<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>my blog thing idk on ( •_•)</title><link>https://hitman.services/</link><description>Recent content in my blog thing idk on ( •_•)</description><generator>Hugo</generator><language>en-US</language><copyright>N/a</copyright><lastBuildDate>Sat, 19 Apr 2025 00:00:00 +0000</lastBuildDate><atom:link href="https://hitman.services/index.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2025-43929</title><link>https://hitman.services/cve-2025-43929/</link><pubDate>Sat, 19 Apr 2025 00:00:00 +0000</pubDate><guid>https://hitman.services/cve-2025-43929/</guid><description>How I Kind of Got Remote Code Execution via a Terminal Emulator You May Use and a Markdown Editor You May Use Remote code execution is often considered critical when discovered, but when there are a few extra steps involved, it can be brought down to a medium after data-enrichment by NVD, the severity was raised to a 7.8 (high) from a 4.1 (medium). This is how I discovered my first CVE that allowed for remote code execution on a user&amp;rsquo;s machine via a vulnerable terminal emulator known as KiTTY and a poorly designed markdown editor.</description></item></channel></rss>