LPE via refcount imbalance in the af_Unix of Ubuntu's Kernel
ssd-disclosure.com·3d·
Discuss: Hacker News
💻programming
Flag this post
Directory Traversal Attacks
dev.to·1d·
Discuss: DEV
🔁Recursion
Flag this post
CTD during main menu, error says it's Compass Navigation Overhaul. Can you guys help me decode the crash log?
pastebin.com·2d·
Discuss: r/skyrimmods
🔁Recursion
Flag this post
9001/copyparty v1.19.20
github.com·8h
🎨Computer Graphics
Flag this post
Writing an Asciidoc Parser in Rust: Asciidocr
bikesbooksandbullshit.com·7h·
Discuss: Hacker News
🔬Static Analysis
Flag this post
Today I Learned: Binfmt_misc
dfir.ch·2d·
Discuss: Hacker News
💻programming
Flag this post
TikTok 'Free Photoshop' Scam Steals User Data via Malicious Commands
blogger.com·18h
💻programming
Flag this post
We May Have Fixed Python's 25-Year-Old Vulnerability
iyehuda.substack.com·2d·
Discuss: Substack
🔬Static Analysis
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.com·2d
λFunctional Programming
Flag this post
FreeBSD 15.0 BETA 4 released
discoverbsd.com·1h
🌳Red-Black Trees
Flag this post
Relevant — TryHackMe Room Walkthrough
infosecwriteups.com·3d
🔁Recursion
Flag this post
exploits.club Weekly Newsletter 91 - Patch-gapping Browsers, Ubuntu LPEs, Bluetooth Int Underflows, And More
blog.exploits.club·1d
🌳Red-Black Trees
Flag this post
Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks
securityaffairs.com·1d
🔬Static Analysis
Flag this post
"Expert C Programming: Deep C Secrets" on static vs dynamic linking
reddit.com·1h·
🔬Static Analysis
Flag this post
Q&A #80 (2025-10-31)
computerenhance.com·1d
🔬Static Analysis
Flag this post
Engineering a Rust optimization quiz
fasterthanli.me·23h
🔬Static Analysis
Flag this post
Attacking macOS XPC Helpers: Protocol Reverse Engineering and Interface Analysis
tonygo.tech·10h·
💻programming
Flag this post
AI scrapers request commented scripts
cryptography.dog·1d·
💻programming
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.com·1d
λFunctional Programming
Flag this post
GMX V1 Exploit Analysis: How a $42M Classic Reentrancy Attack Unfolded
dev.to·8h·
Discuss: DEV
🔬Static Analysis
Flag this post