can vulnerabilities in transitive dependencies be exploitable?

I am running nmap on an http server, and I got the netty version used by the server.
Netty version used is 9.4.53.v20231009 , I tried to check online for CVEs related to this version, and it seems this versions is not directly linked to CV… Continue reading can vulnerabilities in transitive dependencies be exploitable?

How can I safely write in my resume that I have written a MetaSploit exploit module without making employers nervous?

I have asked this question on The WorkPlace SE site and did not receive any comprehensive answers over there. I have around 10 years of cybersecurity industry experience and have gained proficiency in using MetaSploit framework for automa… Continue reading How can I safely write in my resume that I have written a MetaSploit exploit module without making employers nervous?

What are some applications of automata theory and logical paradoxes on penetration testing and exploit discovery? [closed]

It was hard to find papers on the applications of logical paradoxes(such as how Turing’s proof of the halting problem) or automata theory on penetration testing or exploit discovery. What are some projects one could work on to delve furthe… Continue reading What are some applications of automata theory and logical paradoxes on penetration testing and exploit discovery? [closed]

Specifying an integer within the maximum of an unsigned 64-bit integer does **not** cause a buffer overflow

The program I am working with has a POC published for it, but not a full explanation. I have been told by my mentor (I am part of a research program) to disclose as little information as possible about the exploit.
The program is ran on Ka… Continue reading Specifying an integer within the maximum of an unsigned 64-bit integer does **not** cause a buffer overflow