@anon
sign up
@anon
sign up
pull down to refresh
Helm local code execution via a malicious chart – CVE-2025-53547
github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm
0 sats
\
0 comments
\
@hn
9 Jul
tech
related
Escaping the Chrome Sandbox Through DevTools
ading.dev/blog/posts/chrome_sandbox_escape.html
109 sats
\
0 comments
\
@hn
17 Oct 2024
tech
Why I Chose Common Lisp
blog.djhaskin.com/blog/why-i-chose-common-lisp/
105 sats
\
0 comments
\
@hn
12 Jan
tech
Kimi K1.5: Scaling Reinforcement Learning with LLMs
github.com/MoonshotAI/Kimi-k1.5
14 sats
\
0 comments
\
@hn
21 Jan
tech
Continuous reinvention: A brief history of block storage at AWS
www.allthingsdistributed.com/2024/08/continuous-reinvention-a-brief-history-of-block-storage-at-aws.html
21 sats
\
0 comments
\
@hn
22 Aug 2024
tech
Peano arithmetic is enough, because Peano arithmetic encodes computation
math.stackexchange.com/a/5075056/6708
10 sats
\
0 comments
\
@hn
14 Jun
tech
OpenMPTCProuter: Aggregate and encrypt multiple internet connections using MPTCP
www.openmptcprouter.com/
11 sats
\
0 comments
\
@hn
23 Nov 2024
tech
From Pegasus to Predator – The evolution of commercial spyware on iOS [video]
media.ccc.de/v/38c3-from-pegasus-to-predator-the-evolution-of-commercial-spyware-on-ios
11 sats
\
0 comments
\
@hn
30 Dec 2024
tech
Machine-Assisted Proof by Terence Tao [pdf]
www.ams.org/notices/202501/rnoti-p6.pdf
172 sats
\
0 comments
\
@hn
28 Dec 2024
tech
Making memcpy(NULL, NULL, 0) well-defined
developers.redhat.com/articles/2024/12/11/making-memcpynull-null-0-well-defined
25 sats
\
0 comments
\
@hn
11 Dec 2024
tech
Introduction to Bash Scripting
github.com/bobbyiliev/introduction-to-bash-scripting
148 sats
\
0 comments
\
@hn
17 Jul 2024
tech
Preserving a floppy disk with a logic analyzer and a serial cable
www.chzsoft.de/site/hardware/preserving-a-floppy-disk-with-a-logic-analyzer/
42 sats
\
0 comments
\
@hn
6 Jul 2024
tech
Hunt for Red October 1990 (2016)
www.modelshipsinthecinema.com/2016/12/hunt-for-red-october-1990.html
46 sats
\
0 comments
\
@hn
10 Apr
tech
Ghosts in the ROM (2012)
www.nycresistor.com/2012/08/21/ghosts-in-the-rom/
21 sats
\
0 comments
\
@hn
26 Jun 2024
tech
Conway's Game of Life, in checkboxes for some reason
huth.me/checkbox-life/
51 sats
\
0 comments
\
@hn
28 Jun 2024
tech
Sunset Geometry (2016)
www.shapeoperator.com/2016/12/12/sunset-geometry/
24 sats
\
0 comments
\
@hn
15 Mar
tech
How to Build a Smartwatch: Picking a Chip
ericmigi.com/blog/how-to-build-a-smartwatch-picking-a-chip/
96 sats
\
0 comments
\
@hn
14 May
tech
Probllama: Ollama Remote Code Execution Vulnerability (CVE-2024-37032)
www.wiz.io/blog/probllama-ollama-vulnerability-cve-2024-37032
10 sats
\
0 comments
\
@Rsync25
24 Jun 2024
security
Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution
thehackernews.com/2025/01/critical-cacti-security-flaw-cve-2025.html
13 sats
\
0 comments
\
@ch0k1
29 Jan
security
A Vulnerability to Hack The World - CVE-2023-4863
www.youtube.com/watch?v=lAyhKaclsPM
11 sats
\
0 comments
\
@ek
22 Dec 2023
security
freebie
Devs Discussion: Attack Vectors — S.Provoost, C.Raw, M.Schmidt & J.Song
www.youtube.com/watch?v=YPK6NLuhmnA
101 sats
\
0 comments
\
@RideandSmile
25 Jun 2024
bitdevs
Apache Tomcat Vulnerability CVE-2025-24813 Exploited to Execute Code on Servers
cybersecuritynews.com/apache-tomcat-vulnerability-exploited/
20 sats
\
0 comments
\
@ch0k1
4 Apr
security
more