Posts
2589
Following
627
Followers
1403
"I'm interested in all kinds of astronomy."
repeated

Graham Sutherland / Polynomial

TIC80 jam just kicked off, with a DJ set from Commander Homer!

https://streaming.media.ccc.de/revision2025/revision

1
2
0
repeated

After challenge 7, I got inspired to build tooling for Native AOT reverse engineering.

As such, I built a Analyzer that can automatically recover most .NET types, methods and frozen objects (e.g., strings).

👉https://blog.washi.dev/posts/recovering-nativeaot-metadata/

0
5
0
repeated
repeated

Take Action: Defend the @internetarchive - https://blog.archive.org/2025/04/17/take-action-defend-the-internet-archive/ "This lawsuit is an existential threat to the Internet Archive and everything we preserve—including the Wayback Machine, a cornerstone of memory and preservation on the internet." please sign the open letter if you can

0
4
0
repeated

This one's kind of fun.

https://github.com/fastify/fastify/security/advisories/GHSA-mg2h-6x62-wpwc

sev:HIGH 7.5 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Fastify is a fast and low overhead web framework, for Node.js. In versions 5.0.0 to 5.3.0, applications that specify different validation strategies for different content types have a possibility to bypass validation by providing a slightly altered content type such as with different casing or altered whitespacing before ;. This issue has been patched in version 5.3.1. A workaround involves not specifying individual content types in the schema.

https://nvd.nist.gov/vuln/detail/CVE-2025-32442

0
3
0
repeated

I don't normally care about video games, especially with vulns, but this might be worth looking into. NamelessMC published 1 sev:CRIT, 4 sev:HIGH, and 1 sev:MED advisories since yesterday.

Why I care:

NamelessMC is a free, easy to use & powerful website software for Minecraft servers.

I have heard that Minecraft is used by predators to meet and influence or extort children, so if you know anyone running a Minecraft server that is used by kids, maybe make sure they know to keep it patched.

https://github.com/NamelessMC/Nameless/security

0
3
0
repeated

Tim Carstens Ⓥ✨ is hacking zk

Fun fact:

💁 The oldest known buffer overflow vuln dates back to UNIX V6 login

💁‍♀️ It appeared in a 1981 post by Truscott & Ellis (better known for inventing Usenet)

💁‍♂️ The next overflow vuln was fingerd, 1988

Bonus fact:

🙅 The login vuln isn’t real:

https://www.tuhs.org/cgi-bin/utree.pl?file=V6/usr/source/s1/login.c

0
2
0
repeated

Open Source Security mailing list

Multiple vulnerabilities in libxml2 https://www.openwall.com/lists/oss-security/2025/04/17/3
CVE-2025-32414: Buffer overflow when parsing text streams with Python API
Python Package Index contains outdated and unsanctioned vulnerable upload
CVE-2025-32415: Heap-based Buffer Overflow in xmlSchemaIDCFillNodeTables

0
4
0
repeated

It was only a matter of time - a contracted, approved grant to the Internet Archive was cut with no warning.

https://sfstandard.com/2025/04/17/doge-neh-funding-cuts-sf/

7
22
0
repeated

RCE in Webex. Nice.

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-app-client-rce-ufyMMYLC

sev:HIGH 8.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

A vulnerability in the custom URL parser of Cisco Webex App could allow an unauthenticated, remote attacker to persuade a user to download arbitrary files, which could allow the attacker to execute arbitrary commands on the host of the targeted user. This vulnerability is due to insufficient input validation when Cisco Webex App processes a meeting invite link. An attacker could exploit this vulnerability by persuading a user to click a crafted meeting invite link and download arbitrary files. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the targeted user.

https://nvd.nist.gov/vuln/detail/CVE-2025-20236

0
2
0
repeated

David Chisnall (*Now with 50% more sarcasm!*)

The first edition of the #CHERIoT book has been published!

The eBook editions are available for purchase now from a few retailers, print editions will take a bit longer to appear (up to two weeks). And, of course, the drafts of the second edition remain free (HTML, ePub, PDF) from the CHERIoT site

Thanks to Discribe Hub for funding a lot of the work on this edition!

1
5
0
@raptor I know I should be impressed by the LLM, but without actual analysis I feel we just took another step toward making everyone dumber...
0
0
0
oss-security - Re: CVE-2025-32433: Unauthenticated Remote Code Execution in Erlang/OTP SSH
https://www.openwall.com/lists/oss-security/2025/04/18/1

Exploit published ^
1
2
2
@mothcompute microsoft qword - built with...
0% quantum computing
50% qbasic
50% 128 bits
0
1
1
repeated

genius osdev 🏳️‍⚧️

microsoft word, the predecessor to microsoft dword,

3
6
0
repeated

Quite proud of myself for successfully building a Windows 16-bit application that runs on Windows 3.1 - all dialog-based, and it makes network connections, too! Compiled with Visual C++ 1.52 on XP, it works on this old system. Consumes 14kb disk space and does everything in even less RAM :)

0
8
0
repeated

@buherator IIRC you get a GHSA ID every time you report something through https://github.com/php/php-src/security/, so this one must have been closed as N/A because it's now in https://github.com/php/php-src/issues/18209.

Anyway it's a nice writeup, and apparently a stable bug that will be useful to bypass disable_functions on a bunch of PHP releases!

0
2
1
repeated

https://techcommunity.microsoft.com/blog/windows-itpro-blog/hotpatch-for-windows-client-now-available/4399808 Finally! I personally worked on Hotpatch, together with my team 3 years ago... and now is finally approaching client versions of Windows... Yuuuyuuu!

0
3
0
Show older