Posts
2706
Following
681
Followers
1504
"I'm interested in all kinds of astronomy."
repeated

An out-of-band (OOB) security update that patches an actively exploited Windows Server Update Service (WSUS) vulnerability has broken hotpatching on some Windows Server 2025 devices.

https://www.bleepingcomputer.com/news/microsoft/microsoft-patch-for-wsus-flaw-disabled-windows-server-hotpatching/

0
2
0
repeated

This week on I talk to @ottok about his blog post about detecting an attack like xz in Debian

It's a fascinating conversation about a very complicated topic

There are things that could be detected, but this one would have been very very difficult

https://opensourcesecurity.io/2025/2025-11-xz-debian-otto/

1
3
0
repeated

Waking up to the morning news these days like

1
2
0
[RSS] deepSURF: Detecting Memory Safety Vulnerabilities in Rust Through Fuzzing LLM-Augmented Harnesses

https://github.com/purseclab/deepSURF
0
0
1
[RSS] Drawn to Danger: Windows Graphics Vulnerabilities Lead to Remote Code Execution and Memory Exposure

https://research.checkpoint.com/2025/drawn-to-danger-windows-graphics-vulnerabilities-lead-to-remote-code-execution-and-memory-exposure/
0
0
0
repeated

Firefox nightly introduces the setHTML() method. Which is like a native DOMPurify. You can easily test it here:
https://portswigger-labs.net/mxss/

Set HTMLSanitizer ✅
Auto update ✅

I'm trying to break it, I encourage you to break it too

2
3
0
repeated

This year Binarly has also expanded their sponsorship to the creation of a new Firmware Security Learning Path! https://ost2.fyi/OST2_LP_FWSEC.pdf

This captures current and future plans for classes involving security in the deep-dark of firmware! But Binarly is starting to give visibility into what's going on there with their binary analysis platform.

0
3
0
repeated

It is decided, the final round of tickets will be in 7 days from now on Sunday 09.11.2025 at 7 pm. That is 19:00 o'clock Vienna time UTC+1!

0
4
0
repeated
repeated
Edited 6 days ago

A great quote from the book Autocracy Inc from Ann Applebaum, a recommended read. A good description of the atmosphere the Trump administration tries to create.

1
3
0
repeated

im trying to vibe code an ida plugin rn and its not going great folks

2
1
0
repeated

you need to work on your prompt engineering skills. “you are ilfak guilfanov. a retired millionaire that knows all of IDA’s API quirks, regressions and changes by heart. we’re about to do the impossible and write code for an IDA plugin that still works after a new minor release of IDA”

2
3
1
repeated

infosec has a lot to learn about understanding failure conditions and accurate, understandable error messages from roadies

6
38
1
repeated

Well done to this Redditor for explaining Remote Desktop.

1
4
0
repeated

Happy birthday to Vim! 🥳

8
8
0
repeated

A little interactive post on a little error in fuzzer evaluations: https://addisoncrump.info/research/metric-shenanigans/

0
4
0
repeated

Several months ago, I found a from - Authentication bypass for some passwords due to PHP type juggling (CVE-2025-47776).

Any account that has a password that results in a hash that matches ^0+[Ee][0-9]+$ can be logged in with a password that matches that regex as well. For example, password comito5 can be used to log in to the affected accounts and thus gain unauthorised access.

The root cause of this bug is the incorrect use of == to match the password hash:

if( auth_process_plain_password( $p_test_password, $t_password, $t_login_method ) == $t_password )

The fix is to use === for the comparison.

This vulnerability has existed in MantisBT ever since hashed password support was added (read: decades). MantisBT 2.27.2 and later include a fix to this vulnerability. https://mantisbt.org/download.php

3
7
0
repeated

Anybody having problems with version 144.0.2 with random domains failing due to cookies? An example error with eBay:

Cookie “ds2” has been rejected for invalid domain.
Cookie “ebay” has been rejected for invalid domain.

1
1
0
[RSS] Dubious security vulnerability: Denial of service by loading a very large file

https://devblogs.microsoft.com/oldnewthing/20251027-00/?p=111731
0
0
0
[RSS] exploits.club Weekly Newsletter 91 - Patch-gapping Browsers, Ubuntu LPEs, Bluetooth Int Underflows, And More

https://blog.exploits.club/exploits-club-weekly-newsletter-91-patch-gapping-browsers-ubuntu-lpes-bluetooth-int-underflows-and-more/

My clearest (and slightly frightening) measure of the passage of time is the weekly exploits.club newsletter.
0
2
3
Show older