Discussion
Loading...

#Tag

  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
Frédéric Jacobs boosted
Martin Geisler
@mgeisler@ohai.social  ·  activity timestamp 2 days ago

My old #Rust in #Android team just published a blog post showing Android continues to improve #security by pushing for more memory safe code: https://security.googleblog.com/2025/11/rust-in-android-move-fast-fix-things.html

The results are amazing: Android now writes more Rust than C++, and the **Rust changes land faster** due to fewer revisions and faster code reviews. Medium and large changes are **rolled back about 4 times less** than changes written in C++.

#rustlang #cpp #productivity #safety #vulnerability

Google Online Security Blog

Rust in Android: move fast and fix things

Posted by Jeff Vander Stoep, Android Last year, we wrote about why a memory safety strategy that focuses on vulnerability prevention in ...
  • Copy link
  • Flag this post
  • Block
Martin Geisler
@mgeisler@ohai.social  ·  activity timestamp 2 days ago

My old #Rust in #Android team just published a blog post showing Android continues to improve #security by pushing for more memory safe code: https://security.googleblog.com/2025/11/rust-in-android-move-fast-fix-things.html

The results are amazing: Android now writes more Rust than C++, and the **Rust changes land faster** due to fewer revisions and faster code reviews. Medium and large changes are **rolled back about 4 times less** than changes written in C++.

#rustlang #cpp #productivity #safety #vulnerability

Google Online Security Blog

Rust in Android: move fast and fix things

Posted by Jeff Vander Stoep, Android Last year, we wrote about why a memory safety strategy that focuses on vulnerability prevention in ...
  • Copy link
  • Flag this post
  • Block
hukl and 3 others boosted
Harry Sintonen
@harrysintonen@infosec.exchange  ·  activity timestamp 4 days ago

This is a reminder to everyone that security is more than just memory safety. https://www.phoronix.com/news/sudo-rs-security-ubuntu-25.10

#rust #vulnerability #sudo_rs

sudo-rs Affected By Multiple Security Vulnerabilities - Impacting Ubuntu 25.10

The Ubuntu 25.10 transition to using some Rust system utilities continues proving quite rocky
  • Copy link
  • Flag this post
  • Block
Harry Sintonen
@harrysintonen@infosec.exchange  ·  activity timestamp 4 days ago

This is a reminder to everyone that security is more than just memory safety. https://www.phoronix.com/news/sudo-rs-security-ubuntu-25.10

#rust #vulnerability #sudo_rs

sudo-rs Affected By Multiple Security Vulnerabilities - Impacting Ubuntu 25.10

The Ubuntu 25.10 transition to using some Rust system utilities continues proving quite rocky
  • Copy link
  • Flag this post
  • Block
Hacker News
@h4ckernews@mastodon.social  ·  activity timestamp 2 weeks ago

Norway reviews cybersecurity after remote-access feature found in Chinese buses

https://scandasia.com/norway-reviews-cybersecurity-after-hidden-remote-access-feature-found-in-chinese-buses/

#HackerNews #Norway #cybersecurity #Chinese #buses #remote #access #technology #vulnerability

  • Copy link
  • Flag this post
  • Block
Harry Sintonen
@harrysintonen@infosec.exchange  ·  activity timestamp 2 weeks ago

Several months ago, I found a #vulnerability from #MantisBT - Authentication bypass for some passwords due to PHP type juggling (CVE-2025-47776).

Any account that has a password that results in a hash that matches ^0+[Ee][0-9]+$ can be logged in with a password that matches that regex as well. For example, password comito5 can be used to log in to the affected accounts and thus gain unauthorised access.

The root cause of this bug is the incorrect use of == to match the password hash:

if( auth_process_plain_password( $p_test_password, $t_password, $t_login_method ) == $t_password )

The fix is to use === for the comparison.

This vulnerability has existed in MantisBT ever since hashed password support was added (read: decades). MantisBT 2.27.2 and later include a fix to this vulnerability. https://mantisbt.org/download.php

#CVE_2025_47776 #infosec #cybersecurity

Root cause of CVE-2025-47776 vulnerability: Use of == instead of === to compare password hashes.
Root cause of CVE-2025-47776 vulnerability: Use of == instead of === to compare password hashes.
Root cause of CVE-2025-47776 vulnerability: Use of == instead of === to compare password hashes.
  • Copy link
  • Flag this post
  • Block
pvergain (framapiaf) boosted
CVE Program
@CVE_Program@mastodon.social  ·  activity timestamp 3 weeks ago

Django Software Foundation is now a CVE Numbering Authority (CNA) assigning CVE IDs for only supported and end-of-life Django versions available at https://www.djangoproject.com/download/ and projects listed at https://github.com/django (such as Django, channels, and daphne), excluding distributions maintained by third-party redistributors.

cve.org/Media/News/item/news/2025/10/28/Django-Added-as-CNA

#CVE #CNA #Vulnerability #VulnerabilityManagement #Cybersecurity

Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
  • Copy link
  • Flag this post
  • Block
CVE Program
@CVE_Program@mastodon.social  ·  activity timestamp 3 weeks ago

Django Software Foundation is now a CVE Numbering Authority (CNA) assigning CVE IDs for only supported and end-of-life Django versions available at https://www.djangoproject.com/download/ and projects listed at https://github.com/django (such as Django, channels, and daphne), excluding distributions maintained by third-party redistributors.

