Posts
3373
Following
712
Followers
1579
"I'm interested in all kinds of astronomy."
repeated
Edited 9 months ago

did you know that GDB includes a bytecode compiler? specifically, it has a private [edit: it's documented] bytecode format used between it and the GDB server, which the latter uses to implement conditional breakpoints with complex expressions and tracepoints

every time it hits a breakpoint/tracepoint it evaluates the bytecode, which has jumps and can read arbitrary target memory, and decides whether it really was hit or not

5
5
0
repeated
repeated

ICYMI: “Every TWINSCAN EUV ships with ~45 million lines of code […] Bugfixes and features start out as *word documents* sent to a series of review boards…”
https://alecmuffett.com/article/113264

1
1
1
repeated

: a critical security vulnerability discovered in a widely-used web-based system administration tool, allowing authenticated attackers to escalate privileges to root level and execute code.
Caused by CRLF injection: CVE-2025-2774 (CVSS 8.8)
👇
https://cybersecuritynews.com/webmin-vulnerability-escalate-privileges/

1
4
0
repeated

Project Zero Bot

New Project Zero issue:

Firefox: JavaScript can run during XSLTProcessor transform, leading to use-after-free

https://project-zero.issues.chromium.org/issues/389079450

CVE-2025-3028
0
1
1
repeated

Software is like entropy. It is difficult to grasp, weighs nothing, and obeys the second law of thermodynamics; i.e. it always increases.

0
3
0
repeated

Tech Companies Apparently Do Not Understand Why We Dislike AI

It's becoming increasingly apparent that one of the reasons why tech companies are so enthusiastic about shoving AI into every product and service is that they fundamentally do not understand why people dislike AI. I will elaborate. I was recently made aware of the Jetbrains developer ecosystem survey, which included a lot of questions about AI. After I answered some of them negatively (and possibly…

http://soatok.blog/2025/05/04/tech-companies-apparently-do-not-understand-why-we-dislike-ai/

42
20
0
repeated

Wrote a wrapper for Linux’s HID descriptor parser so I can fuzz it with libFuzzer: https://github.com/worthdoingbadly/hid-parser-harness

I’m still trying to figure out the USB uninitialized memory issue from that Amnesty International report, so I made it abort when it sees a 0xbe byte (ASan fills uninitialized malloc’d buffers with this).

0
5
0
repeated

, that app used by the administration to archive Signal messages, has been . The managed to get some users' group chats and messages too. This is a hugely significant not just for those individual customers, but also for the U.S. government more widely. https://www.404media.co/the-signal-clone-the-trump-admin-uses-was-hacked/

0
5
0
repeated

Misinformation-Superhighwayman

Edited 9 months ago

May the 5th Element be with you.

2
13
0
Sorry, I have a nasty hangover...
0
6
19
repeated

Quick note: https://arm.jonpalmisc.com/ has been updated to the latest version of the Arm spec. Any changes should be strictly improvements, but let me know if something seems off.

0
3
0
repeated
I know this is gatekeeping, but spammers who can't replace "%victim%" should just leave the industry.
2
1
9
repeated

Want to see something cursed?

It's the Linux kernel 4.19 building *natively* under Windows XP under Services for UNIX. The amount of effort to get this far was immense ...

EDIT: Follow the adventure at https://YouTube.com/c/NCommander

4
6
1
repeated

Sent from Utrecht, Netherlands on August 21, 1995. https://postcardware.net/?id=37-32

0
1
0
The latest WatchTowr post reminded me of this classic:

https://www.youtube.com/watch?v=jTfwpWj4eqA

Miss this band :(

#punk #music
0
0
0
repeated

CVE ID: CVE-2024-58136
Vendor: Yiiframework
Product: Yii
Date Added: 2025-05-02
Vulnerability: Yiiframework Yii Improper Protection of Alternate Path Vulnerability
Notes: This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://www.yiiframework.com/news/709/please-upgrade-to-yii-2-0-52 ; https://nvd.nist.gov/vuln/detail/CVE-2024-58136
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2024-58136

0
1
0
repeated
repeated

Good programming is 99% sweat and 1% coffee.

— anonymous

0
1
0
Show older