photog.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for your photos and banter. Photog first is our motto Please refer to the site rules before posting.

Administered by:

Server stats:

242
active users

#ExploitDev

0 posts0 participants0 posts today
morgen<p>Just published a proof-of-concept exploit for CVE-2025-32463, a new Linux privilege escalation vulnerability affecting sudo discovered and disclosed by Stratascale about 2 weeks ago.</p><p>The PoC is available on GitHub. A full technical writeup will be published on my blog soon.</p><p>GitHub: <a href="https://github.com/morgenm/sudo-chroot-CVE-2025-32463" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/morgenm/sudo-chroot</span><span class="invisible">-CVE-2025-32463</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ExploitDev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExploitDev</span></a> <a href="https://infosec.exchange/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://infosec.exchange/tags/PrivilegeEscalation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PrivilegeEscalation</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://infosec.exchange/tags/Rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rust</span></a> <a href="https://infosec.exchange/tags/PrivEsc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PrivEsc</span></a></p>
postmodern<p>For a tool that compiles C payloads, how would you prefer to specify the cross-compiler?<br><a href="https://infosec.exchange/tags/payloads" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>payloads</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/redteaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteaming</span></a> <a href="https://infosec.exchange/tags/exploitdev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploitdev</span></a></p>
sk3w<p>Here is my writeup for CVE-2023-28244, if you are interested in that sort of thing: <a href="https://terrapinlabs.io/posts/cve-2023-28244/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">terrapinlabs.io/posts/cve-2023</span><span class="invisible">-28244/</span></a></p><p><a href="https://infosec.exchange/tags/ExploitDev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExploitDev</span></a> <a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://infosec.exchange/tags/CVE_2023_28244" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE_2023_28244</span></a> <a href="https://infosec.exchange/tags/kerberos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kerberos</span></a></p>