cve.org/Media/News/item/news/2025/10/28/Django-Added-as-CNA

#CVE #CNA #Vulnerability #VulnerabilityManagement #Cybersecurity

Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
  • Copy link
  • Flag this post
  • Block
Hacker News
@h4ckernews@mastodon.social  ·  activity timestamp 3 weeks ago

Understanding the Worst .NET Vulnerability

https://andrewlock.net/understanding-the-worst-dotnet-vulnerability-request-smuggling-and-cve-2025-55315/

#HackerNews #Understanding #.NET #Vulnerability #Request #Smuggling #CVE-2025-55315 #Cybersecurity

Andrew Lock | .NET Escapades

Understanding the worst .NET vulnerability ever: request smuggling and CVE-2025-55315

In this post I discuss request smuggling, the recent vulnerability in ASP.NET Core with a severity score of 9.9, and how attackers could exploit it
  • Copy link
  • Flag this post
  • Block
Hollo :hollo:
@hollo@hollo.social  ·  activity timestamp last month

Security update: Hollo 0.6.12 is now available

We've released #Hollo 0.6.12 to fix a critical privacy #vulnerability where direct messages were being exposed in the replies section of public posts. Please update your instances immediately to ensure your private conversations remain private.

#security

  • Copy link
  • Flag this post
  • Block
Cory Doctorow boosted
BobDaHacker 🏳️‍⚧️ | NB
@bobdahacker@infosec.exchange  ·  activity timestamp 2 months ago

🍔 Just collabed with @BobTheShoplifter on a MASSIVE SECURITY BREACH: We exposed how Restaurant Brands International (Burger King, Tim Hortons, Popeyes) left their drive-thru systems etc completely vulnerable.

🎯 What we found:
• Unauthenticated API access to ALL drive-thru locations globally
• Drive-thru voice recordings of customers accessible
• Employee PII exposed.
• Bathroom feedback systems with zero auth
• Hardcoded passwords in client-side code

The scope was insane - we could access any drive-thru system globally. Even listen to your actual drive-thru orders 👂

Credit to RBI for lightning-fast response once disclosed, but the privacy implications were staggering.

Full technical breakdown: https://bobdahacker.com/blog/rbi-hacked-drive-thrus

#InfoSec#CyberSecurity#ResponsibleDisclosure#Privacy#GDPR#API#GraphQL#SecurityResearch#VulnDisclosure#RestaurantBrands#BurgerKing#TimHortons#Popeyes #vulnerability

  • Copy link
  • Flag this post
  • Block
BobDaHacker 🏳️‍⚧️ | NB
@bobdahacker@infosec.exchange  ·  activity timestamp 2 months ago

🍔 Just collabed with @BobTheShoplifter on a MASSIVE SECURITY BREACH: We exposed how Restaurant Brands International (Burger King, Tim Hortons, Popeyes) left their drive-thru systems etc completely vulnerable.

🎯 What we found:
• Unauthenticated API access to ALL drive-thru locations globally
• Drive-thru voice recordings of customers accessible
• Employee PII exposed.
• Bathroom feedback systems with zero auth
• Hardcoded passwords in client-side code

The scope was insane - we could access any drive-thru system globally. Even listen to your actual drive-thru orders 👂

Credit to RBI for lightning-fast response once disclosed, but the privacy implications were staggering.

Full technical breakdown: https://bobdahacker.com/blog/rbi-hacked-drive-thrus

#InfoSec#CyberSecurity#ResponsibleDisclosure#Privacy#GDPR#API#GraphQL#SecurityResearch#VulnDisclosure#RestaurantBrands#BurgerKing#TimHortons#Popeyes #vulnerability

  • Copy link
  • Flag this post
  • Block
deutrino boosted
Marco Ivaldi
@raptor@infosec.exchange  ·  activity timestamp 3 months ago

Interesting #vulnerability research writeup (that was published a few months ago)

Compromising #OpenWrt Supply Chain via Truncated SHA-256 Collision and Command Injection

https://flatt.tech/research/posts/compromising-openwrt-supply-chain-sha256-collision/#fnref:2

  • Copy link
  • Flag this post
  • Block
halcy​ :icosahedron: and 1 other boosted
Bálint Magyar
@balint@mastodon.social  ·  activity timestamp 3 months ago

Here's my new article on how I escalated a CSS injection to remote code execution on a Google app. Enjoy!

https://bm.gy/gwdrce3

#Cybersecurity#InfoSec#BugBounty#IndieSec#Vulnerability

  • Copy link
  • Flag this post
  • Block
Bálint Magyar
@balint@mastodon.social  ·  activity timestamp 3 months ago

Here's my new article on how I escalated a CSS injection to remote code execution on a Google app. Enjoy!

https://bm.gy/gwdrce3

#Cybersecurity#InfoSec#BugBounty#IndieSec#Vulnerability

  • Copy link
  • Flag this post
  • Block
Marco Ivaldi
@raptor@infosec.exchange  ·  activity timestamp 3 months ago

Interesting #vulnerability research writeup (that was published a few months ago)

Compromising #OpenWrt Supply Chain via Truncated SHA-256 Collision and Command Injection

https://flatt.tech/research/posts/compromising-openwrt-supply-chain-sha256-collision/#fnref:2

  • Copy link
  • Flag this post
  • Block
Log in

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.0 no JS en
Automatic federation enabled
  • Explore
  • About
  • Members
  • Code of Conduct
Home
Login