<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <updated>2026-03-21T13:42:37Z</updated>
  <generator>https://yabu.me</generator>

  <title>Nostr notes by ~swapgs</title>
  <author>
    <name>~swapgs</name>
  </author>
  <link rel="self" type="application/atom+xml" href="https://yabu.me/npub1au9arhljl5kteek5azuqnr2pwttct5cuq0prcp5ammfm6kk23l5q4cx6yk.rss" />
  <link href="https://yabu.me/npub1au9arhljl5kteek5azuqnr2pwttct5cuq0prcp5ammfm6kk23l5q4cx6yk" />
  <id>https://yabu.me/npub1au9arhljl5kteek5azuqnr2pwttct5cuq0prcp5ammfm6kk23l5q4cx6yk</id>
  <icon>https://media.infosec.exchange/infosec.exchange/accounts/avatars/109/305/049/668/669/022/original/8c5e739bd526ab71.jpeg</icon>
  <logo>https://media.infosec.exchange/infosec.exchange/accounts/avatars/109/305/049/668/669/022/original/8c5e739bd526ab71.jpeg</logo>




  <entry>
    <id>https://yabu.me/nevent1qqsgmm8dfka9gd46e8pshjz495l5z9mjz0x83d3rjv9fgwsl93yh23gzyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287s50gqaf</id>
    
      <title type="html">Have you looked into their internal APIs for this feature? ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsgmm8dfka9gd46e8pshjz495l5z9mjz0x83d3rjv9fgwsl93yh23gzyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287s50gqaf" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsds27r4y6dxq9hm3y9skaxh0x4eqh26uqpyze9uma3f74ua2gyyvqvylzpj&#39;&gt;nevent1q…lzpj&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Have you looked into their internal APIs for this feature? Container escape via Zed would be fun :)
    </content>
    <updated>2026-03-20T22:34:37Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsq5gpwy3f4utf734s9auq2xvw0zh70tf3fm309z6u7zfnnd3re66szyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287stscnqw</id>
    
      <title type="html">Looks like some AI slop?</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsq5gpwy3f4utf734s9auq2xvw0zh70tf3fm309z6u7zfnnd3re66szyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287stscnqw" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqspv6tqhsl3qttnd8huhq2gzt2ve647rd3mhq8gsx3e92afhl6fk8sqsy99l&#39;&gt;nevent1q…y99l&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Looks like some AI slop?
    </content>
    <updated>2025-12-22T09:39:59Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqstp98d7st0yut8s7p4t26s9aj4vxfmmw3yrvpd6zgk2zkk000zgjgzyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287sgcsnfj</id>
    
      <title type="html">Don’t skip the linenoise section, a lot of great bits in there! ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqstp98d7st0yut8s7p4t26s9aj4vxfmmw3yrvpd6zgk2zkk000zgjgzyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287sgcsnfj" />
    <content type="html">
      Don’t skip the linenoise section, a lot of great bits in there! &lt;a href=&#34;https://haunted.computer/@phrack/115051910573337358&#34;&gt;https://haunted.computer/@phrack/115051910573337358&lt;/a&gt;
    </content>
    <updated>2025-08-19T09:09:57Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsy3yt2qefunnqgqvsgnynrp7wtr2q88tf7a0gsdn3qvmpesu69n3gzyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287sgygp4f</id>
    
      <title type="html">Pre-auth RCE in CentOS Web Panel (CVE-2025-48703) found by the ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsy3yt2qefunnqgqvsgnynrp7wtr2q88tf7a0gsdn3qvmpesu69n3gzyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287sgygp4f" />
    <content type="html">
      Pre-auth RCE in CentOS Web Panel (CVE-2025-48703) found by the friends at Fenrisk. This is beyond madness that Shodan finds 200k of these exposed publicly. &lt;br/&gt;&lt;br/&gt;(this post is sponsored by strace®, because no one cares about ionCube)&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://fenrisk.com/rce-centos-webpanel&#34;&gt;https://fenrisk.com/rce-centos-webpanel&lt;/a&gt;
    </content>
    <updated>2025-06-24T09:35:36Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsf4zd374zmpudyzv8qe8lhja42a0tel7wwestczpzuuvktrj390jszyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287sz6tmq7</id>
    
