|
You are here |
without.boats | ||
| | | | |
blog.darkwolfsolutions.com
|
|
| | | | | September 26, 2024 Episode 15 CVE-2024-45623: Unauthenticated RCE in D-Link DAP-2310 Authors: Hahna Kane Latonick and Jonathan Waterman Dark Wolf Solutions recently disclosed a vulnerability to D-Link that results in unauthenticated remote code execution (RCE) in their DAP-2310 REV-A Wireless | |
| | | | |
www.trevorlasn.com
|
|
| | | | | The vulnerability skips Next.js middleware security checks by adding a single HTTP header | |
| | | | |
boats.gitlab.io
|
|
| | | | | This is just a post about something that grinds my gears a bit more than it reasonably should: I think the habit of applying for CVEs for Rust (and Rust ecosystem libraries) is silly at best and harmful at worst. I think it muddies the waters about what a vulnerability is, and paints an overly negative picture of Rust's security situation that can only lead people to make inaccurate evaluations when contrasting it with other languages like C/C++. | |
| | | | |
paulbutler.org
|
|
| | | [AI summary] The post discusses the current state and challenges of embedding WebAssembly outside of browsers, focusing on runtime choices, memory management, and interface design for applications like real-time multiplayer games. | ||