BoF in a bunch of commands in PCMan FTP Server.
https://fitoxs.com/exploit/exploit-a0667f99e4dc732773f505cdb86fcae1.txt
https://fitoxs.com/exploit/exploit-5f4dcc3b5aa765d61d8327deb882cf99.txt
https://fitoxs.com/exploit/exploit-e3b0c44298fc1c149afbf4c8996fb924.txt
https://fitoxs.com/exploit/exploit-f2dbb39791fbe7e94d805312769e84cb.txt
https://fitoxs.com/exploit/exploit-4fcbb45637a8c2a83ec4e285bdf44ef4.txt
https://fitoxs.com/exploit/exploit-42ef6503a06aafc10808fa38b9e2e8f7.txt
Currently available Go fuzzing tools were missing critical features - some don’t play well with the latest Go toolchain. So we set out to change that.
@bruno, Nils Ollrogge, and colleagues explored more powerful ways to fuzz Go binaries. By tapping into Go’s native instrumentation — which is compatible with libFuzzer — we enabled effective fuzzing of Go code using LibAFL.
We’ve documented our approach and shared insights in our latest blog post: https://www.srlabs.de/blog-post/golibafl---fuzzing-go-binaries-using-libafl
Micropatches Released for NTLM Hash Disclosure Spoofing Vulnerability (CVE-2025-24054)
Just a reminder: Vulnerability Lookup isn’t just about finding CVEs. It supports the full chain, collection from multiple sources, continuous distribution, and allocation within a coordinated vulnerability disclosure (CVD) process. 100% open source.
🔗 An online version maintained by @circl https://vulnerability.circl.lu/
🔗 https://www.vulnerability-lookup.org/
🔗 https://github.com/vulnerability-lookup/vulnerability-lookup
So it's official: TLS certificate lifetimes will reduce from the current max of 398 days to:
* 200 days in March 2026
* 100 days in March 2027
* 47 days in March 2029
For web servers/proxies etc. it's reasonably simple, at least for smaller orgs but for e.g. network kit it might be more of a challenge. Having a timeframe to aim at definitely focusses the mind!
Via @riskybiz / https://risky.biz/risky-bulletin-ca-b-forum-approves-47-day-tls-certs/
And all of the sudden, we have solved supply chain security.
No CVE, no vulnerabilities!
Looks like the US Government are going to lose control of CVE. https://www.thecvefoundation.org/
Hackers, educators, tinkerers:
The 2025 Hacker Initiative grant cycle is open. We're funding individuals and groups who are:
🔹 Advancing hacker culture
🔹 Promoting digital rights
🔹 Educating the public
If you're building tools, sharing knowledge, or shaking things up apply here 👉 https://hackerinitiative.org/apply-now/
Signal boost appreciated.
A quick reminder that discounted registration rates for for the #LangSec workshop end tomorrow, April 14, at 11:59 pm PDT, and the conference hotel block rates end shortly after. Details at https://langsec.org/spw25/important-dates.html
We hope to see you all in San Francisco on May 15, 2025!
Recon CFP ends in less than 2 weeks on April 28. Prices for the training and conference increase on May 1st. Register now to save with early bird price. We have already announced a few talks and workshops, and more videos from last year have been released. https://recon.cx/ #reverseengineering #cybersecurity #offensivesecurity #hardwarehacking @hackingump1 @mr_phrazer @nicolodev @sinsinology @hunterbr72 @clearbluejar @phlaul @oryair1999 @hookgab @thequeenofelf @so11deo6loria @i0n1c @pedrib1337 @malachijonesphd @pat_ventuzelo @kb_intel @pinkflawd @reverse_tactics @onlytheduck @t0nvi @drch40s @brunopujos @mhoste1 @andreyknvl @texplained_re @jsmnsr @pulsoid @specterdev @richinseattle @yarden_shafir @aionescu @hackerschoice @sinsinology @sergeybratus @specterops @oryair1999 @phlaul @trailofbits @hexrayssa @nostarch @hexnomad @netspooky
Regardless of what happens with CVE/NVD, the PSF will continue publishing advisories for CPython through our OSV database and to the security-announce@python.org mailing list.
Please subscribe to those data sources to guarantee delivery of vulnerability data about CPython.