      <title type="html">I finally found the perfect bug to play with wrapwrap and get RCE ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsf4zd374zmpudyzv8qe8lhja42a0tel7wwestczpzuuvktrj390jszyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287sz6tmq7" />
    <content type="html">
      I finally found the perfect bug to play with wrapwrap and get RCE on Monero forums :ablobcatpopcorn: &lt;br/&gt;&lt;br/&gt;After that, very classic exploitation steps. The only twist is that I didn&amp;#39;t expect Laravel (at least this version) to unserialize() session cookies when the session driver is set to Redis. &lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://swap.gs/posts/monero-forums/&#34;&gt;https://swap.gs/posts/monero-forums/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#php
    </content>
    <updated>2025-06-11T10:06:07Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdlznq9sv4w9mfq6egg6w8u46zwz3kk979rq4jrhaj5vk5w37gy3qzyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287s999jpu</id>
    
      <title type="html">Beating the kCTF PoW with AVX512IFMA for $51k ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdlznq9sv4w9mfq6egg6w8u46zwz3kk979rq4jrhaj5vk5w37gy3qzyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287s999jpu" />
    <content type="html">
      Beating the kCTF PoW with AVX512IFMA for $51k&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://anemato.de/blog/kctf-vdf&#34;&gt;https://anemato.de/blog/kctf-vdf&lt;/a&gt;
    </content>
    <updated>2025-05-30T22:38:33Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxwfxh8sx3ccyqrmjpc0n2v633jldznpkt3sx6w5k5atrj2mxec2czyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287sv86vqs</id>
    
      <title type="html">Defcon forums have to be RCE’d once a year, I don’t make the ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxwfxh8sx3ccyqrmjpc0n2v633jldznpkt3sx6w5k5atrj2mxec2czyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287sv86vqs" />
    <content type="html">
      Defcon forums have to be RCE’d once a year, I don’t make the rules! &lt;br/&gt;&lt;a href=&#34;https://chaos.social/@christopherkunz/114579265339897261&#34;&gt;https://chaos.social/@christopherkunz/114579265339897261&lt;/a&gt;
    </content>
    <updated>2025-05-27T10:20:57Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsx4grhhpe5jctnehk49hn7lswvsqfa6x5u2cfdw7z3rm9pv7jvskszyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287s2cd53m</id>
    
      <title type="html">that’s a lot of Python code for a git diff and a Paramiko ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsx4grhhpe5jctnehk49hn7lswvsqfa6x5u2cfdw7z3rm9pv7jvskszyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287s2cd53m" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsrzhu26z4zr82eghjusjlk60tr9n0flth4xnrw5ducc6y6mphzu2qzrmqkq&#39;&gt;nevent1q…mqkq&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;that’s a lot of Python code for a git diff and a Paramiko one-liner :)
    </content>
    <updated>2025-04-18T10:15:31Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsgkm263dyd6vlp8fl4arhwcf9hhsvzf7p20v4pksdkmy864kcequczyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287s5vm47x</id>
    
      <title type="html">IIRC you get a GHSA ID every time you report something through ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsgkm263dyd6vlp8fl4arhwcf9hhsvzf7p20v4pksdkmy864kcequczyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287s5vm47x" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsgarw56rak4uaryvxye4vhzkjjxhfz2nw06wmj77a07404y6npctsqaxag8&#39;&gt;nevent1q…xag8&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;IIRC you get a GHSA ID every time you report something through &lt;a href=&#34;https://github.com/php/php-src/security/&#34;&gt;https://github.com/php/php-src/security/&lt;/a&gt;, so this one must have been closed as N/A because it&amp;#39;s now in &lt;a href=&#34;https://github.com/php/php-src/issues/18209&#34;&gt;https://github.com/php/php-src/issues/18209&lt;/a&gt;. &lt;br/&gt;&lt;br/&gt;Anyway it&amp;#39;s a nice writeup, and apparently a stable bug that will be useful to bypass disable_functions on a bunch of PHP releases!
    </content>
    <updated>2025-04-17T21:36:52Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqst7r6c2frxymghlwausxwhsqvyll7l73hw60kfjdpyfzn0seuqfkqzyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287ssvk9zg</id>
    
