Posts
2983
Following
697
Followers
1545
"I'm interested in all kinds of astronomy."
repeated

🪝Introducing HyperHook! 🪝
A harnessing framework for snapshot-based using Nyx. ⚒️
HyperHook simplifies guest-to-host communication & automates repetitive tasks, making snapshot-fuzzing easier & more efficient!
🔗 Read more: https://neodyme.io/en/blog/hyperhook/

2
3
0
repeated

Cisco security advisories (PatchTuesday-ishing @shellsharks):

"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."

1
2
0
repeated

In response to a popular demand, here is DOOM running on Apple Lightning to HDMI dongle

https://youtu.be/4XCkeN0XuqA?feature=shared

0
7
0
repeated

Veeam: CVE-2025-23114
CVE-2025-23114 (9.0 critical) A vulnerability within the Veeam Updater component that allows an attacker to utilize a Man-in-the-Middle attack to execute arbitrary code on the affected appliance server with root-level permissions. This CVE impacts multiple versions of Veeam Backup. No mention of exploitation. h/t: @cR0w

0
2
0
repeated

While working on a nday vulnerability research project, we stumbled upon a vulnerability in the core of the TCP subsystem of the Linux kernel. We reported it upstream, which was fixed in May of last year. This blog post shares how we came across it and our vulnerability analysis. It is a reference counter issue, and a mechanism in the Linux kernel usually prevents those issues from being exploitable. Still, in this case, it could even be with the mechanism present. Read it and see how it could be done.

Accidentally uncovering a seven years old vulnerability in the Linux kernel

https://allelesecurity.com/accidentally-uncovering-a-seven-years-old-vulnerability-in-the-linux-kernel/

0
4
0
repeated

Zyxel says it has no plans to release patches for two zero-days under active attack and is advising customers to replace vulnerable routers.

The company says these devices have been “end of life for years” - but the devices are not listed on Zyxel’s EOL page, and some are still available to buy on Amazon https://techcrunch.com/2025/02/05/router-maker-zyxel-tells-customers-to-replace-vulnerable-hardware-exploited-by-hackers/

2
4
0
repeated

Embrace. This is the new CVE I expect I will get a fair amount of... "traffic" about: https://curl.se/docs/CVE-2025-0725.html

6
5
0
[RSS] Micropatches Released for Windows Task Scheduler Elevation of Privilege Vulnerability (CVE-2024-49039)

https://blog.0patch.com/2025/02/micropatches-released-for-windows-task.html
0
0
1
repeated

We've been collecting and mirroring what we can find of public data scrapes of data that has recently gone missing from federal sites or is likely to in the near future. The repos here include public data from CDC, NIH, and NOAA. Be warned that some of these repos are quite large!

https://git.lsit.ucsb.edu/publicdata

3
5
0
#uspol
Show content
0
0
0
repeated

Unofficial continues with Google Chrome: Stable Channel Update for Desktop
Chrome 133.0.6943.53 (Linux) and 133.0.6943.53/54( Windows, Mac) includes 12 security fixes, 3 are externally reported:

  • CVE-2025-0444 (high) Use after free in Skia
  • CVE-2025-0445 (high) Use after free in V8
  • CVE-2025-0451 (medium) Inappropriate implementation in Extensions API

No mention of exploitation.

0
2
0
repeated

The results are in! We're proud to announce the Top 10 Web Hacking Techniques of 2024! https://portswigger.net/research/top-10-web-hacking-techniques-of-2024

0
4
0
repeated

NETGEAR did this earlier than on 01 February 2025 but here you go:

1
2
0
repeated
repeated

continues with Zyxel: Zyxel security advisory for command injection and insecure default credentials vulnerabilities in certain legacy DSL CPE
Zyxel's security advisory confirms the existence of CVE-2024-40890, CVE-2024-40891, and CVE-2025-0890 affecting end-of-life DSL CPE products. While they link to GreyNoise's blog post, Zyxel does not acknowledge the fact that CVE-2024-40891 (8.8 high) post-auth command injection is a zero-day being exploited in the wild by a Mirai botnet variant. They reiterate that EoL products don’t receive further support and:

"we strongly recommend that users replace them with newer-generation products for optimal protection."

Note: DSL CPE likely stands for Digital Subscriber Line Customer-Premises Equipment cc: @fellows for more Patch Tuesday Madness.

1
2
0
repeated

CISA: CISA Adds Four Known Exploited Vulnerabilities to Catalog
Hot off the press!:

  • CVE-2018-19410 (9.8 critical) Paessler PRTG Network Monitor Local File Inclusion Vulnerability
  • CVE-2018-9276 (7.2 high) Paessler PRTG Network Monitor OS Command Injection Vulnerability
  • CVE-2024-29059 (7.5 high) Microsoft .NET Framework Information Disclosure Vulnerability
  • CVE-2024-45195 (9.8 critical) Apache OFBiz Forced Browsing Vulnerability

0
2
0
repeated

There is still a couple more days to submit your 1-page article to Paged Out! #6!
We're at 41 pages of content out of 50 required. We'll start finalizing the issue when we reach 50. Not much time left, but you can still make it! 🙂
Details: https://pagedout.institute/?page=cfp.php

0
3
0
Edited 10 months ago
I enjoy memes and sarcasm more than anyone, but I'd really appreciate a TL;DR for these supply-chain posts of watchTowr...

I mean, their last exploit writeup is estimated a 15mins read, the latest thing is 41 and there isn't even code to explain.
0
0
5
repeated

4 February 1917 | A Polish Jewish dancer Franciszka Mann was born. She was most probably the woman who on 23 October 1943, inside the undressing room of gas chamber II at Auschwitz II-Birkenau, seized SS man Josef Schillinger’s pistol, shot him & wounded SS man Wilhelm Emmerich.

1
4
0
Show older