Posts
3124
Following
708
Followers
1551
"I'm interested in all kinds of astronomy."
[RSS] CVE-2024-55957: Local Privilege Escalation Vulnerability in Thermo Scientific(TM) Xcalibur(TM) and Foundation software

https://tierzerosecurity.co.nz/2025/02/07/cve-2024-55957.html
0
0
1
repeated

My 10k-word writeup on exploiting a heap-overflow in Llama.cpp's RPC Server's Tensor-operation to RCE. This by far is one of the most challenging but fun exploitation I've ever researched on.

https://retr0.blog/blog/llama-rpc-rce

0
6
0
Status: after two days of intensive calculation the whopping 1MB CalDAV import failed somewhere between 87-100% and I have no clue what was done and what needs to be fixed. #Thunderbird

Fortunately I found a solution that did the job in 5 mins at server-side:

https://www.reddit.com/r/selfhosted/comments/jbnu1l/how_would_i_push_an_ics_to_a_caldav_server/
0
0
3
repeated

CVE-2024-43625 - 2024-Nov - Microsoft Windows VMSwitch Elevation of Privilege - Use After Free - CVSS 8.1

vmwsitch diff
https://gist.github.com/clearbluejar/b5c12615270a54d031dc13a7d07988c9
๐Ÿ‘€๐Ÿ”ฅ

Side-by-side view: https://diffpreview.github.io/?b5c12615270a54d031dc13a7d07988c9 ๐Ÿง

A patch diffing ๐Ÿงต...

1
3
0
Edited 11 months ago
Since it's #Ghidra release day I contributed my part to climate change and built the latest version a couple of times.

The latest generated docs are available as usual at:
https://scrapco.de/ghidra_docs/

(I haven't found more hidden gems about PyGhidra yet)

Pre-built release for ghidra-r2web is here:
https://github.com/radareorg/ghidra-r2web/releases/tag/ghidra-11.3

I'll probably give VSCode-based extension development a shot during the weekend. I'll let y'all know how it's going, but Eclipse shouldn't be hard to beat...
1
0
2
repeated

Have tips? Story ideas? Something you think I should know about?

Reach me on Signal at KimZ.42

I cover cybersecurity and national security, writing about: nation-state hacking, espionage, cyber warfare, cybercrime, and policy. I don't write about companies - unless they've done something wrong.

0
3
0
repeated

I keep coming across all these "pseudocode" examples on Wikipedia and in academic papers, and what I don't understand is why the authors can't just learn a real programming language

7
2
0
repeated
repeated
repeated

A message to my fellow Europeans.
Don't be paralysed by overseas fascism.
It is time for Europe and its citizens to focus less on the USA.
Stop obsessively following the news in a country where you cannot change anything.
Focus your attention on where you can make an impact.
All attention is needed here to fight growing fascism.

7
4
0
repeated
9 hours later, we're at 51% ๐Ÿ˜‚
1
0
1
repeated

We've just released 0.15.0 - A big step toward 1.0 stable!

Featuring

0
4
0
repeated

We take your vulnerability report very seriously. Internally, we will pass the issue around between developers similar to the childhood game 'hot potato'. After a year of this, we will play a round of musical chairs where the last developer left standing will be assigned the ticket, and then they will also be let go from the company.

We will proceed to a hot potato round when you make your next inquiry. Due to our email retention policy, you will need to re-submit your original report and proof of concept exploit code at that time.

^ honest vulnerability coordination policies

2
5
0
The year is 2025. I have an .ics export of ~2000 items with <1MB size total. It seems I'll have to keep my computer running for the night to get it imported.

CalDAV is a still a dumpster of dumpster fires.
2
0
5
Show older