      <title type="html">If it’s not in a remote surface (multipart parsing, json, etc) ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqst7r6c2frxymghlwausxwhsqvyll7l73hw60kfjdpyfzn0seuqfkqzyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287ssvk9zg" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs9vfq0y7lhj6wdfpsj6waew8lpzk5dhkxfp6aya87gxmmhkthrmgcmn82ve&#39;&gt;nevent1q…82ve&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;If it’s not in a remote surface (multipart parsing, json, etc) they won’t assign any CVE to it. Would need to check but it’s likely tracked as a functional issue publicly.
    </content>
    <updated>2025-04-17T10:17:36Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqc6ycuc2a9hnucj5q76k5p3mevrhj67kgs6c0y4z08aa3xmcwnwszyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287s78e4l6</id>
    
      <title type="html">In other words, what motivated this choice? &amp;gt; &amp;#34;The library ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqc6ycuc2a9hnucj5q76k5p3mevrhj67kgs6c0y4z08aa3xmcwnwszyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287s78e4l6" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsfdwn6ru6rgusevry335qw7uc9tewwrg8cau8zkcqwyw4tyclgufcqeddyw&#39;&gt;nevent1q…ddyw&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;In other words, what motivated this choice? &lt;br/&gt;&lt;br/&gt;&amp;gt; &amp;#34;The library doesn&amp;#39;t provide information about whether a path exists, or about the filesystem object the path leads to (e.g. file vs. directory vs. symlink). This information should be obtained via OS-specific functions.”
    </content>
    <updated>2025-04-16T13:45:43Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsrj2k3s8m49kv3e2yxa8cm44rmxcnvd8phdg3uhw8y7pnf6zq68dqzyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287s0mjel5</id>
    
      <title type="html">Why abstract it away from the filesystem? You’re missing out on ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsrj2k3s8m49kv3e2yxa8cm44rmxcnvd8phdg3uhw8y7pnf6zq68dqzyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287s0mjel5" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqspzwjdqk2vv8rh0hd6mrw497xf3pkg05p8vks92faksah5y9z8rpsz2ksyh&#39;&gt;nevent1q…ksyh&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Why abstract it away from the filesystem? You’re missing out on proper normalization / canonization of paths without risking differentials, symbolic links, etc.
    </content>
    <updated>2025-04-16T13:37:44Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsr5gs3xyq55mv5kmsdmvxm5z2an7758z6qhmwwzzs56s6z9835raqzyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287shxnn7f</id>
    
      <title type="html">… another ticket / report to write ;-;</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsr5gs3xyq55mv5kmsdmvxm5z2an7758z6qhmwwzzs56s6z9835raqzyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287shxnn7f" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqstt2j8xu35dnmnax9stswf6dns396q9yjajhygrmlutpd266529lsc6q77u&#39;&gt;nevent1q…q77u&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;… another ticket / report to write ;-;
    </content>
    <updated>2025-04-03T11:34:51Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0y3glw88m2m6psywunzvewfqsspzzev82jawvc798nmmua9pnjjqzyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287srhfemp</id>
    
