Posts
2471
Following
660
Followers
1482
"I'm interested in all kinds of astronomy."
repeated

🥈 We won second place in DARPA's AI Cyber Challenge with Buttercup!

After competing against 7 top teams to build autonomous AI systems, we're excited to announce that Buttercup, our Cyber Reasoning System that automatically discovers and patches vulnerabilities, is now open source.

Learn more about Buttercup: https://blog.trailofbits.com/2025/08/08/buttercup-is-now-open-source/

1
5
0
[RSS] Theori AIxCC writeup , 0day in sqlite + more

https://theori.io/blog/exploring-traces-63950
1
1
2
repeated
#3126 Disclaimer
Show content

You say no human would reply to a forum thread about Tom Bombadil by writing and editing hundreds of words of text, complete with formatting, fancy punctuation, and two separate uses of the word 'delve'. Unfortunately for both of us, you are wrong.
https://xkcd.com/3126/

0
5
0
repeated

3 or 4 decades of InfoSec and this kind of crap still going on :P

"The Linux kernel contributes to this issue by exposing esoteric features through the same syscalls as commonly-used core kernel functionality."

1
1
0
repeated

Hello and welcome to this installment of ! Today's guest of honour is one КР556РТ4, a Soviet clone of 82S126 the 256x4 TTL PROM.

A very short thread.

SiPron page: https://siliconpr0n.org/archive/doku.php?id=infosecdj:gamma:kr556rt4

3
2
0
repeated
repeated

I nominate https://docs.openssl.org/3.3/man3/d2i_X509/ as 's worst man page. And there's fierce competition for that award.

And in the end it does not even mention the weird behavior: it stores errors in an internal queue which mysteriously makes the *next* invoked function fail...

4
2
0
repeated

I found a Linux kernel security bug (in AF_UNIX) and decided to write a kernel exploit for it that can go straight from "attacker can run arbitrary native code in a seccomp-sandboxed Chrome renderer" to kernel compromise:
https://googleprojectzero.blogspot.com/2025/08/from-chrome-renderer-code-exec-to-kernel.html

This post includes fun things like:

  • a nice semi-arbitrary read primitive combined with an annoying write primitive
  • slowing down usercopy without FUSE or userfaultfd
  • CONFIG_RANDOMIZE_KSTACK_OFFSET as an exploitation aid
  • a rarely-used kernel feature that Chrome doesn't need but is reachable in the Chrome sandbox
  • sched_getcpu() usable inside Chrome renderers despite getcpu being blocked by seccomp (thanks to vDSO)
1
16
0
Edited 1 month ago
[RSS] CVE-2024-12718: Path Escape via Python's tarfile Extraction Filters

https://www.upwind.io/feed/cve-2024-12718-path-escape-via-pythons-tarfile-extraction-filters
0
0
2
[RSS] Oops Safari, I think You Spilled Something!

CVE-2024-44308 writeup by Exodus Intelligence

https://blog.exodusintel.com/2025/08/04/oops-safari-i-think-you-spilled-something/
0
0
1
repeated

Talos Vulnerability Reports

New vulnerability report from Talos:

PDF-XChange Editor EMF File EMR_EXTCREATEFONTINDIRECTW Facename Out-Of-Bounds Read Vulnerability

https://talosintelligence.com/vulnerability_reports/TALOS-2025-2203

CVE-2025-47152
0
1
0
repeated

Talos Vulnerability Reports

New vulnerability report from Talos:

PDF-XChange Editor EMF File EMR_POLYDRAW16 PT_BEZIERTO Out-Of-Bounds Read Vulnerability

https://talosintelligence.com/vulnerability_reports/TALOS-2025-2171

CVE-2025-27931
0
1
0
repeated

Project Zero Bot

New Project Zero issue:

Linux >=6.9: broken AF_UNIX MSG_OOB handling causes UAF read+write

https://project-zero.issues.chromium.org/issues/423023990

CVE-2025-38236
0
8
9
repeated

WANTED: Intel Architecture Labs 1990’s CD-ROM’s. They appear to have maybe been monthly. They contained a mirror of Intel’s ‘download.intel.com’ ftp server, specifically the /ial/ subdirectory which is not in the 2014 backup of the site on archive.org.

Lots and lots of white papers and design guideline documents in there. Especially looking for ones from the late 1990’s (1998-ish onward) if they exist. I’ve seen references in mailing lists to them that lead me to believe they do.
Example gem: intel trying to cover its ass after the FDIV bug, and have some more FDIV

5
19
0
repeated
Edited 1 month ago

I need help car jacking my own car. Left the keys inside :(

Can someone help me with that? Either with lockpicking tools or those inflatable cushions?
Its an old car, no fancy stuff.

Please do your magic.

Edit: ANWB fixed it.

3
4
0
repeated

1/ The most powerful hacker in the world right now is femboy·cat who is able to control 5% of Internet hosts, making them the all-time champion of the IPv4 Games.

3
5
0
repeated
Edited 1 month ago

Happy new Rust! 🎆🦀

Rust 1.89.0 has been released!

This release brings you inferred args to const generics (e.g. array length: `[false; _]`), the new mismatched_lifetime_syntaxes lint, u128/i128 in extern "C", NonZero<char>, File::{lock,unlock,etc.}, many x86 intrinsics, and much more! ✨

Check out the blog post and release notes for all the details: https://blog.rust-lang.org/2025/08/07/Rust-1.89.0/

0
7
1
repeated

Our newest blog post about exploiting Retbleed, a bug in AMD CPUs, in the real world is out! Enjoy!
https://bughunters.google.com/blog/6243730100977664/exploiting-retbleed-in-the-real-world

0
6
0
Show older