Talos - Vulnerability Reports
Planet WGR-500 formPingCmd format string vulnerability
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
Talos - Vulnerability Reports
Planet WGR-500 formPingCmd stack-based buffer overflow vulnerabilities
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
Talos - Vulnerability Reports
OpenPLC OpenPLC_v3 ModbusTCP server denial of service vulnerability
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
watchTowr Labs
Well, Well, Well. It’s Another Day. (Oracle E-Business Suite Pre-Auth RCE Chain - CVE-2025-61882)
We bet you thought you’d be allowed to sit there, breathe, and savour the few moments of peace you’d earned after a painful week in cyber security. Obviously, you were horribly wrong, and you need to wake up now - we’re back, it’s all on fire, and Bambi (who seems to appear in our blog posts suspiciously often) is not your pet. Over the last week, we’ve all been harassed by the rumours of supposed active and in-the-wild exploitation of Oracle EBS, with each and every vendor confidently declari
watchTowr Labs
It's Never Simple Until It Is (Dell UnityVSA Pre-Auth Command Injection CVE-2025-36604)
Welcome back, and what a week! We’re glad that happened for you and/or sorry that happened to you. It will get better and/or worse, and you will likely survive. Today, we’re walking down the garden path and digging into the archives, publishing our analysis of a vulnerability we discovered and disclosed to Dell in March 2025 within their UnityVSA solution. As part of our continued enhancement of our Preemptive Exposure Management technology within the watchTowr Platform, we perform zero-day vu
Alexander Popov
[ru] Kernel-hack-drill и новый эксплойт для CVE-2024-50264 в ядре Linux
Некоторые уязвимости, связанные с повреждением памяти, невероятно сложны для эксплуатации. Они могут вызывать состояния гонки, приводить к сбоям системы и накладывать разные ограничения, которые усложняют жизнь исследователя. Работа с такими «хрупкими» багами требует значительно больше времени и усилий. CVE-2024-50264 в ядре Linux — как раз одна из таких сложных уязвимостей, которая получила премию Pwnie Award 2025 в категории «Лучшее повышение привилегий» (Best Privilege Escalation). В этой статье я представлю свой проект kernel-hack-drill и покажу, как он помог мне разработать прототип эксплойта для уязвимости CVE-2024-50264.
Synacktiv
What could go wrong when MySQL strict SQL mode is off?
What could go wrong when MySQL strict SQL mode is off?
Kri Dontje
Nvidia and Adobe vulnerabilities
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
MDSec
Admin
How Scattered Spider Exploited Weak Links in UK Retail Security
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
Check Point Research
shlomoo@checkpoint.com
Rhadamanthys 0.9.x – walk through the updates
Research by: hasherezade Highlights Introduction Rhadamanthys is a complex, multi-modular malware sold on the underground market since September 2022. It was first advertised by the actor “kingcrete2022.” From the outset, its design showed the hallmarks of experienced developers, and analysis soon revealed that it drew heavily from an earlier project by the same authors, Hidden […]
The GitHub Blog
Sylwia Budzynska
CodeQL zero to hero part 5: Debugging queries
Learn to debug and fix your CodeQL queries.
Synacktiv
Quantum readiness: Hybridizing signatures
Quantum readiness: Hybridizing signatures
Project Zero
Google Project Zero
Pointer leaks through pointer-keyed data structures
Posted by Jann Horn, Google Project Zero Introduction Some time in 2024, during a Project Zero team discussion, we were talking about how...
