Posts
2430
Following
590
Followers
1309
A drunken debugger

Heretek of Silent Signal
repeated

Need to trigger BinExport headlessly to batch process patched binaries (using commercial and above)? First, build for a recent dev or stable: https://gist.github.com/psifertex/31d9bc3167eca91e466ebaae4382521c

Next, install the API for headless: https://docs.binary.ninja/dev/batch.html?h=install_api#install-the-api

Finally, automate your exporting using a script taking advantage of the PluginCommand and PluginCommandContext APIs, like the attached image.

0
2
0
repeated

Happy from Ivanti: January Security Update
Bottom line up front: "We have no evidence of any of these vulnerabilities being exploited in the wild."
Links:

These are unrelated to the zero-day exploitation of CVE-2025-0282 inside of Ivanti Connect Security, Policy Secure and ZTA Gateways advisory from 08 January 2025.

1
2
0
repeated

azonenberg@havequick:/tmp$ cat lulz.txt
2024-09-11 17:45 PDT
Successful extraction of RP2350 antifuse bits by FIB PVC

(Random text here to make hash bruteforcing harder)
fjoinzofkjpogkzpofzkpofkspofzpofkz
azonenberg@havequick:/tmp$ sha256sum lulz.txt
a76433af090ceb77b65b153285478bd615bdd51e26a3dd1d6a386b8e1f2ac362 lulz.txt

https://ioc.exchange/@azonenberg/113121829899435528

2
1
0
repeated

Talos Vulnerability Reports

New vulnerability report from Talos:

Wavlink AC3000 wctrls static login vulnerability

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2034

CVE-2024-39754
0
1
0
repeated

Talos Vulnerability Reports

New vulnerability report from Talos:

Wavlink AC3000 login.cgi Unauthenticated Firmware Upload vulnerability

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2036

CVE-2024-39608
0
1
0
repeated
repeated

Ooh, is 2025 really going to be the year of hardcoded creds? Fortinet off to a good start with a sev:CRIT in FortiSwitch.

https://www.fortiguard.com/psirt/FG-IR-23-260

A use of hard-coded cryptographic key vulnerability [CWE-321] in FortiSwitch may allow a remote unauthenticated attacker in posession of the key to execute unauthorized code via crafted cryptographic requests.

https://nvd.nist.gov/vuln/detail/CVE-2023-37936

Note that the advisory and CVE are dated for today but it's a 2023 CVE. ๐Ÿ™ƒ

1
2
0
repeated

Happy from your friends at Fortinet: Authentication bypass in Node.js websocket module
CVE-2024-55591 (CVSSv3.1: 9.8 critical) An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS and FortiProxy may allow a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.

Please note that reports show this is being exploited in the wild.

Indicators of compromise include possible log entries, IP addresses used, and admin accounts created. cc: @GossiTheDog @wdormann @cR0w @briankrebs

#

5
8
0
repeated
repeated

DOOM has now been ported to... a PDF!
(Works in browsers)
https://github.com/ading2210/doompdf

2
18
0
repeated

Micropatches Released for Windows "LDAPNightmare" Denial of Service Vulnerability (CVE-2024-49113)
https://blog.0patch.com/2025/01/micropatches-released-for-windows.html

1
4
0
repeated

Turns out snprintf() in old Windows C runtimes is documented to have the buffer overflow that no other implementations do. ๐Ÿค”

https://learn.microsoft.com/en-us/cpp/c-runtime-library/reference/snprintf-snprintf-snprintf-l-snwprintf-snwprintf-l?view=msvc-170#remarks

6
5
0
repeated

Threat actors exploit a probable 0-day in exposed management consoles of Fortinet FortiGate firewalls https://www.orangecyberdefense.com/global/blog/cert-news/0-day-in-exposed-management-consoles-of-fortinet-fortigate-firewalls

0
2
0
repeated

Kat Marchรกn ๐Ÿˆ

TIL \ exists in ASCII literally so that ALGOL could write its Boolean operators in ASCII

https://en.m.wikipedia.org/wiki/ALGOL

5
18
0
repeated

Talos Vulnerability Reports

New vulnerability report from Talos:

OFFIS DCMTK nowindow improper array index validation vulnerability

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2122

CVE-2024-47796
0
1
0
repeated

Talos Vulnerability Reports

New vulnerability report from Talos:

OFFIS DCMTK determineMinMax improper array index validation vulnerability

https://talosintelligence.com/vulnerability_reports/TALOS-2024-2121

CVE-2024-52333
0
1
0
repeated

Exploitation Walkthrough and Techniques - Ivanti Connect Secure RCE (CVE-2025-0282) - watchTowr Labs https://labs.watchtowr.com/exploitation-walkthrough-and-techniques-ivanti-connect-secure-rce-cve-2025-0282/

0
2
0
[RSS] An SSRF to LFI Payload for PDF Generators (CVE-2024-34112 and beyond)

https://www.hoyahaxa.com/2025/01/an-ssrf-to-lfi-payload-for-pdf.html
0
0
1
repeated

Does anybody know how to prevent from issuing calls to libc functions like `memset` in this case when compiling C programs? I have tried I don't know how many command line arguments to try to disable it but none worked at all.

Here you have an example program in : https://godbolt.org/z/jheYoPWzj

These are the command line arguments I've tried to disable it:

-ffreestanding -disable-simplify-libcalls -fno-builtin -nostdinc -nostdlib -fno-builtin-memset -nostdlib++ -nostdinc++

Any idea?

2
1
0
repeated

might have to give up the apple watch so I can wear this replicate of the apollo guidance computer instead

https://gizmodo.com/apollo-landing-keypad-shrunken-into-worlds-coolest-calculator-watch-2000541103

6
7
0
Show older