Posts
2504
Following
650
Followers
1469
"I'm interested in all kinds of astronomy."
[RSS] Sandbox Security Escapes in ColdFusion and Lucee (CVE-2025-30288 and CVE-2024-55354)

https://www.hoyahaxa.com/2025/06/sandbox-security-escapes-in-coldfusion.html
0
1
2
repeated
Hungarian astronaut Tibor Kapu is on his way to space on Ax-4 \o/

https://www.youtube.com/watch?v=YAue1QljRg4
0
0
2
repeated

๐Ÿ‘‰๐Ÿฝ Check out this in-depth video of @nmatt0 reversing the firmware decryption mechanism used in a Hanwha security camera with IDA Pro. Bonus: He's also written an accompanying blog post packed with code samples, screenshots, and more!

https://hex-rays.com/blog/reversing-hanwha-security-cameras-a-deep-dive-by-matt-brown

0
3
0
repeated
Edited 1 month ago

This is very aggressively (perhaps too aggressively) stated, but he's absolutely right. People are all worried their ideas are gonna be "stolen", and my friends, I can assure you that won't be the problem.

5
9
0
repeated
repeated

i love css ๐Ÿ’–

also shoutout to Fastmail for rolling out fixes for both reports in <48h
https://www.fastmail.com/bug-bounty/

1
2
1
#IBMi is affected by a user gaining elevated privileges due to an unqualified library call vulnerability in IBM Facsimile Support for i [CVE-2025-36004]

https://www.ibm.com/support/pages/node/7237732

Another one by @silentsignal !
0
0
0
[RSS] CFCamp 2025 Slides - Understanding CFML Vulnerabilities, Exploits, and Attack Paths

https://www.hoyahaxa.com/2025/06/cfcamp-2025-slides-understanding-cfml.html

#coldfusion
0
0
1
I updated the generated #Ghidra documentation I host for 11.4:

https://scrapco.de/ghidra_docs/

Here's the documentation for Decompiler Taint Operations:

https://scrapco.de/ghidra_docs/Features/DecompilerDependent/DecompilerTaint/DecompilerTaint.html
0
0
1
#Ghidra 11.4 released with support for (external) taint engines in the decompiler:

https://github.com/NationalSecurityAgency/ghidra/releases/tag/Ghidra_11.4_build
1
4
6
repeated

๐Ÿ“ข @ERNW is preparing the venue for tomorrow's launch of in ! See you soon people! We are super excited! ๐Ÿฅณ

0
2
1
[RSS] Abusing copyright strings to trick software into thinking it's running on your competitor's PC

https://devblogs.microsoft.com/oldnewthing/20250624-00/?p=111299

#warez
0
0
3
repeated
repeated

ใ‚ทใƒฃใƒใ‚ณ๐ŸŒต

VSCode ใฎใ‚ฟใƒผใƒŸใƒŠใƒซใ‚‚ Sixel ๅฏพๅฟœใ—ใฆใŸใฎใ‹ (terminal.integrated.experimentalImageSupport ใ‚’ๆœ‰ๅŠนใซใ™ใ‚‹ใจ่กจ็คบใ•ใ‚Œใ‚‹)

0
1
0
repeated

"We will respond to you in 5 days"

3 weeks later... No response.

Anyone who gets mad at people for going full disclosure has never had to deal with the bureaucratic maze of trying to get people to fix their things.

1
4
0
repeated
Edited 1 month ago

PSA: The new version of our browser extension now requires additional permissions to "change your privacy-related settings".

The new permissions are required so we can set KeePassXC as your default password manager backend. Unfortunately, there isn't a better name for this permission set.

6
3
0
repeated

Remote code execution in CentOS Web Panel - CVE-2025-48703 https://fenrisk.com/rce-centos-webpanel

0
3
0
Show older