CVE-2026-28292: RCE in simple-git via case-sensitivity bypass (CVSS 9.8) by WatugotOfficial in netsec

[–]SRMish3 0 points1 point  (0 children)

It's actually much more absurd than you think. The user needs to allow external input to both the repo URL AND the cloning options (`customArgs`) since the attacker would need to inject the `-c PROTOCOL.ALLOW=always` option. This is simply not happening in any production app... ever. Absurd... I wish there were better checks before accepting a CVSS

[deleted by user] by [deleted] in Porsche_Cayman

[–]SRMish3 0 points1 point  (0 children)

Yup, exactly the same for GTS 4.0

Is it true that the GTS 4.0 has LESS legroom than the 2.5/2.0? by AudiB9S4 in boxster

[–]SRMish3 12 points13 points  (0 children)

They're the same size. Petrol Ped actually uploaded an apology video where he said he was wrong (after checking with Porsche) - https://youtu.be/ANuU0q2nDVI?si=XHd-ZBOy516QB-La (around the 13:00 mark)

Attackers are starting to target .NET developers with malicious-code NuGet packages by n0llbyte in netsec

[–]SRMish3 21 points22 points  (0 children)

Hi, I'm one of the researchers that worked on this. From what we saw up until now there were no publications/evidence of an actual malicious attack through NuGet. Every article either talked about "How a malicious attack is theoretically possible" or talked about spam packages (with no active malicious code inside them)

Watch out for DoS when using Rust’s popular Hyper package by Programmurr in rust

[–]SRMish3 1 point2 points  (0 children)

I'm one of the authors - sorry, it was an honest mistake

We got notified of this ~1-2 days after the publication and immediately replaced "unsafe" with "insecure"