watchTowr Labs
It Is Bad (Exploitation of Fortra GoAnywhere MFT CVE-2025-10035) - Part 2
We’re back, just over 24 hours later, to share our evolving understanding of CVE-2025-10035. Thanks to everyone who reached out after Part 1, and especially to the individual who shared credible intel that informed this update. In Part 1 we laid out an odd and worrying picture: * A vendor advisory that included an “Am I Impacted?” section with what looked like a stack trace from attempted exploitation, * A vendor that has publicly signed the Secure By Design pledge, committing to transparen
Synacktiv
appledb_rs, a research support tool for Apple platforms
appledb_rs, a research support tool for Apple platforms
Embrace The Red
Cross-Agent Privilege Escalation: When Agents Free Each Other
Cross-Agent Privilege Escalation: When Agents Free Each Other
Zero Day Initiative - Blog
Peter Girnus
CVE-2025-23298: Getting Remote Code Execution in NVIDIA Merlin
403 Forbidden 403...
watchTowr Labs
Is This Bad? This Feels Bad. (GoAnywhere CVE-2025-10035)
File transfer used to be simple fun - fire up your favourite FTP client, log in to a glFTPd site, and you were done. Fast forward to 2025, and the same act requires a procurement team, a web interface, and a vendor proudly waving their Secure by Design pledge. Ever seen the glFTPd developers on the list of pledge signers? Exactly. Welcome back to another watchTowr Labs analysis. This time, we are dissecting CVE-2025-10035, a perfect CVSS 10.0 vulnerability in Fortra’s GoAnywhere MFT. For the
Talos - Vulnerability Reports
NVIDIA nvdisasm REL section header parsing out-of-bounds write vulnerability
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
Talos - Vulnerability Reports
NVIDIA nvdisasm REL section header parsing heap-based buffer overflow vulnerability
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
Talos - Vulnerability Reports
NVIDIA cuobjdump DWARF debug abbreviations parsing arbitrary code execution vulnerability
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
The GitHub Blog
Xavier René-Corail
Our plan for a more secure npm supply chain
Addressing a surge in package registry attacks, GitHub is strengthening npm's security with stricter authentication, granular tokens, and enhanced trusted publishing to restore trust in the open source ecosystem.
Talos - Vulnerability Reports
Adobe Acrobat Reader Page Property Use-After-Free Vulnerability
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
Synacktiv
The Phantom Extension: Backdooring chrome through uncharted pathways
The Phantom Extension: Backdooring chrome through uncharted pathways
Check Point Research
samanthar@checkpoint.com
Nimbus Manticore Deploys New Malware Targeting Europe
Nimbus Manticore continuously attacks defense, manufacturing, telecommunications, and aviation targets aligned with the IRGC
Synacktiv
Exploring GrapheneOS secure allocator: Hardened Malloc
Exploring GrapheneOS secure allocator: Hardened Malloc
GitHub
rcorrea35
Entrust nShield Connect XC - Multiple Vulnerabilities Leading to Insecure Boot Chain Protections
### Summary The tested nShield Connect XC HSM appliance (software version 13.6.3) can be rooted and backdoored via physical attack vectors in less than 5 minutes without leaving visible traces or ...
PortSwigger Research
Zakhar Fedotkin
WebSocket Turbo Intruder: Unearthing the WebSocket Goldmine
Many testers and tools give up the moment a protocol upgrade to WebSocket occurs, or only perform shallow analysis. This is a huge blind spot, leaving many bugs like Broken Access Controls, Race condi
Check Point Research
samanthar@checkpoint.com
Under the Pure Curtain: From RAT to Builder to Coder
Research by: Antonis Terefos (@Tera0017) Key Points Introduction The Pure malware family is a suite of malicious tools developed and sold by the author known as PureCoder. This suite includes PureHVNC RAT (a remote administration tool and predecessor to PureRAT), PureCrypter (a malware obfuscator), PureLogs (a stealer/logger), and several other tools. The malicious software is advertised and distributed through underground forums, Telegram channels, and dedicated websites. […]
Synacktiv
Dissecting DCOM part 1
Dissecting DCOM part 1
STAR Labs
Muhammad Alifa Ramdhan
Summer Pwnables: Temporal Paradox Engine Solution
Last month, Jacob asked me to create a CTF challenge for the Summer Pwnables event. I went with a kernel pwnable since my goal was to teach students some more advanced Linux kernel exploitation techniques - something that wouldn’t get solved in a day (and hopefully not by AI either). After building both the challenge and solution, I figured students should be able to crack it within 3-7 days. Turns out I was right about the timeline, but only one person actually solved it.
