Posts
2558
Following
630
Followers
1411
"I'm interested in all kinds of astronomy."
repeated

Fire In The Hole, We’re Breaching The Vault - Commvault Remote Code Execution (CVE-2025-34028) - watchTowr Labs https://labs.watchtowr.com/fire-in-the-hole-were-breaching-the-vault-commvault-remote-code-execution-cve-2025-34028/

0
2
0
[RSS] Authenticated Remote Code Execution on USG FLEX H Series (CVE-2025-1731 / CVE-2025-1732)

https://0xdeadc0de.xyz/blog/cve-2025-1731_cve-2025-1732

SSH tunnels FTW!
0
3
3
repeated

🚨 New advisory was just published! 🚨

Two Use After Free (UAF) vulnerabilities were discovered within Chrome’s Browser process by one of our researchers at SSD Labs:
https://ssd-disclosure.com/ssd-advisory-miracleptr-sandbox/

0
4
0
Edited 13 days ago
"Document My #Pentest: you hack, the AI writes it up!" - A sure way to get yourself into embarrassing calls with the technical team of the client...
1
0
6
repeated
[RSS] Exploiting the Synology DiskStation with Null-byte Writes

https://blog.ret2.io/2025/04/23/pwn2own-soho-2024-diskstation/
0
4
6
Edited 14 days ago
Any tips for a privacy respecting, free event organization platform? I'm thinking about features like:

- Some rich text + images hosted online for the event
- Subscription form to get updates
- Stats about expected attendance
- ??? (this is my first time)

Edit: I don't charge anything for the event, so percentage commission can work.
3
5
0
Edited 14 days ago
MEDA 43HA analogue computer formerly used at the Paks nuclear power plant

https://muzeuldecalculatoare.ro/2020/06/11/the-meda-43-analog-hybrid-computer/
0
0
4
repeated

The FastCGI library, mostly used in embedded equipment, was vulnerable for decades to an integer overflow over the IPC socket in 32-bits architecture. Check out how @shiropycatchown found it and exploited it for RCE!
https://www.synacktiv.com/en/publications/cve-2025-23016-exploiting-the-fastcgi-library

0
5
0
repeated

I know Chrome is the browser everybody loves to hate, but I think most would agree this would be very bad.

https://www.axios.com/2025/04/23/open-ai-google-chrome

2
5
0
repeated

If you haven't seen it yet, make sure to check out another great RE//verse talk, Code reuse and attribution: best friends and worst enemies from Max 'Libra' Kersten (https://youtu.be/GPT1IksBkaI)

0
2
0
repeated
repeated

Coworker: ...and the IP address are compared with a string match.
Me: grinning manically
Coworker: Why are you looking at me like that?
Me: Open up a terminal and type ping 4.2.514 and hit enter.
Coworker: ...what's the fourth number?
Me: grin widens Just hit enter.
Coworker: WTF!?

28
16
1
repeated
repeated

Spring is here, and the cable plugs are blooming.

3
23
1
repeated

Google is what happens when a system forgets why it was built but remembers how.

2
5
0
repeated

We have identified some security vulnerabilities (CVE-2025-1731) in Zyxel USG FLEX H Series firewall appliances, that allow local users with access to a Linux OS shell to escalate privileges to root.

https://security.humanativaspa.it/local-privilege-escalation-on-zyxel-usg-flex-h-series-cve-2025-1731

0
5
0
repeated

🐣 HAPPY EASTER FROM PHRACK 🐣

SPECIAL CrackMe Easter-2025 Challenge ONLINE NOW.

👉ZGlnICtzaG9ydCBlZ2c/Pz8/LnBocmFjay5vcmcgVFhU👈

Go find the EGG by solving the riddle :>

https://github.com/phrackzine/crackme

0
3
0
[RSS] Auditing Moodle's core hunting for logical bugs

http://blog.quarkslab.com/auditing-moodles-core-hunting-for-logical-bugs.html
0
0
1
repeated

If you heard about that hacking of the voices of traffic light crosswalks in the US recently, the root cause is the devices all had the password '1234' and an app to reprogram the devices was on the Apple app store.
https://www.theregister.com/2025/04/19/us_crosswalk_button_hacking/

7
23
0
Show older