Posts
2581
Following
629
Followers
1406
"I'm interested in all kinds of astronomy."
repeated

A proof-of-concept (PoC) exploit for a critical Veeam Recovery Orchestrator authentication bypass vulnerability tracked as CVE-2024-29855 has been released, elevating the risk of being exploited in attacks.

https://www.bleepingcomputer.com/news/security/exploit-for-veeam-recovery-orchestrator-auth-bypass-available-patch-now/

0
2
0
repeated

Release of the old stable (bug-fixed only) version of testssl.sh was overdue but now happened ;-)

You can get it at https://testssl.sh/ or at https://github.com/drwetter/testssl.sh/releases .

You should better use 3.2rc3 though. It is at least as stable and has wayyy more features.

0
1
0
repeated

Inspirational Skeletor💀

Edited 10 months ago
0
1
0
repeated

Scottish physicist James Clerk Maxwell was born in 1831.

His most significant contribution is his formulation of the classical theory of electromagnetic radiation. In 1861-1862, he published a series of papers culminating in "A Dynamical Theory of the Electromagnetic Field," in which he presented Maxwell's equations. He made substantial contributions to the kinetic theory of gases as well as to the Maxwell-Boltzmann distribution

https://www.gutenberg.org/ebooks/author/1586

3
1
0
repeated

2021 retro-link! https://berthub.eu/articles/posts/reed-solomon-for-programmers/ - Practical Reed-Solomon for programmers.

0
3
0
[RSS] Let’s Go into the rabbit hole (part 2) — the challenges of dynamically hooking Golang programs

http://blog.quarkslab.com/lets-go-into-the-rabbit-hole-part-2-the-challenges-of-dynamically-hooking-golang-program.html
0
1
3
[RSS] Relative Offsets in Binary Ninja 4.1

https://binary.ninja/2024/06/12/relative-offsets.html
1
1
3
repeated

Happy Patch Tuesday (er, Wednesday) from Palo Alto Networks:

  • CVE-2024-5905 (CVSSv4: 2.0 low) Cortex XDR Agent: Local Windows User Can Disrupt Functionality of the Agent
  • CVE-2024-5906 (CVSSv4: 4.8 medium) Prisma Cloud Compute: Stored Cross-Site Scripting (XSS) Vulnerability in the Web Interface
  • CVE-2024-5907 (CVSSv4: 5.2 medium) Cortex XDR Agent: Local Privilege Escalation (PE) Vulnerability
  • CVE-2024-5908 (CVSSv4: 5.5 medium) GlobalProtect App: Encrypted Credential Exposure via Log Files
  • CVE-2024-5909 (CVSSv4: 6.8 medium) Cortex XDR Agent: Local Windows User Can Disable the Agent

Palo Alto Networks is not aware of any malicious exploitation of this issue.

0
1
0
repeated

YouTube is currently experimenting with server-side ad injection. This means that the ad is being added directly into the video stream.

This breaks sponsorblock since now all timestamps are offset by the ad times.

For now, I set up the server to detect when someone is submitting from a browser with this happening and rejecting the submission to prevent the database from getting filled with incorrect submissions.

6
20
1
#music #AI #deathmetal
Show content
0
0
0
repeated
repeated

🆕 PrivescCheck update!

I realize that I haven't communicated about PrivescCheck in a while, although I implemented a bunch of new cool features recently. A few of them below:

➡️ Check for listing Attack Surface Reduction (ASR) rules enabled in Defender Exploit Guard.
➡️ SCCM cache folder paths are now enumerated using the registry, and browsed to identify potentially hardcoded credentials.
➡️ New "-Audit" option to enable configuration audit checks.
➡️ New "-Risky" option to manually enable checks that are likely to trigger EDR.

There are also other privilege escalation attack vectors I want to cover in the near future. Stay tuned! :)

👉 https://github.com/itm4n/PrivescCheck

0
3
1
repeated

microsoft: Exploit Code Unporoven

me: i literally gave you a compiled PoC and also exploit code

m$: No exploit code is available, or an exploit is theoretical.

me:

10
23
1
repeated
repeated
Edited 10 months ago

JetBrains security advisory: Updates for security issue affecting IntelliJ-based IDEs 2023.1+ and JetBrains GitHub Plugin
A new security issue was discovered that affects the JetBrains GitHub plugin on the IntelliJ Platform, which could lead to disclosure of access tokens to third-party sites. CVE-2024-37051 (CVSSv3: 9.3 CRITICAL) GitHub access token could be exposed to third-party sites in JetBrains IDEs. No mention of exploitation.

h/t: @serghei See related Bleeping Computer reporting: JetBrains warns of IntelliJ IDE bug exposing GitHub access tokens

0
1
0
repeated

Happy Patch Tuesday from Adobe:

  • APSB24-27 : Security update available for Adobe Photoshop (1)
  • APSB24-28 : Security update available for Adobe Experience Manager (144 CVEs!! Someone's EXPERIENCING a lot of vulnerabilities if you know what I mean)
  • APSB24-32 : Security update available for Adobe Audition (2)
  • APSB24-34 : Security update available for Adobe Media Encoder (1)
  • APSB24-38 : Security update available for Adobe FrameMaker Publishing Server (2, and CVE-2024-30299 is a perfect 10.0 🥳)
  • APSB24-40 : Security update available for Adobe Commerce (10)
  • APSB24-41 : Security update available for Adobe ColdFusion (2)
  • APSB24-43 : Security update available for Adobe Substance 3D Stager (1)
  • APSB24-44 : Security update available for Adobe Creative Cloud Desktop (1)
  • APSB24-50 : Security update available for Adobe Acrobat Android (2)

No mention of exploitation.

1
1
0
repeated

You’d really think that the top seven blocked domains on @KagiHQ being @Pinterest indicate that a functional Google would have deboosted them years ago.

(I’m loving Kagi)

0
1
2
repeated

School's out, and so are the latest patches from . We're still waiting on the updates from . Check out the analysis from @TheDustinChilds as he breaks down the small release from Redmond. https://www.zerodayinitiative.com/blog/2024/6/11/the-june-2024-security-update-review

1
1
0
repeated

patches are out. Another small release. Still waiting on :-[ Let them patches out! I'll have my full analysis out soon.

0
1
0
Show older