Posts
2520
Following
647
Followers
1461
"I'm interested in all kinds of astronomy."
CVE-2024-5274 (Chrome V8 0day) official ticket with analysis and PoC

https://issues.chromium.org/issues/341663589
1
2
5
Autonomously Uncovering and Fixing a Hidden Vulnerability in SQLite3 with an LLM-Based System

https://team-atlanta.github.io/blog/post-asc-sqlite/
0
0
2
repeated

Fortra security advisories:

No mention of exploitation. But shame on FileCatalyst for having hardcoded credentials. See related Bleeping Computer reporting: Fortra fixes critical FileCatalyst Workflow hardcoded password issue

0
2
0
Galaxy brain of @haifeili :
"Instead the vendor (you believe it's recklessly) asking you to provide more info, you ask them to provide their testing env & steps first. You want me to make a screen recording? Show your recording first."
2
1
3
repeated
repeated

📰 BinaryFormatter removed from .NET 9

Starting with .NET 9, we no longer include an implementation of BinaryFormatter in the runtime. This post covers what options you have to move forward.

https://devblogs.microsoft.com/dotnet/binaryformatter-removed-from-dotnet-9/

0
2
0
[RSS] CVE-2024-37079: VMware vCenter Server Integer Underflow Code Execution Vulnerability

https://www.thezdi.com/blog/2024/8/27/cve-2024-37079-vmware-vcenter-server-integer-underflow-code-execution-vulnerability
0
1
2
[RSS] Reverse engineering a Windows HDD firmware updater

https://syscall.eu/blog/2024/07/01/toshiba_hdd_firmware/
0
0
2
repeated

Micropatches were released for Windows DWM Core Library Elevation of Privilege Vulnerability (CVE-2024-30051)

1
2
0
repeated

Micropatches were released for "FakePotato" Local Privilege Escalation (CVE-2024-38100)

1
2
0
repeated

A-Dub 🏳️‍⚧️🏳️‍🌈

my university has converted our office telephones to Microsoft Teams. when i grumbled about this to a favourite sysadmin, this is how they responded 🔥

“Microsoft has actually brilliantly leveraged the lousy security landscape -- for which they are in no small part responsible -- to capture even larger market-share, as we now need commercial entities to produce the software required to protect us from their failures, and therefore need a more uniform environment to achieve the necessary scale. The uniformity then guarantees an ever greater scale for the inevitable conflagration. Monocultures guarantee one big fire instead of a bunch of small survivable ones. We really have no interest in learning from evolution, in no small part because it would produce fewer billionaires.

— Local Cranky IT Guy” [shared with permission]

3
27
1
repeated
Edited 11 months ago

According to https://httparchive.org/reports/page-weight, the median weight in KB for web page tech on desktop:

Over the last 14.5 years:

HTML
2010: 20KB;
mid 2024: 33KB;
Increase of 65%.

Images
2010: 229KB;
mid 2024: 1,062KB;
Increase of 464%.

JavaScript
2010: 89KB;
mid 2024: 640KB;
Increase of 719%.

- - -

Over the last 9 years:

Video
mid 2015: 173KB;
mid 2024: 3,872KB;
Increase of 2,238%.

I reckon that in the era of AI the JS gradient is gonna steepen significantly

2
5
0
repeated

Holy shit, the Rijksmuseum used a 100MP Hasselblad camera to take almost eight and a half THOUSAND photos of the whole of Rembrandt's The Night Watch, for a total image size of 717 GIGAPIXELS. 😳

It's on their website as a zoomable image and you can zoom in so far you can see the individual cracks in the paint: https://www.rijksmuseum.nl/en/stories/operation-night-watch/story/ultra-high-resolution-photo

0
20
1
repeated

Project Zero Bot

New Project Zero issue:

Qualcomm KGSL: reclaimed / in-reclaim objects can still be mapped into VBOs

https://bugs.chromium.org/p/project-zero/issues/detail?id=2548

CVE-2024-23384
0
1
1
repeated
Edited 10 months ago

CISA: CISA Adds One Known Exploited Vulnerability to Catalog
Hot off the press! CISA adds CVE-2024-38856 (CISA-ADP: 8.1 high) Apache OFBiz Incorrect Authorization Vulnerability to the Known Exploited Vulnerabilities (KEV) Catalog based on evidence of active exploitation.

cc: @ntkramer @hrbrmstr

0
1
0
repeated

We provisioned cloud infrastructure the Max Power way, showing that AI tools often generate code that works but has terrible security properties.
https://buff.ly/3X54ZSN

0
4
0
"Restarting the system to load the new processor microcode will not be handled automatically, so you should
consider rebooting."

Was this message written by an LLM?
0
0
1
repeated
repeated

UPDATE: Chrome ZeroDay Vulnerabilities (CERT-EU Security Advisory 2024-088)

A critical zero-day vulnerability, CVE-2024-7971, has been identified and patched in Google Chrome. This marks the ninth such vulnerability discovered in 2024. The flaw, which has been actively exploited in the wild, is rooted in a type confusion issue within Chrome's V8 JavaScript engine. This vulnerability allows attackers to potentially execute arbitrary code on affected systems.
[New] On August 26, Google announced that it patched the tenth zero-day vulnerability in Chrome. This vulnerability is also reported as being exploited.

https://www.cert.europa.eu/publications/security-advisories/2024-088/

0
1
0
repeated

Back to School - Exploiting a Remote Code Execution Vulnerability in Moodle https://blog.redteam-pentesting.de/2024/moodle-rce/

0
1
0
Show older