That means the attack is only relevant if a) you have a file with a secret, but no newlines&other characters breaking an URL, b) you know the path.
That seems rather unlikely in practice.
It may be that there are implementations that will ignore that and still open the URL. Or that will auto-encode newlines. Or that there's some trick I don't know. But that's all speculation. If you know of any *working* scenario where exfiltration with newlines works, I'd be interested to hear about it.
DOMPurify 3.3.0 will soon be released, with this likely being the most important change in a long time:
2025 Component Abuse Challenge: Load Cell Anemometer
https://hackaday.com/2025/10/09/2025-component-abuse-challenge-load-cell-anemometer/
Finding a buggy driver is one thing, abusing it is another๐ง
In his latest blog post, Luis Casvella shows you how BYOVD can be used as a Reflective Rootkit Loader ! ๐
โก๏ธ https://blog.quarkslab.com/exploiting-lenovo-driver-cve-2025-8061_part2.html
A few technical examples of when C++/Rust interop is complicated. #EuroRust
Open Source isn't going to help.
There's a way to invisibly compromise all software.
A perfect, self-replicating "sin" passed down for generations of compilers.
It's not just theoretical, and Ken Thompson showed us how.
Fuck I gotta unlock my bootloader asap https://social.linux.pizza/@MichaelRoss/115342003180134350
My Dad's on the lookout for a reasonable e-book reader. No Android, no color, no LCD screen - eInk only.
It's been over a decade I last bought an ebook reader, and the Kindle Paperwhite we bought back then still functions great (it never connected to the internet), so I'm a bit out of my depth.
I was looking at a Kobo Clara BW, and I seem to recall reading favourable reviews of Kobo devices.
Is this a good one? Or is there any better one in a similar price range?
For various reasons, not interested in second hand devices, nor DIY or hacked customs. Dad needs something that can be bought off the shelf of a random local shop (or ordered online, shipping to Hungary without horrible tarrifs).
If you have a bash command line of "exec program ..." and you can control the "..." can you make it not run the exec and do something different? The answer is yes. Even if "..." is somewhat sanitised for shell metacharacters. If you can inject $[+] it will make bash error on that line and run the next. This is how https://dgl.cx/2025/10/bash-a-newline-ssh-proxycommand-cve-2025-61984 works.
In our final ksmbd research post, @sine provides a detailed walkthrough for exploiting a local privilege escalation vulnerability. If you're interested in learning more about exploitation on modern systems - check it out!
Cybersecurity Awareness Month is dumb. Here are some alternatives.
No Vendor November Do some free shit to improve your posture. You know your users, systems and business better than they do.
Defaults December Security by design and default deny.
Micropatches Released for Windows Storage Spoofing Vulnerability (CVE-2025-49760)
https://blog.0patch.com/2025/10/micropatches-released-for-windows.html
Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing: Trend ZDI researcher Simon Zuckerbraun shows how to go from a crash to a full exploit - & he provides you tools to do the same, including his technique used to get ROP execution. https://www.zerodayinitiative.com/blog/2025/10/6/crafting-a-full-exploit-rce-from-a-crash-in-autodesk-revit-rfa-file-parsing