Reversing public #security advisories has been a lot of fun lately. Here's an exploit I've built for CVE-2025-9501 that potentially affects 1+ million #WordPress installations:
When Updates Backfire: RCE in Windows Update Health Tools https://research.eye.security/rce-windows-update-health-tools/
RCE via a malicious SVG in mPDF https://medium.com/@brun0ne/rce-via-a-malicious-svg-in-mpdf-216e613b250b
Breaking Oracle’s Identity Manager: Pre-Auth RCE (CVE-2025-61757) https://slcyber.io/research-center/breaking-oracles-identity-manager-pre-auth-rce/
In case you had missed it - I had. VirtualBox now supports Windows on Arm.
https://blogs.oracle.com/virtualization/oracle-virtualbox-72
Not a bad alternative to the departed Windows Services for Android.
Long overdue, but here’s my writeup for #FlareOn12 Task 9: https://hshrzd.wordpress.com/2025/11/20/flare-on-12-task-9/
pretty fun stuff in here :)
https://hackaday.com/2025/11/18/congratulations-to-the-2025-component-abuse-challenge-winners/
Sent from San Francisco, California, U.S.A. on December 20, 1995. https://postcardware.net/?id=12-38
RCE in Apache Causeway.
https://lists.apache.org/thread/rjlg4spqhmgy1xgq9wq5h2tfnq4pm70b