Posts
2504
Following
650
Followers
1469
"I'm interested in all kinds of astronomy."
@timb_machine Aegis even forces you to export/backup periodically
1
0
0
[RSS] CVE-2025-20281: Cisco ISE API Unauthenticated Remote Code Execution Vulnerability

https://www.thezdi.com/blog/2025/7/24/cve-2025-20281-cisco-ise-api-unauthenticated-remote-code-execution-vulnerability
0
0
2
@amethyst My best guess is Savaged by Systemd must have something to do with it.
0
0
1
@bert_hubert oooh do you happen to know what OS it runs on?
1
0
0
repeated

You know those non-vulnerabilities that companies get forced to fix for compliance reasons? I've found a full bypass for a common patch strategy. I'm half-tempted to keep it secret for the greater good 😂

2
5
1
@albinowax the value of such deed is greatly underestimated, thank you!
0
0
0
repeated

At DistrictCon's inaugural Junkyard competition, we achieved full remote execution on two popular home network devices: a Netgear WGR614v9 router and BitDefender Box V1 security appliance.

Our exploitation techniques included chaining four buffer overflow vulnerabilities with authentication bypass on the router, plus a novel "bashsledding" ROP technique that sprays shell commands into NVRAM for reliable code execution.

Read the blog: https://blog.trailofbits.com/2025/07/25/exploiting-zero-days-in-abandoned-hardware/

0
5
0
repeated
repeated

Imagine being a welder. And every day you come to work you have to worry about whether your tools are where you left them. Or if your controls have been reversed. Or the tanks are mislabeled or rearranged. Or if your 110v equipment suddenly requires 220v. Or the trigger on your MIG welder only works after you tap on three fire hydrants. Or your visor has ads pop up in the way of your vision. Or cameras and microphones show up to record all your work and you don't know who has access to those recordings. Or that supply of rods you just purchased will no longer work with your torch because the manufacturer decided that you can only use rods purchased from them, even though that was not disclosed at the time of purchase.

Why the fuck does tech get away with it?

21
25
0
repeated

If you're looking at this thinking 'wait, CVE-2025-6543 is a denial of service vuln?', it's not - it turns out Citrix knew orgs were getting shelled but chose to not tell the public. The implants persist after patching.

2
7
0
repeated
today's interesting website: running https on port 3, just so the URL has :3 in it

https://silliest.website:3/
1
11
2
@janeishly @mttaggart by translation I mean the level of G translate&co, that we know from practice are useful. They shouldn't be used to translate e.g. full books of course.
0
0
1
[RSS] New Binary Ninja release: 5.1 Helion

https://binary.ninja/2025/07/24/5.1-helion.html
0
1
2
[RSS] exploits.club Weekly Newsletter 80 - ITW Windows Bugs, Deterministic iOS Exploits, Pwn2Own Firefox Vulns, and More

https://blog.exploits.club/exploits-club-weekly-newsletter-80-itw-windows-bugs-deterministic-ios-exploits-pwn2own-firefox-vulns-and-more/
0
0
1
[RSS] Micropatches Released for Windows Disk Cleanup Tool Elevation of Privilege Vulnerability (CVE-2025-21420)

https://blog.0patch.com/2025/07/micropatches-for-windows-disk-cleanup.html
0
1
2
repeated
repeated

🛠️ RIFT just got an upgrade!
Now supports FLIRT signature generation on Linux 🐧
Perfect for reverse engineering Rust malware 🦀
🔗 https://github.com/microsoft/RIFT

0
3
0
@sassdawe Sir, I have to ask you to leave...
0
0
1
@TarkabarkaHolgy add some engineering students that experiment with the currently relevant field of mounting lasers on t-rexes and I'm sold!
1
0
2
Show older