Reading view
Successful Errors: New Code Injection and SSTI Techniques
Clear and obvious name of the exploitation technique can create a false sense of familiarity, even if its true potential was never researched, the technique itself is never mentioned and payloads are limited to a couple of specific examples. This research focuses on two such techniques for Code Injection and SSTI.
[link] [comments]
Weekly Update 487

I thought Scott would cop it first when he posted about what his solar system really cost him last year. "You're so gonna get that stupid AI-slop response from some people", I joked. But no, he got other stupid responses instead! And I got the AI-slop responses! Draw your own conclusions on those comments, but I find it fascinating that the one thing people would take away from a thoughtful blog post I spent many hours writing to explain how much work I put into privacy is that the illustration was computer-generated. That such feedback aligns with the political leanings of folks on Mastodon is also fascinating, and probably something I should have seen coming. But hey, there's nothing new about folks popping their heads up to make inane comments where none were needed, and I have a special blog post for just such occasions: If You Don't Want Guitar Lessons, Stop Following Me.
Weekly Update 486

Iβm in Oslo! Flighty is telling me Iβve flown in or out of here 43 times since a visit in 2014 set me on a new path professionally and, many years later, personally. Itβs special here, like a second home that just feelsβ¦ right. This week, the business end of things is about the WhiteDate data breach. Seeking a partner along common racial lines isnβt unusual, butβ¦ wellβ¦ WhiteDate is anything but usual. And, just for fun, see if you can pick the thing that garnered the most negative feedback about that blog post this week, Iβll feature the discussion in the next vid.
WinBoat: Drive by Client RCE + Sandbox escape.
Winboat lets you "Run Windows apps on π§ Linux with β¨ seamless integration"
I chained together an unauthenticated file upload to an "update" route and a command injection in the host election app to active full "drive by" host takeover in winboat.
[link] [comments]
Elon Muskβs Grok βUndressingβ Problem Isnβt Fixed
Demonstration: prompt-injection failures in a simulated help-desk LLM
I built this as a small demonstration to explore prompt-injection and instruction-override failure modes in help-desk-style LLM deployments.
The setup mirrors common production patterns (role instructions, refusal logic, bounded data access) and is intended to show how those controls can be bypassed through context manipulation and instruction override.
Iβm interested in feedback on realism, missing attack paths, and whether these failure modes align with what others are seeing in deployed systems.
This isnβt intended as marketing - just a concrete artefact to support discussion.
[link] [comments]
CVE-2026-20965: Cymulate Research Labs Discovers Token Validation Flaw that Leads to Tenant-Wide RCE in Azure Windows Admin Center
Found a new Azure vulnerability -
CVE-2026-2096, a high-severity flaw in the Azure SSO implementation of Windows Admin Center that allows a local administrator on a single machine to break out of the VM and achieve tenant-wide remote code execution.
[link] [comments]