Posts
3373
Following
712
Followers
1579
"I'm interested in all kinds of astronomy."
repeated

CVE ID: CVE-2024-58136
Vendor: Yiiframework
Product: Yii
Date Added: 2025-05-02
Vulnerability: Yiiframework Yii Improper Protection of Alternate Path Vulnerability
Notes: This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://www.yiiframework.com/news/709/please-upgrade-to-yii-2-0-52 ; https://nvd.nist.gov/vuln/detail/CVE-2024-58136
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2024-58136

0
1
0
@G33KatWork I saw another little girl on the train almost jumping out of her mothers arms pointing out the window:
Girl: Look, look, look, look, look, ....
Mom: ???
Girl: *dramatic 10s pause* A TRACTOR!
0
0
1
repeated
repeated

Good programming is 99% sweat and 1% coffee.

β€” anonymous

0
1
0
repeated

From iframes and file reads to full RCE. πŸ”₯

We found an HTML-to-PDF API allowing file reads and SSRF - then chained it into remote code execution via a Chromium 62 WebView exploit.

πŸ‘‰ Read the full write-up here: https://neodyme.io/en/blog/html_renderer_to_rce/

0
2
0
Important data point: @kagihq had the recall notice as the first result. Google results look like this:
- Auction site
- Images
- <end of vertical screen space>
- different product of the same vendor
- *recall notice from USGOV*

#adtech
0
1
1
And the day is not over: Trying to fix some household stuff, I google for parts. First result is a recall notice claiming a dozen incidents with human injury o.O

(The part I was searching for was the cause of the failure too)
1
0
4
repeated

AFL++ v4.32c release - mostly minor bug fixes and improvements, LLVM 20 users should update! https://github.com/AFLplusplus/AFLplusplus/releases/tag/v4.32c -tools

0
7
0
One of my favorite #SmallWeb site is this guy's, who documents disassembling the multitude of things he collected during several decades, while also blogging the nuances of everyday life like what he got fur lunch or finding a dead cockroach:

https://translate.kagi.com/translate/http://www.szetszedtem.hu/1717villanyvasut/apukamevolt.htm
0
2
3
repeated
Edited 9 months ago

Interesting Git repos of the week:

Strategy:

* https://github.com/TalEliyahu/awesome-CISO-maturity-models - modelling your strategy

Detection:

* https://github.com/yevh/TaaC-AI - threat modelling as code
* https://github.com/thalesgroup-cert/Watcher - build your own threat hunting platform with Thales
* https://github.com/microsoft/msticpy - Microsoft's TI tooling

Exploitation:

* https://github.com/specfy/stack-analyser - what's in the stack?

Hardening:

* https://github.com/nistorj/ISR1000 - guestshell on the ISR1000

, ,

0
3
0
I struggled a couple of hours because my sshfs connections kept breaking, that made my browser hang in many different ways (fuse ftw!).

I suspected my router getting bust, but of course I was wrong. The problem - as always - was DNS.
0
1
6
@stf @clearbluejar I figured out like a month ago how to associate commit e-mails with my GH account so these things are actually visible now πŸ˜…
0
0
1
[FD] Microsoft Windows .XRM-MS File / NTLM Information Disclosure Spoofing

https://seclists.org/fulldisclosure/2025/May/0

Just block egress SMB connections already!
0
0
1
@gsymon incoherency doesn't mean the piece is not understandable, it means the pieces don't connect logically. As I explained above, the current EU decision has very little to do with Meta's AI strategy, or the ad-free model.
0
0
0
repeated

brk, a.k.a. @evanrichter

Don’t forget to patch your tomorrow! (Security related)
https://floss.social/@forgejo/114433179035067022

0
2
0
repeated

I'm proud to announce that myself and @atipriyabajaj have created the Workshop on Software Understanding and Reverse Engineering (SURE), which will be co-located at CCS 2025. https://sure-workshop.org/

Please follow our workshop account @sureworkshop and RT it for visibility :).

0
2
0
@gsymon don't confuse incoherency with complexity
1
0
0
repeated

Here's something counterintuitive to non-practitioners: curve P-521 is often less secure in practice than curve P-256.

The latter is more popular, and so better tested. The risk of implementation bugs dwarfs the risk of partial cryptanalysis of ECC, so picking P-521 optimizes for the wrong thing.

5
7
0
Show older