Posts
2711
Following
681
Followers
1505
"I'm interested in all kinds of astronomy."
repeated

Project Zero Bot

New Project Zero issue:

Dolby Unified Decoder: Out of bounds write in evolution parsing

https://project-zero.issues.chromium.org/issues/428075495

CVE-2025-54957
0
2
1
repeated

These kinds of issues are more common than people would expect. I remember running tcpdump in 2003 and seeing some obvious kernel data being leaked over the network. Similar to the coredump case, it's there but nobody really looks:
https://bird.makeup/users/grsecurity/statuses/1252558055629299712

1
3
0
repeated

How I Reversed Amazon's Kindle Web Obfuscation Because Their App Sucked https://blog.pixelmelt.dev/kindle-web-drm/

0
2
0
repeated
@waifu 1 point because in this part of the world nobody trusts anyone with paper checks. The conclusion is that I'm essentially a teenager.
0
0
0
repeated
Edited 24 days ago

My OBTS v8 slides for Apple Compressor (part of Final Cut Pro) unauthenticated LAN RCE. No CVE? Because it’s not patched…🫣

https://github.com/ChiChou/slides/blob/b737cc3037408221217d59c8fc6b8a82706b7062/Queen%20B%200-click%20RCE%20for%20Apple%20Compressor.pdf

0
6
0
(fair warning: if you are a JSF author, you better not come to punching distance of me)
0
0
1
"Which of course makes perfect sense when you are in the business of breaking stuff so people have to pay you for fixing it."

This is an old article, but this one sentence explains so many things!

https://dzone.com/articles/why-you-should-avoid-jsf
1
0
1
repeated

Inspirational Skeletor💀

1
19
0
[RSS] exploits.club Weekly Newsletter 89 - iOS GPU Driver Bugs, Kernel Stack UAFs, Hardware Wallet Auth Bypasses, and More

https://blog.exploits.club/exploits-club-weekly-newsletter-89-ios-gpu-driver-bugs-kernel-stack-uafs-hardware-wallet-auth-bypasses-and-more/
0
0
1
repeated

So this October 2025 F5 security notification is pretty wild because of the sheer volume of vulnerabilities disclosed: more than 30 high-severity CVEs (!) and around a dozen medium-severity ones in a single release cycle. This affects almost every F5 product family, BIG-IP (all modules), BIG-IP Next, F5OS, and related components. Something we don’t see very often... and a lot of these vulnerabilities score above 8.0; remote exploitation, denial-of-service or privilege escalation. Also, the number of affected software branches (from 15.x through 17.x) means most F5 deployments are touched in some way. YMMV.
In short, this quarter’s bulletin is probably F5’s heaviest security updates ever. If you run F5 products, patch now. https://my.f5.com/manage/s/article/K000156572

0
3
0
[RSS] I remember taking a screen shot of a video, and when I opened it in Paint, the video was playing in it! What witchcraft is this?

https://devblogs.microsoft.com/oldnewthing/20251014-00/?p=111681
1
1
5
repeated

yIKEs (WatchGuard Fireware OS IKEv2 Out-of-Bounds Write CVE-2025-9242) - watchTowr Labs https://labs.watchtowr.com/yikes-watchguard-fireware-os-ikev2-out-of-bounds-write-cve-2025-9242/

0
3
0
repeated

bert hubert 🇺🇦🇪🇺🇺🇦

With the AI-bubble looking close to bursting, here I present a pre-mortem, in which I state that much of AI is simultaneously mega-impressive and still mostly useless. The collapse of the bubble does not mean the technology will go away, however. Also, there are extremely useful AI applications already that we should not lose sight of once we are post-collapse. Plus some thoughts on 'intelligence' & evolution:
https://berthub.eu/articles/posts/an-ai-premortem/

6
6
0
repeated

Ever wondered how virtual machines talk to their host without relying on traditional networking?
Meet vsock (Virtual Socket) - the Linux kernel’s built-in communication layer for blazing-fast, low-latency host ↔ guest interaction.
Unlike TCP/IP, vsock skips the network stack entirely and works directly over the hypervisor, making it perfect for control channels, telemetry, and secure VM management in QEMU/KVM, VMware, and Hyper-V environments.
Read our full technical breakdown: https://ssd-disclosure.com/an-introduction-to-chrome-exploitation-webassembly-edition-2/

0
2
0
Windows ARM64 Internals: Deconstructing Pointer Authentication | Prelude
https://www.preludesecurity.com/blog/windows-arm64-internals-deconstructing-pointer-authentication
0
0
1
Depicting an iOS Vulnerability – DFSEC Research
https://blog.dfsec.com/ios/2025/10/14/Depicting-an-iOS-Vulnerability/
0
1
3
repeated

In the year of Our Lord Two Thousand and Twenty-Five, BIG-IP devices from F5 Inc. are vulnerable to TCP hijacking due to use of a bad TCP Initial Sequence Number generator.

https://my.f5.com/manage/s/article/K000151297

2
4
0
Show older