This is apparently a re-captcha issue. google is turning the screws on firefox users, refusing to verify captchas unless you use their chrome browser, which includes anti-features to let google track you across the web. I should have known. Fuck google so hard.
I hope you'll find a place in your project for ZIPLOCK: a round, cheerful, lovely pixel font!~✨
https://www.patreon.com/somepx/shop/pixel-font-ziplock-184896
Incredible research at BlackHat Asia today by Tong Liu and team from the Institute of Information Engineering, Chinese Academy of Sciences (在iie.ac.cn 的电子邮件经过验证)
A dozen+ RCEs on popular LLM framework libraries like LangChain and LlamaIndex - used in lots of chat-assisted apps including GitHub. These guys got a reverse shell in two prompts, and even managed to exploit SetUID for full root on the underlying VM!
A PSA since there's some confusion on this...
There is no vulnerability in Gorilla Sessions.
The vulnerability is in Palo Alto's internal SessDiskStore, which looks similar to FilesystemStore. Early analysis came to the mistaken conclusion that the vulnerable path was in FilesystemStore, but it's not. FilesystemStore authenticates the Session.ID with securecookie, SessDiskStore does not.
realizing how i have so much better password management than most of my direct acquaintances who literally work in infosec simply by self-hosting a seafile share that holds a key-locked keepass2 database rather than paying for a service
Overheard one of my students complaining to another that " #chatgpt is useless for this course" and have never felt more pleased with myself.
Trans woman, bisexual, someone's fiancée, forever a programmer, poly, and former total mess