Posts
2582
Following
627
Followers
1397
"I'm interested in all kinds of astronomy."
repeated
repeated

Seems like a mitigation for a Tomcat TOCTOU vuln was incomplete.

(H/t) @AAKL

https://seclists.org/oss-sec/2024/q4/164

0
2
0
repeated

Does Tidal compensate artists fairly? I'm ready to ditch Spotify, but I'd like to do it the right way.

3
3
0
repeated

Sophos security advisory 19 December 2024: Resolved Multiple Vulnerabilities in Sophos Firewall (CVE-2024-12727, CVE-2024-12728, CVE-2024-12729)

  • CVE-2024-12727 (9.8 critical) pre-auth SQL injection vulnerability in the email protection feature of Sophos Firewall
  • CVE-2024-12728 (9.8 critical) weak credentials vulnerability potentially allows privileged system access via SSH to Sophos Firewall
  • CVE-2024-12729 (8.8 high) post-auth code injection vulnerability in the User Portal allows authenticated users to execute code remotely in Sophos Firewall

Sophos has not observed these vulnerabilities to be exploited at this time.

0
3
0
Security Bulletin: #IBMi is vulnerable to bypassing Navigator for i interface restrictions and a server-side request forgery [CVE-2024-51463, CVE-2024-51464]

https://www.ibm.com/support/pages/node/7179509
0
1
1
repeated

Somebody tell Elon: "Never go full retard."

3
2
0
repeated
repeated

Heads up: Folks on

You might get an email belittling your project, seemingly from Michael Bell (mikedesu) via noreply@codeberg.org (an issue is created on your repo and then deleted, leading to the notification).

This appears to be part of a smear campaign someone is running that started on GitHub. e.g., see:

https://www.techradar.com/pro/security/github-projects-are-being-targeted-with-malicious-action-in-apparent-attempt-to-frame-researcher

CC: @Codeberg – hope you can identify the account(s) responsible and block them. Example (deleted) issue: https://codeberg.org/kitten/app/issues/216

7
6
0
repeated

Girl after

I owe this YouTuber a lot. She educated people on physics. Took them to places.
More than 2 years ago she got really sick with Covid that soon became Long-Covid. Earlier messages from her [partner] she was barely alive, non responsive.
If you want to check out her channel:
-> Physics Girl <-
-> youtube.com/@physicsgirl <- And please do.

Now she gives a very happy sign of emprovement I'm happy to share:

"Hello from Dianna! - Two years in bed"
by physicsgirl

https://www.youtube.com/shorts/euCkKszuWDQ

Quote by PG:
"Nov 21, 2024
Here is a small update from Dianna herself! She hasn't been able to communicate directly here on Youtube for almost 2 years now. A quick hello and thank you!"

0
2
0
repeated
repeated

It's official.

The US is totally nuts: 🇺🇸 🥜

"BITCOIN Act of 2024"
https://www.congress.gov/bill/118th-congress/senate-bill/4912/all-info

9
4
0
repeated
Edited 4 months ago
1
7
0
repeated

Wonderfully elegant term for exploit development from 1980: "Synthetic Programming"

https://literature.hpcalc.org/items/1718

0
6
0
repeated

Wow, a fairly serious auth bypass in Next.js, a super popular frontend framework:

If a Next.js application is performing authorization in middleware based on pathname, it was possible for this authorization to be bypassed.

https://securityonline.info/cve-2024-51479-next-js-authorization-bypass-vulnerability-affects-millions-of-developers/

0
3
0
repeated
repeated

Don't fix what isn't broken: https://www.tomshardware.com/desktops/indiana-bakery-still-using-commodore-64s-originally-released-in-1982-as-point-of-sale-terminals

In my professional opinion this is the best malware protected setup I have seen for years.

6
9
0
Dependency injection is the art of converting rude compile errors telling you detailed information about the mistakes you made into runtime exceptions from the depths of Khazad-dûm.
1
18
40
Show older