Posts
2588
Following
627
Followers
1397
"I'm interested in all kinds of astronomy."
repeated

MS Streaming Service Privilege Escalation PoC https://github.com/Dor00tkit/CVE-2024-30090

0
2
0
repeated

PoC for the Untrusted Pointer Dereference in the ks.sys driver https://github.com/varwara/CVE-2024-35250

0
2
0
repeated
repeated

Confirmed! In the penultimate attempt of Day 2, @daankeuper, @xnyhps, and @notkmhn from @sector7_nl combined 4 bugs, including a command injection and a path traversal to going from the QNAP QHora-322 to the TrueNAS Mini X. They earn $25,000 and 10 Master of Pwn points.

0
2
0
[RSS] Pluralistic: You should be using an RSS reader (16 Oct 2024)

https://pluralistic.net/2024/10/16/keep-it-really-simple-stupid/
0
0
0
repeated

Unfortunately, the Viettel Cyber Security (@vcslab) could not get their exploit of the Ubiquiti AI Bullet working within the time allotted.

0
1
0
repeated

CISA: CISA Adds Two Known Exploited Vulnerabilities to Catalog
Hot off the press!

  • CVE-2024-37383 (6.1 medium( RoundCube Webmail Cross-Site Scripting (XSS) Vulnerability
  • CVE-2024-20481 (5.8 medium) Cisco ASA and FTD Denial-of-Service Vulnerability

0
2
0
repeated

An idea I recently heard on a parenting podcast really resonated with me. Tech has created a generation of people used to instant gratification.

Hungry? Open an app. Want to listen to music? Open an app. Bored? Open an app.

However a lot of needs in life can’t be gratified instantly and we now have many people, both adults and kids, who simply don’t know how to handle that. We now have entire subcultures whose main dysfunction is they can’t just get what they want without work and they’re mad.

4
3
0
[RSS] LibRaw: Uninitialized memory disclosure via LibRaw_buffer_datastream::read

https://github.com/google/security-research/security/advisories/GHSA-cmhf-chvw-6c7j

<3 these :)
0
0
1
[RSS] DTLS ClientHello Race Conditions In WebRTC Implementations

https://packetstormsecurity.com/files/182303/webrtc-hello-race-conditions-paper.pdf
0
0
0
repeated

After I refused a bribe to remove a @web3isgreat post about alleged crypto pyramid scheme co-founder Roman Ziemian, I’ve now received a fraudulent copyright claim aimed at forcing me to take it down

19
20
0
OH: "We had a problem. We thought we'd solve it with the cloud. Now we have a horizontally scalable set of problems."
0
10
22
Edited 5 months ago
Anyone remembers that research about using compromised AV/EDR management consoles as C2 servers?

I remember someone was working on it but I don't remember seeing it released.
1
1
1
repeated

The Irish Data Protection Commission fines LinkedIn €310M over using personal data for behavioral analysis and targeted ads under GDPR, after a 2018 complaint (Ian Curran/The Irish Times)

https://www.irishtimes.com/business/2024/10/24/microsoft-owned-linkedin-fined-310m-by-irish-data-protection-commission/
http://www.techmeme.com/241024/p13#a241024p13

0
4
0
repeated

Our first collision of Day Three: the group from STEALIEN Inc. successfully popped the Lorex camera, but the bug they used had already been demonstrated in the contest. They still earn $3,750 and 1.5 Master of Pwn points.

0
2
0
repeated

Unfortunately, Sina Kheirkhah (@SinSinology) and Enrique Castillo (@hyprdude) of Summoning Team (@SummoningTeam) could not get their exploit of the Ubiquiti AI Bullet working within the time allotted.

0
1
0
Exception Junction - Where All Exceptions Meet Their Handler

https://bruteratel.com/research/2024/10/20/Exception-Junction/

"to understand why the ‘ntdll!NtProtectVirtualMemory’ is being called, I decided to reverse the entirety of the ntdll!RtlAddVectoredExceptionHandler’ API call"

#Windows #ReverseEngineering
0
0
1
repeated

We're ready for Day Three of Ireland! We’ve already awarded $874,875, & we have 15 attempts left to go. Will we hit the $1,000,000 mark or will all remaining attempts end up in bug collisions? Follow along with the results here and on our blog: https://www.zerodayinitiative.com/blog/2024/10/24/pwn2own-ireland-2024-day-three-results

0
1
0
[RSS] Windows User Space Emulator

https://github.com/momo5502/emulator
0
0
1
Show older