Posts
2797
Following
681
Followers
1505
"I'm interested in all kinds of astronomy."
... what makes this esp. frustrating is that the code is _right there_ in the current virtualenv, but oh no, let's make those servers in us-east-1 work, we gotta pump those CO2 numbers up!

#python #uv
0
0
1
@algernon lol, IMO this verges on the edge of obfuscation but fulfills my criteria :D
0
0
0
The lesson for today is that you must always give your code weird ass names because tools tend to go online and fetch something completely unrelated if they can find the name :P
2
0
2
repeated

Project Zero Bot

New Project Zero issue:

Windows: Administrator Protection RAiLaunchAdminProcess Application Name EoP

https://project-zero.issues.chromium.org/issues/437291456

CVE-2025-60718
0
3
0
repeated

Reversing public advisories has been a lot of fun lately. Here's an exploit I've built for CVE-2025-9501 that potentially affects 1+ million installations:

https://www.rcesecurity.com/2025/11/exploiting-a-pre-auth-rce-in-w3-total-cache-for-wordpress-cve-2025-9501/

0
4
0
@david_chisnall @j Wait people refuse to use services if they don't have *stickers*??
1
0
1
repeated

When Updates Backfire: RCE in Windows Update Health Tools https://research.eye.security/rce-windows-update-health-tools/

0
2
0
[RSS] Remotely crashing the Spooler service

https://incendium.rocks/posts/Remotely-crashing-spooler/
1
2
4
repeated
repeated

Breaking Oracle’s Identity Manager: Pre-Auth RCE (CVE-2025-61757) https://slcyber.io/research-center/breaking-oracles-identity-manager-pre-auth-rce/

0
4
0
repeated

In case you had missed it - I had. VirtualBox now supports Windows on Arm.

https://blogs.oracle.com/virtualization/oracle-virtualbox-72

Not a bad alternative to the departed Windows Services for Android.

0
3
0
repeated
repeated
New assessment for topic: CVE-2025-58034

Topic description: "An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.5, FortiWeb 7.4.0 through 7.4.10, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an authenticated attacker to execute unauthorized code on the underlying system via crafted HTTP requests or CLI commands. ..."

"Based on writing the [Rapid7 Analysis](https://attackerkb.com/topics/zClpINmLCh/cve-2025-58034/rapid7-analysis), I have rated the exploitability as `Very High`, as exploitation is trivial and reliable ..."

Link: https://attackerkb.com/assessments/c67a510c-5ac5-43a7-affd-7b7655c4b62f
0
1
1
@rebane2001 that booster thing is plain witchcraft.
0
0
0
repeated
repeated
repeated

Postmortem of the Xubuntu.org download site compromise

https://lwn.net/Articles/1047056/

0
4
0
repeated

Sent from San Francisco, California, U.S.A. on December 20, 1995. https://postcardware.net/?id=12-38

0
1
0
repeated
Show older