Posts
2578
Following
627
Followers
1397
"I'm interested in all kinds of astronomy."
repeated

Learn about XSS for XMAS!

We created a new MDN page about Cross-site scripting: https://developer.mozilla.org/en-US/docs/Web/Security/Attacks/XSS

0
2
0
repeated

Here is another challenge. This time I am quite sure that no text or marking needs to be blurred.
Do you know what this thing is? Can you name the exact part number or product name?

As always, explain your guess/deduction and hide it behind a CW to not spoil others.

3
1
0
Maybe it is my bad English/ears but I can't ignore hearing the name of Enno Rey instead of the track title :S

https://www.youtube.com/watch?v=0f_TbyIIPnc

#hardstyle
1
0
1
repeated

game i would like to play: Factorio but you *only* do compliance paperwork

4
1
1
repeated

I am mildly amused that OpenAI telemetry rollout led to a classical Kubernetes control plane DoS.

In my experience DDoSing your own control plane is the #1 way people generate large failures in K8s. What are others?

1
2
0
[RSS] The Full Story of CVE-2024-6386: Remote Code Execution in WPML

https://blog.wpsec.com/the-full-story-of-cve-2024-6386-remote-code-execution-in-wpml/
0
0
0
repeated

Hey y'all,

the https://madweb.work/ Program Committee was just announced (featuring yours truly).
Please remember to submit your papers about web security by January 9th 2025. We are interested in research at the junction of web & browser security. More on the website :)

0
3
0
[RSS] Having Fun with Flare-on Using Time-Travel Debugging (TTD)

https://binary.ninja/2024/12/16/flareon-ttd.html
0
1
2
[RSS] Authentication Bypass Vulnerability in Philips IntelliSpace Cardiovascular

https://outurnate.com/authentication-bypass-vulnerability-in-philips-intellispace-cardiovascular
0
0
1
[RSS] X41 Audited Backstage

https://x41-dsec.de/security/research/job/news/2024/12/16/backstage-review-2024/

CVE-2024-45815 CVE-2024-45816 CVE-2024-46976
0
0
1
repeated
[RSS] Linternals: Exploring The mm Subsystem via mmap [0x01]

https://sam4k.com/linternals-exploring-the-mm-subsystem-part-1/
0
0
0
[RSS] Hacking Kerio Control via CVE-2024-52875: from CRLF Injection to 1-click RCE

https://karmainsecurity.com/hacking-kerio-control-via-cve-2024-52875
0
0
2
repeated
Edited 4 months ago

Feel old yet? The winrar registration nag screen is Electron these days.

EDIT: Whoops, it seems I'm wrong: This is just an embedded webview, which on Win10 is apparently chromium-backed (probably because it's Edge)

7
3
0
repeated

researchers have discovered components of a German cipher machine, crucial to the Nazi wartime communications system, on Sobieszewska island near the city of Gdańsk. All in all, 8 rotors and various other parts were recovered. https://tvpworld.com/84053156/fragments-of-rare-german-enigma-machine-unearthed-in-poland

1
3
0
Teammate generated a song with LLM about a local charlatan, and I have to bow before the genius of the Machine:

"[Person] will be the wall
that guides us through the night!"
0
0
1
#IBMi is vulnerable to an authenticated user gaining elevated privilege to a physical file [CVE-2024-47104]

https://www.ibm.com/support/pages/node/7179158

Emphasis mine:

"A user with authority to a *view* can alter the based-on *physical file* security attributes without having object management rights to the physical file."

I wonder what other discrepancies there may be between Db2 and other interfaces.
0
1
1
repeated

One of the fun parts of doing my security audits is coming across unexpected code that looks exploitable, and trying it out myself to see what possibilities exist.

In a recent audit, I found myself asking... What if you hashed null?

https://securinglaravel.com/security-tip-what-if-you-hashed-null/

0
3
0
repeated

Calling all Mystery AI Hype Theater 3000 fans! Have you found a piece of Fresh AI Hell but not known where to send it? Here's the spot:

https://thecon.ai/submit-fresh-ai-hell/

Help @alexhanna.bsky.social and me clean out the Fresh Hell by submitting it there!

3
5
0
repeated

DevOps practices are all well and good, but beware of the configuration of the tools that access your production.

I've written a blog post sharing some dangerous ways Argo CD can be configured, detailing the security impact: https://ledger.com/argo-cd-security-misconfiguration-adventures

0
5
0
Show older