Codean (@codeanio) 's Twitter Profile
Codean

@codeanio

Ethical hackers rock and we think they do not get enough love (tool wise). So we are creating a tool for security analysts, by security analysts!

ID: 1385171262507556867

linkhttps://about.codean.io/ calendar_today22-04-2021 09:59:11

58 Tweet

387 Takipรงi

177 Takip Edilen

Codean (@codeanio) 's Twitter Profile Photo

Here's a write-up of another vulnerability we found, caused by a lack of input validation. This time it's CVE-2023-38504, a DoS in Sails.js, an MVC framework for Node. Enjoy! codean.review/vulnerability-โ€ฆ

Codean (@codeanio) 's Twitter Profile Photo

While many parts of Codean are already #designed and "tested" for #userexperience, implementing much is still tbd! Two parts were really hampering even trying Codean: member management and repository synchronization. Both of these have been just implemented and rolled out!

While many parts of Codean are already #designed and "tested" for #userexperience, implementing much is still tbd!

Two parts were really hampering even trying Codean: member management and repository synchronization. Both of these have been just implemented and rolled out!
Codean (@codeanio) 's Twitter Profile Photo

๐—ช๐—ฒ ๐—ต๐—ฎ๐—ฑ ๐—ณ๐˜‚๐—ป ๐—ฑ๐˜‚๐—ฟ๐—ถ๐—ป๐—ด #๐—ฑ๐—ฒ๐˜ƒ๐—ฒ๐—น๐—ผ๐—ฝ๐—บ๐—ฒ๐—ป๐˜ There should be a nice way to look at the code that a Codemark points to. To achieve this, we show you a full blown editor with all the bells and whistles, including Codemarks... No worries, its now fixed ๐Ÿ˜‰

๐—ช๐—ฒ ๐—ต๐—ฎ๐—ฑ ๐—ณ๐˜‚๐—ป ๐—ฑ๐˜‚๐—ฟ๐—ถ๐—ป๐—ด #๐—ฑ๐—ฒ๐˜ƒ๐—ฒ๐—น๐—ผ๐—ฝ๐—บ๐—ฒ๐—ป๐˜

There should be a nice way to look at the code that a Codemark points to.  To achieve this, we show you a full blown editor with all the bells and whistles, including Codemarks...

No worries, its now fixed ๐Ÿ˜‰
Codean (@codeanio) 's Twitter Profile Photo

#pentesting projects we do via Codean Labs relied on an older version of Codean. Today we onboarded a pentest project on the NEW platform at codean.io ๐ŸŽ‰ We did find some bugs that we fixed and identified the need for more features... Plenty of work for all of us!

#pentesting projects we do via Codean Labs relied on an older version of Codean. Today we onboarded a pentest project on the NEW platform at codean.io ๐ŸŽ‰

We did find some bugs that we fixed and identified the need for more features... Plenty of work for all of us!
Codean (@codeanio) 's Twitter Profile Photo

Did you know that we publicly discuss features and the architecture of Codean?! Join our Discord at discord.gg/nVDwK8fbH7 and let us know what you want from a tool like Codean!

Did you know that we publicly discuss features and the architecture of Codean?! Join our Discord at discord.gg/nVDwK8fbH7 and let us know what you want from a tool like Codean!
Codean (@codeanio) 's Twitter Profile Photo

We are looking for design partners! "Yeah, yeah, yeah... just another sales tactic." Well yes, you are not wrong, we obviously do need to make money. That said, we believe we can create a win, win, win! Sounds interesting? Let us know! linkedin.com/feed/update/urโ€ฆ

Codean (@codeanio) 's Twitter Profile Photo

Our Capture The Flag events are designed around the accessibility to the source code of all vulnerable targets. What's even more fun is that the whole CTF is played from within Codean! I guess we should host another public CTF sometime soonโ„ข! linkedin.com/feed/update/urโ€ฆ

Codean (@codeanio) 's Twitter Profile Photo

We found a vulnerability in Mozillaโ€™s PDF.js (CVE-2024-4367 and CVE-2024-34342 via react-pdf) resulting in arbitrary JavaScript execution when opening a malicious PDF. This results in XSS on many web- and even desktop apps. Blog post coming soon! linkedin.com/feed/update/urโ€ฆ

