Posts
3139
Following
708
Followers
1555
"I'm interested in all kinds of astronomy."
[RSS] TrustZone Break-in Vulnerabilities in Ampere UEFI MM Drivers (Buffer Overflow and Stack Information Leak)

https://github.com/google/security-research/security/advisories/GHSA-46qj-g894-vrxr
0
1
2
[RSS] Breaking Down the Attack Surface of the Kenwood DNR1007XR - Part One

https://www.thezdi.com/blog/2026/1/6/breaking-down-the-attack-surface-of-the-kenwood-dnr1007xr-part-one
0
0
1
@cR0w @maaneeack @troed Don't take my word for it, I really didn't have time to dig in, but that's kind of the problem with slop isn't it?
1
0
2
@troed @maaneeack @cR0w The person who posted this also posted a bunch of other stuff in different projects. This is their "repro" for MongoDB:

```
./mdb_load -T /tmp/lmdb_asan < [crash_input_file]
```

...but I don't see `crash_input_file` anywhere. I smell slop.

(Source: https://seclists.org/fulldisclosure/2026/Jan/5 )
1
0
2
repeated

: Critical Path Traversal Vulnerability (CVE-2025-68428) in jsPDF - a widely-adopted package for generating PDF documents in JavaScript applications allows attackers to read & exfiltrate arbitrary files from the local filesystem:
👇
https://www.endorlabs.com/learn/cve-2025-68428-critical-path-traversal-in-jspdf

0
2
0
repeated
Edited 5 days ago
21
48
2
repeated

Tenable Research Advisories have a new entry:

Critical: CVE-2025-69258; CVE-2025-69259 and CVE-2025-69260: Trend Micro Apex Central Multiple Vulnerabilities https://www.tenable.com/security/research/tra-2026-01 @tenable

0
3
0
@joxean It doesn't have to be up-to-date, I'm going for samples, thanks!
0
0
1
Edited 5 days ago
Any recommendations for exploit dev focused #CTF with an archive of challenges?

I'm looking for samples and interested in code comprehension, less interested in obfuscation/VMs.

Edit: Native executables pls, not interested in polyglots, bytecode, etc. either.
4
4
4
repeated

I just registered for https://uasc.cc/ -- uASC (the Microarchitecture Security Conference) is on February 3rd, in Leuven, Belgium.

**Registration is free but mandatory!**

I would be happy to see all of you there :)

Especially from the Cologne and Ruhr area, it's just a train ride to Leuven -> join us!

0
3
0
repeated

"LLMs learn the same way a person does, it's not plagiarism"

This is a popular self-justification in the art-plagiarist community. It's frustrating to read because it's philosophically incoherent but making the philosophical argument is annoyingly difficult, particularly if your interlocutor maintains a deliberate ignorance about the humanities (which you already know they do). But there is a simpler mechanical argument you can make instead: "learning" is inherently mutual.

1
3
0
repeated

this is part of my aesthetic objection to LLMs -- they're just so profoundly inelegant. they represent a staggering amount of brute force in terms of time, information and material resources to solve problems that people *and computers* can address much more efficiently. they're a kind of anti-computing

2
3
0
#hungary #recycling
Show content
TIL Mohu finally implemented an app that shows you which of their crappy machines[1] work atm:

https://repont.hu/hu/repontapp

[1] These abominations won't work without MoHu issued *trash bins* that MoHu never delivers on time apparently
0
0
2
repeated

We expect to continue support for for the foreseeable future, and welcome contributions. Especially now that the patents have expired on many 64-bit MIPS designs! :)

0
5
0
@chaos0815 Yeah, it's moments like this when I become nostalgic for strict typing, but part of Pythons power is exactly this kind of flexibility. I could argue for a more strict API/type checking in this particular lib, but I guess this is also something that makes them (very) popular, so I think I just have to be more careful in the future (like building less funky loops)...
0
0
0
OK, I feel like an absolute noob:

I just spent hours debugging that I left a comma at the end of a #Python assignment, so the value became a tuple instead of the object I wanted 🤦

The library I passed the value to also has very liberal typing so it failed quietly, and the IDE didn't tip me off because I overwrote the value inside a loop...

Extra commas are the new lack of semicolons!

#fail #programming
3
2
3
repeated
Edited 5 days ago

8.18.0 has been released. This release fixes 2 medium and 4 low level vulnerabilities:
- CVE-2025-13034: No QUIC certificate pinning with GnuTLS https://curl.se/docs/CVE-2025-13034.html
- CVE-2025-14017: broken TLS options for threaded LDAPS https://curl.se/docs/CVE-2025-14017.html
- CVE-2025-14524: bearer token leak on cross-protocol redirect https://curl.se/docs/CVE-2025-14524.html
- CVE-2025-14819: OpenSSL partial chain store policy bypass https://curl.se/docs/CVE-2025-14819.html
- CVE-2025-15079: libssh global knownhost override https://curl.se/docs/CVE-2025-15079.html
- CVE-2025-15224: libssh key passphrase bypass without agent set https://curl.se/docs/CVE-2025-15224.html

I discovered the last 2 vulnerabilities.

Download curl 8.18.0 from https://curl.se/download.html

0
4
0
Show older