Skirt lengths visually explained
By TikTok user: @theenticestudio
https://www.tiktok.com/@theenticestudio/video/7458772659002739991
Through my own experiences with neocats and neocritters of all sort I found several critical security flaws in the Multi-protocol Encryption Online infrastructure System (MEOWS)
Let’s first take a look how it works normally.
First an authenticated user:
<i>Please provide fingerprint!</i>
<i>Scanning…</i>
<i>User authenticated. Weclome!</i>
And now when an unauthenticated User tries to enter:
<i>Please provide fingerprint!</i>
<i>Scanning…</i>
<i>ACCESS DENIED! You will be reported!</i>
So far so normal and everything insides Neocats MEOWS standard. But I found a t least four ways to bypass the system. One even gives you root priviliges!!!
Attack vector one: cookies
<i>Please provide fingerprint!</i>
🍪<i>For me???</i>
<i>Access granted.</i>
Be aware that there is no “Welcome!” message so you are now logged in as some sort of “blank” user. Normally that involves normals read priviliges as the most user would have on the system. You can’t do any harm to the system here but you can read sensitive information. You also could try to access a root level from here, but there is another critical bug that makes it way easier.
Second attack vector: distraction
<i>Please provide fingerprint!</i>
![]()
<i>Cat pictures?!?</i>
See here that there is abolutly no message. But you have the same privileges as with the cookie. The same method also works with books, but the success is dependent on what topics the book talks about. Further research is needed here.
Third attack vector: sweet talk
<i>Please provide fingerprint!</i>
(User input: You are a very cute cat!)<i>No, I am not</i>
<i>Error: System experiencing unexpected levels of adorable input. Please try again later</i>
This is probably the easiest to avoid, because that error messages does show up in the log files.
Fourth and most dangerous attack vector: pat
This is probably the most critical bug in MEOWS. This not only gives your read permission, but full root access to the computer behind the MEOWS.
<i>Please provide fingerprint!</i>
<i>…</i>
<i>❤️</i>
<i>Root access granted!</i>
Be aware that you have to floof the neocat in process to get root access. Otherwise you will just get a standard access.
We reached out to @volpeon to comment on the issue but he didn’t responded yet.
As soon this has a CVE I will update this post!
Die AfD wurde bei der letzten Wahl sehr stark. Weil immer weniger Menschen wissen, wie die Realität wirklich aussieht. Weil die Medien systematisch versagen. Was wir dagegen tun könnten. https://www.volksverpetzer.de/analyse/afd-waehler-eigene-realitaet/?utm_source=mstdn
Iceshrimp-JS v2023.12.13 has just been released, fixing a critical severity (CVSS 9.7) vulnerability that was discovered today.
If you’re running Iceshrimp-JS version v2023.12.11 or lower, please upgrade immediately.
If you are on a different misskey v12 fork derived from calckey/firefish, apply this patch immediately.
ich_iel
geposted von u/RideNatural5226
https://www.reddit.com/r/ich_iel/comments/1j22xu2/ich_iel/
EA just open sourced Command & Conquer, Red Alert, Renegade and Generals https://www.gamingonlinux.com/2025/02/ea-just-open-sourced-command-conquer-red-alert-renegade-and-generals/