Codean (@codeanio) 's Twitter Profile Photo

A public service announcement about #CVE-2024-4367 that we found in one of our pentests at Codean Labs. Make sure to update your #Firefox version to 126 and for #developers to update your PDF.js dependency. You can read our blog post for all details. linkedin.com/feed/update/urโ€ฆ

Codean (@codeanio) 's Twitter Profile Photo

We found #CVE-2024-29510, a format string vulnerability in Ghostscript โ‰ค 10.03.0. It enables attackers to gain Remote Code Execution (#RCE) while also bypassing all sandbox protections. It has significant impact so please update Ghostscript! codeanlabs.com/blog/research/โ€ฆ

Codean (@codeanio) 's Twitter Profile Photo

Another day another high impact #CVE-2024-29511 on #Ghostscript โ‰ค 10.02.1. it leads to an arbitrary file read/write (under certain conditions) outside of the -dSAFER sandbox. You can find all details about this #vulnerability on our blogpost. codeanlabs.com/blog/research/โ€ฆ

Codean (@codeanio) 's Twitter Profile Photo

We are finally catching up on some basic capabilities everyone expects, but are still darn hard to get right! Finally, landed on SCIP and SCIP indexers to have code intelligence that also enables us to create unique and cool features in the future. Stay tuned for more!

We are finally catching up on some basic capabilities everyone expects, but are still darn hard to get right!

Finally, landed on SCIP and SCIP indexers to have code intelligence that also enables us to create unique and cool features in the future. Stay tuned for more!
Codean (@codeanio) 's Twitter Profile Photo

We just reached over 1,000 commits on Codean ๐ŸŽ‰ Just a few thousand more and I am sure Codean will be done by then ๐Ÿ˜‰

We just reached over 1,000 commits on Codean ๐ŸŽ‰

Just a few thousand more and I am sure Codean will be done by then ๐Ÿ˜‰
Codean (@codeanio) 's Twitter Profile Photo

We spent a lot of effort on improving the security of Ghostscript and this is our third and final blog post about everything we found. Enjoy the read! linkedin.com/feed/update/urโ€ฆ

Codean (@codeanio) 's Twitter Profile Photo

We discovered CVE-2024-12425 & CVE-2024-12426 which allow attackers to write files & extract sensitive data. Check our blog post for the impact & how to protect yourself. linkedin.com/feed/update/urโ€ฆ

Doyensec (@doyensec) 's Twitter Profile Photo

๐Ÿšจ Advisory Alert!๐Ÿšจ We've just published our Aleandro's advisory regarding a heap overflow in HAProxy Technologies as part of our coordinated disclosure process. Read all the details here: doyensec.com/research.html#โ€ฆ #doyensec #appsec #security #haproxy

๐Ÿšจ Advisory Alert!๐Ÿšจ We've just published our <a href="/drw0if/">Aleandro</a>'s advisory regarding a heap overflow in <a href="/HAProxy/">HAProxy Technologies</a> as part of our coordinated disclosure process. Read all the details here: doyensec.com/research.html#โ€ฆ

#doyensec #appsec #security #haproxy
Codean (@codeanio) 's Twitter Profile Photo

Codean Labs' b0n0b0 and Doyensec's Aleandro discovered CVE-2025-32464, a heap-buffer overflow in HAProxy. Read our write-up here: codeanlabs.com/blog/research/โ€ฆ

Codean (@codeanio) 's Twitter Profile Photo

At Codean Labs, our mission is to make the world more secure โ€” and what better way than to secure fundamental open source projects? We identified CVE-2025-47934, a critical vulnerability in OpenPGP.js to spoof signatures, see github.com/openpgpjs/openโ€ฆ github.com/openpgpjs/openโ€ฆ

Codean (@codeanio) 's Twitter Profile Photo

It's been four years already! Hereโ€™s to four more years of making the world more secure! linkedin.com/feed/update/urโ€ฆ

Codean (@codeanio) 's Twitter Profile Photo

Two of our Codean Labs colleagues evaluated OpenPGP.js and identified a signature spoofing vulnerability. Writeup includes a PoC where we demonstrate the vulnerability by spoofing a message by the Dutch government's Cyber Security Center! codeanlabs.com/blog/research/โ€ฆ