Posts
3373
Following
712
Followers
1579
"I'm interested in all kinds of astronomy."
@badsamurai @meadxmoon could you point me to implementarion details?
0
0
0
repeated
@cR0w @badsamurai where does the article show prevention/blocking options? I've scrolled my fingers off on mobile but can only see the reitaration of the technique in reeeeally long form...
0
0
0
repeated
Edited 7 months ago

local restaurants I love you but please have a website that isn't your instagram profile and has your hours of business on it. kthx

8
16
0
@Catarina @0xabad1dea Maybe we did reach singularity - it's just not technological, but the spacetime kind?
0
0
2
[RSS] CVE-2025-5333 - CVSS 9.5: Remote Code Execution in Broadcom Symantec Endpoint Management Suite (Altiris)

https://www.lrqa.com/en/cyber-labs/remote-code-execution-in-broadcom-altiris-irm/
0
0
1
repeated
repeated

WHAT IS THIS SOURCERY?!

has support now?!

I can start and have the required security tools installed !

https://github.com/microsoft/winget-dsc/tree/main/samples/DscResources/Microsoft.WindowsSandbox.DSC

0
2
0
repeated

There’s an entire rant buried in here but, in short, I absolutely agree.

4
8
0
[RSS] [CVE-2024-58258] SugarCRM <= 14.0.0 (css/preview) LESS Code Injection Vulnerability

https://karmainsecurity.com/KIS-2025-04
0
0
1
@freddy Yeah that one caught my eye too, and based on the timeline I agree that it's likely unfixed.

(I linked the talk FTR and so that I can tag in @ifsecure in case he has some more info :))
1
0
0
@freddy Umm, you mean Safari? :) Their latest security release was on 12th May, within the disclosure window but surely close to the initial disclosure...

Btw. this is the talk&slides by @ifsecure :
https://www.youtube.com/watch?v=U1kc7fcF5Ao
https://docs.google.com/presentation/d/1pAosPlKUw4uI5lfg7FVheTZAtI5mUy8iDeE4znprV34/edit
1
0
0
repeated

πŸ“£"Debuggers 1103: Introductory Binary Ninja" is released!πŸ“£
https://ost2.fyi/Dbg1103

This class by Xusheng Li of Vector 35 @binaryninja provides students with a hands-on introduction to the free version of Binja as a debugger, thus providing decompilation support!

Like all current classes, the core content is made fully public, and you only need to register if you want to post to the discussion board or track your class progress. This mini-class takes approximately 2 hours to complete, and can be used as standalone cross-training for people who know other reverse engineering tools, or by students learning assembly for the first time in the https://ost2.fyi/Arch1001 x86-64 Assembly class.

0
4
0
Edited 7 months ago
"Engineers from Apple & Google have proposed patches in the GNOME gitlab issues, but neither has had a fix applied to the git repo since there is currently no maintainer for libxslt."

https://www.openwall.com/lists/oss-security/2025/07/11/2

CVE-2025-7424 CVE-2025-7425

#OSS #FOSS
1
2
4
#PHP Security fixes:

- CVE-2025-1735 SQLi via pgsql (related to CVE-2025-1094)
https://github.com/php/php-src/security/advisories/GHSA-hrwm-9436-5mv3

- CVE-2025-1220 SSRF via fsockopen()
https://github.com/php/php-src/security/advisories/GHSA-3cr5-j632-f35r

- CVE-2025-6491 NULL deref in SOAP handling
https://github.com/php/php-src/security/advisories/GHSA-453j-q27h-5p8x
0
0
3
repeated

Valerie Aurora πŸ‡ΊπŸ‡¦

Want to influence the rules for vulnerability handling for every internet-connected product sold in the EU? Of course you do!

You are invited to the vulnerability handling deep dive session for the Cyber Resilience Act. July 22, online, free registration:

https://www.stan4cra.eu/event-details/deep-dive-session-vulnerability-handling

More info: https://www.stan4cra.eu/resources

0
4
0
repeated

Revisiting automating MS-RPC vulnerability research and making the tool open source https://www.incendium.rocks/posts/Revisiting-MS-RPC-Vulnerability-Research-automation/

0
2
0
Many static site generator templates don't include meta tags for #RSS / #Atom feeds, but the data is generated by default. It's worth to check:

/index.xml
/feed.xml

#syndication
0
3
7
Show older