedar, Rego, and the OpenFGA modeling language.
If you are a language designer or a software developer, our AWS-sponsored assessment also provides recommendations for improving policy language design and for securing systems that use policy languages.
https://buff.ly/4cSO63s

0
2
1
repeated

Are we not negative enough towards

8
20
1
[RSS] We Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI

https://labs.watchtowr.com/we-spent-20-to-achieve-rce-and-accidentally-became-the-admins-of-mobi/
0
0
0
@joxean @dmnk Damn, now I see I need to upstream these changes and there are tons of conflicts :P Anyway, thanks for the reminder!
2
0
3
@joxean @dmnk I think Cartographer is based on this too (my fork with some compatibility fixes and QoL improvements):

https://github.com/v-p-b/Cartographer/tree/gtable
1
2
3
repeated
repeated

Talos Vulnerability Reports

New vulnerability report from Talos:

Microsoft Windows 10 AllJoyn Router Service information disclosure vulnerability

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1980

CVE-2024-38257,CVE-2024-38257
0
1
0
repeated

bert hubert 🇺🇦🇪🇺

As @echo_pbreyer reminded us, EU member states have revived their effort to force-install a child pornography scanner on our phones again. This idea was rejected twice before, but they'll keep trying. Here's an English transcript of what I said about this in Dutch parliament last year: https://berthub.eu/articles/posts/client-side-scanning-dutch-parliament/

0
2
0
repeated

My SharePoint RCE got fixed: CVE-2024-38018. Site Member privs should be enough to exploit.

I also found a DoS vuln that got patched today: CVE-2024-43466.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38018

0
5
0
From COM Object Fundamentals To UAC Bypasses - Tijme Gommers

https://www.youtube.com/watch?v=481SI_HWlLs
0
0
2
"This patch day, Microsoft introduced new garbage collection mechanism in win32k. In addition to the previously introduced type isolation mechanism, there is now garbage collection, making it more difficult to control the heap feng shui."

More info: https://x.com/TinySecEx/status/1833697218983080428
0
0
2
repeated
Edited 2 months ago

Happy from Microsoft: 79 new CVEs, 4 NEW EXPLOITED ZERO DAYS:

  • CVE-2024-43491 (9.8 critical) Microsoft Windows Update Remote Code Execution Vulnerability (EXPLOITED)
  • CVE-2024-38226 (7.3 high) Microsoft Publisher Security Feature Bypass Vulnerability (EXPLOITED)
  • CVE-2024-38217 (5.4 medium) Windows Mark of the Web Security Feature Bypass Vulnerability (EXPLOITED and PUBLICLY DISCLOSED)
  • CVE-2024-38014 (7.8 high) Windows Installer Elevation of Privilege Vulnerability (EXPLOITED)

EDIT: @BleepingComputer has mentioned that CVE-2024-38217 was marked publicly disclosed. Updated this to reflect it. See related reporting Microsoft September 2024 Patch Tuesday fixes 4 zero-days, 79 flaws

2
2
0
Straight Outta Kapton
0
0
1
repeated
Show older