      <title type="html">Last year, I had a few weeks between jobs and decided to look at ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0y3glw88m2m6psywunzvewfqsspzzev82jawvc798nmmua9pnjjqzyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287srhfemp" />
    <content type="html">
      Last year, I had a few weeks between jobs and decided to look at the infrastructure security of random Linux distributions with the good friends at Fenrisk. &lt;br/&gt;&lt;br/&gt;We ended up getting code execution on the Fedora Git forge hosting all package sources and on the Open Build Service instance of openSUSE. Nothing technically fancy (the usual silly argument injection bugs), but we could have effectively backdoored all their packages :°)&lt;br/&gt;&lt;br/&gt;We finally presented the details last week at &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1ksdnvrh2yh80v5gk8utuc5pntj9rtmrpkappmsay2qz3uawhnmdqh0jndp&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Insomni&#39;hack&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1ksd…jndp&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;: &lt;a href=&#34;https://fenrisk.com/assets/media/Don&amp;#39;t%20let%20Jia%20Tan%20have%20all%20the%20fun_%20hacking%20into%20Fedora%20and%20OpenSUSE.pdf&#34;&gt;https://fenrisk.com/assets/media/Don&amp;#39;t%20let%20Jia%20Tan%20have%20all%20the%20fun_%20hacking%20into%20Fedora%20and%20OpenSUSE.pdf&lt;/a&gt;. &lt;br/&gt;&lt;br/&gt;Big kudos to distro maintainers, this was one of the most efficient disclosures of my life!&lt;br/&gt;&lt;br/&gt;(now let&amp;#39;s do kernel.org?)
    </content>
    <updated>2025-03-19T11:07:15Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0nseujhddytpajyhsgeclyrugydql9mrhz7w6a6mlc47p4gqevfgzyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287sqnz7nz</id>
    
      <title type="html">Spoiler: it’s way too easy! See you there :) ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0nseujhddytpajyhsgeclyrugydql9mrhz7w6a6mlc47p4gqevfgzyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287sqnz7nz" />
    <content type="html">
      Spoiler: it’s way too easy! See you there :) &lt;a href=&#34;https://infosec.exchange/@1ns0mn1h4ck/114080672369739128&#34;&gt;https://infosec.exchange/@1ns0mn1h4ck/114080672369739128&lt;/a&gt;
    </content>
    <updated>2025-02-28T09:20:50Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0rrsxhdhpcw2zacevjtp6pgjfc80nldhuch8x7k7sjzl6uepzpdszyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287suq8a57</id>
    
      <title type="html">Looks like your RSS caught an early draft, well done :P</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0rrsxhdhpcw2zacevjtp6pgjfc80nldhuch8x7k7sjzl6uepzpdszyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287suq8a57" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsgaljn5m5vp80hyu6z3xeh2lfw4za6me46uky7n7xp4klxave26wc3gv09w&#39;&gt;nevent1q…v09w&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Looks like your RSS caught an early draft, well done :P
    </content>
    <updated>2025-02-14T09:09:26Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfsa4gf4typ7p3lrl7fnsmjkl0wvjuc4wmgedgvkz4ds89q3lqhjszyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287sletgg2</id>
    
      <title>Nostr event nevent1qqsfsa4gf4typ7p3lrl7fnsmjkl0wvjuc4wmgedgvkz4ds89q3lqhjszyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287sletgg2</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfsa4gf4typ7p3lrl7fnsmjkl0wvjuc4wmgedgvkz4ds89q3lqhjszyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287sletgg2" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsf7m97spmrmgrwxldkpwhaj634u76xj8usls4puxvdjthl982qensxv5l8l&#39;&gt;nevent1q…5l8l&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;This? &lt;a href=&#34;https://www.hackerone.com/ai/accelerate-vulnerability-remediation-with-hai&#34;&gt;https://www.hackerone.com/ai/accelerate-vulnerability-remediation-with-hai&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Looking at the screenshots, I don’t see how that would bring any value to the programs.
    </content>
    <updated>2024-12-06T09:13:35Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsw88734vaxv63u6h5377fgjjd4zsp8x9g53d9qwy72ca4rstkdhfqzyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287snvuveh</id>
    
      <title type="html">Yep!</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsw88734vaxv63u6h5377fgjjd4zsp8x9g53d9qwy72ca4rstkdhfqzyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287snvuveh" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsvmhn9up9lzkral2j47tqq97yqh9scxstxxc0mruqjrhgexmda9fcj3cz6f&#39;&gt;nevent1q…cz6f&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Yep!
    </content>
    <updated>2024-11-28T10:55:12Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfzzaccsefu3e6myl359f3wyz7z93d8r95h7znd3twxw4tlr8vacczyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287s20rs4n</id>
    
