Posts
2577
Following
632
Followers
1419
"I'm interested in all kinds of astronomy."
repeated

Today my compiler told me "expected future, found a different future".

And I'm like: me too buddy, me too

1
38
1
@swapgs The weird part is that even the GHSA link is broken. I also skimmed through recent commits, and nothing immediately suspicious came forward, but I guess PHP don't like to advertise security fixes this way either...
1
0
1
Edited 26 days ago
[RSS] New writeup: a vulnerability in PHP's extract() function allows attackers to trigger a double-free, which in turn allows arbitrary code execution (native code)

https://ssd-disclosure.com/ssd-advisory-extract-double-free5-x-use-after-free7-x-8-x/

Can't find official identifiers for this, the GitHub advisory link is broken...
1
0
2
repeated

George Takei verified πŸ³οΈβ€πŸŒˆπŸ––πŸ½

Never forget.

3
13
0
repeated
Edited 26 days ago

Maybe you should build your own website https://neocities.org

0
3
0
repeated
repeated

I never liked nu metal and I feel retrospectively justified by the fact that both Fred Durst and Kid Rock seem to be almost uniquely brain damaged even today.

2
1
1
repeated
[RSS] Dubious security vulnerability: Once I have tricked the user into running a malicious shortcut, I can install malware

https://devblogs.microsoft.com/oldnewthing/20250414-00/?p=111072
0
0
2
repeated

Oh, this is interesting (and a little scary)

tl;dr don’t use SSDs for long term, offline storage. The data degrades after as little as two years without the drives being powered up

https://www.tomshardware.com/pc-components/storage/unpowered-ssd-endurance-investigation-finds-severe-data-loss-and-performance-issues-reminds-us-of-the-importance-of-refreshing-backups

5
14
0
@ligniform Ahh thanks, I remembered it being under Community, but with careful inspection I found the two tiny arrows under the score circle...
0
0
1
Anyway, I'd appreciate if my threat intel followers would put a banhammer on the jofogas-order[.]help domain <3
0
1
1
repeated
Is it me or is it really not possible to vote on URL's on VT anymore?
1
0
0
repeated

can't remember where I saw it but "Using AI in education is like using a forklift in the gym. The weights do not actually need to be moved from place to place. That is not the work. The work is what happens within you" is a solid quote

5
26
1
repeated
Edited 27 days ago

Get your Apple updates folks.
https://support.apple.com/en-us/100100

CVE-2025-31200 and CVE-2025-31201 are being exploited ITW.

0
3
0
repeated

Today I learned something truly bizarre about Python.

What do you think this code does?

class C:
xs = [1]
ys = [1]
print([[None for y in ys] for x in xs])

Does it work and print [[None]]?
Or does it fail to access `xs` and `ys` because class scoping is weird?

Neither.

It successfully accesses `xs`, but then fails to access `ys`!

This is sort of documented (but not fully) under https://docs.python.org/3/reference/executionmodel.html#resolution-of-names.

0
1
0
repeated

Bonk Knob Records is very pleased to announce the release of "Not Bonk What I Call Wave: Remixes Vol 2"!

You can find it for streaming and download at all these fine places:

https://mirlo.space/bonk-knob-records/release/not-bonk

https://bonkwave.org/music/not-bonk-what-i-call-wave-remixes-vol2/

https://bonkknobrecords.bandcamp.com/album/not-bonk-what-i-call-wave-remixes-vol-2

https://bandwagon.fm/67fea099a706ef72dcec3978

Join us for the release party at 19:00 UTC / 20:00 BST / 21:00 CEST at https://party.bonkwave.org

0
4
0
Unauthenticated Remote Code Execution in Erlang/OTP SSH

https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2

Not much details and unfortunately I don't know much Erlang (yet), but this one seems pretty interesting!

CVE-2025-32433
2
2
4
Show older