      <title type="html">Just lost a few hours yesterday for the same-ish reason, ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfzzaccsefu3e6myl359f3wyz7z93d8r95h7znd3twxw4tlr8vacczyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287s20rs4n" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqspyqezv3d4nchcsdckm4ungqayz39e2a5sjgrj48c5fqlhn57memgg9t0jl&#39;&gt;nevent1q…t0jl&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Just lost a few hours yesterday for the same-ish reason, genuinely thought scapy was broken 😞
    </content>
    <updated>2024-11-28T10:49:34Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxkvns6wmq5x6emzadk8fysl8lk8j6j4eys79csnxvrjkpmwzaajgzyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287sydvh0z</id>
    
      <title type="html">It took a while though, this should have been announced this way ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxkvns6wmq5x6emzadk8fysl8lk8j6j4eys79csnxvrjkpmwzaajgzyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287sydvh0z" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqstgk0ek5yulyyxtguh7ahgxlqh3ecc6x6eftt6hnhjhtmdt54wn8s5xp37c&#39;&gt;nevent1q…p37c&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;It took a while though, this should have been announced this way instead and not rushed through the door :/
    </content>
    <updated>2024-11-22T22:28:00Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8ut4u5s3g48xqs266feuj9v34ggt9fr6zev9rn3xlx7tul8wyj3czyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287s7l2pkf</id>
    
      <title type="html">Finally got to publish the CVE for a &amp;#34;forever-day&amp;#34; path ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8ut4u5s3g48xqs266feuj9v34ggt9fr6zev9rn3xlx7tul8wyj3czyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287s7l2pkf" />
    <content type="html">
      Finally got to publish the CVE for a &amp;#34;forever-day&amp;#34; path traversal in the .NET library DotNetZip affecting all releases since 2018. Enjoy, the PoC is in the patch! :blobcatsuit: #CVE_2024_48510&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.cve.org/CVERecord?id=CVE-2024-48510&#34;&gt;https://www.cve.org/CVERecord?id=CVE-2024-48510&lt;/a&gt;
    </content>
    <updated>2024-11-19T10:43:27Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfpa4dx7pdt8a25cfnt9d2hrkgyjh7cqndk33cavcwtukzc0mfp7czyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287sd9ltx3</id>
    
      <title type="html">@npub13s4…a2v7 just released a great writeup of the pacparser ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfpa4dx7pdt8a25cfnt9d2hrkgyjh7cqndk33cavcwtukzc0mfp7czyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287sd9ltx3" />
    <content type="html">
      &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub13s4law80pm6z09t9yd954uspawgxesrtnyw3ffwh7qadcc2dqu3snka2v7&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;pspaul&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub13s4…a2v7&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; just released a great writeup of the pacparser bug we found a few years back. The Zscaler VPN client, running as root, would inject the destination hostname in a JavaScript snippet and execute it with a *very* old version of SpiderMonkey. Paul transformed it in a CTF challenge for hack.lu and found the perfect vm bug to get RCE :blobcatadorable:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://blog.pspaul.de/posts/ancient-monkey-pwning-a-17-year-old-version-of-spidermonkey/&#34;&gt;https://blog.pspaul.de/posts/ancient-monkey-pwning-a-17-year-old-version-of-spidermonkey/&lt;/a&gt;
    </content>
    <updated>2024-10-29T10:52:35Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsz7nt53ctrwu24r8vru3yqx8pv3mvy4nj53jtlpqajawu8ljkn2rqzyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287s09wzdt</id>
    
      <title type="html">really nice discovery, thanks!</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsz7nt53ctrwu24r8vru3yqx8pv3mvy4nj53jtlpqajawu8ljkn2rqzyrhsh5wl7t7je08x6n5tszvdg9ed0pwnrspuy0qxnh0d8026e287s09wzdt" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsy0nqtkzzc064dplxmnldeaftskuucz0thfdf370uje7yfshqqg8cxwnfq0&#39;&gt;nevent1q…nfq0&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;really nice discovery, thanks!
    </content>
    <updated>2024-10-23T11:38:09Z</updated>
  </entry>

</feed>