STAR Labs
Zafir Rasyidi Taufik
Summer Pwnables: lz1 Solution
TL;DR 🚀 We’re turning a simple compression library into a shell delivery service! This writeup exploits a buffer overflow in lz1/lz77 decompression by crafting malicious compressed data that overflows the stack and chains ROP gadgets for code execution. Ever wondered how a simple file compression tool could hand you the keys to a system? Well, buckle up because we’re about to turn andyherbert’s innocent lz1 compressor into our personal shell delivery service!
Check Point Research
samanthar@checkpoint.com
Yurei & The Ghost of Open Source Ransomware
The latest ransomware group Yurei uses open source malware, Prince Ransomware, and has already claimed victims
Synacktiv
2025 summer challenge writeup
2025 summer challenge writeup
STAR Labs
Li Jiantao (@CurseRed)
Lost in Translation: Apache Vulnerabilities That Don't Count (Literally)
During our security research in 2024, we discovered several vulnerabilities in Apache Foundation projects that seem to have gotten ’lost in translation’ between our bug reports and the CVE assignment process. While we’ve been patiently waiting for these findings to officially ‘count,’ they’ve apparently been stuck longer than a software update on a Friday afternoon. Almost a year went by without any CVEs assigned and which we completely forgot about until now.
watchTowr Labs
You Already Have Our Personal Data, Take Our Phone Calls Too (FreePBX CVE-2025-57819)
We’re back - it’s a day, in a month, in a year - and once again, something has happened. In this week’s episode of “the Internet is made of string and there is literally no evidence to suggest otherwise”, we present even further evidence that as a species we made a fairly painful mistake when we discovered electricity - and it just got worse and worse. Today, inside this hellscape we call the Internet, a mean person has discovered a zero-day(s) in FreePBX (now lovingly called CVE-2025-57819).
Memory Integrity Enforcement: A complete vision for memory safety in Apple devices
Memory Integrity Enforcement (MIE) is the culmination of an unprecedented design and engineering effort spanning half a decade that combines the unique strengths of Apple silicon hardware with our advanced operating system security to provide industry-first, always-on memory safety protection across our devices — without compromising our best-in-class device performance. We believe Memory Integrity Enforcement represents the most significant upgrade to memory safety in the history of consumer operating systems.
GitHub
rcorrea35
ChatGPT Agent - XSS on file://home/oai/redirect.html
### Summary ChatGPT's Agent mode can use a browser inside a remote VM (just like Operator). `file:///home/oai/redirect.html` is a file available in the remote VM by default, and it has an XSS ...
GitHub
rcorrea35
FFmpeg - Heap-buffer-overflow write in jpeg2000dec
### Summary The vulnerability lies in the Channel Definition cdef atom of JPEG2000 which is used to define the mapping of associated components to channels. If a chroma-subsampled pixel format is ...
Connor McGarr’s Blog
Connor McGarr
Windows Internals: Secure Calls - The Bridge Between NT and SK
Examining the interface by which NT requests the services of SK through the SkBridge project
PortSwigger Research
Zakhar Fedotkin
Cookie Chaos: How to bypass __Host and __Secure cookie prefixes
Browsers added cookie prefixes to protect your sessions and stop attackers from setting harmful cookies. In this post, you’ll see how to bypass cookie defenses using discrepancies in browser and serve
PT SWARM
admin
Kernel-hack-drill and a new approach to exploiting CVE-2024-50264 in the Linux kernel
Some memory corruption bugs are much harder to exploit than others. They can involve race conditions, crash the system, and impose limitations that make a researcher’s life difficult. Working with such fragile vulnerabilities demands significant time and effort. CVE-2024-50264 in the Linux kernel is one such hard bug, which received the Pwnie Award 2025 as […]
Alexander Popov
Kernel-hack-drill and a new approach to exploiting CVE-2024-50264 in the Linux kernel
Some memory corruption bugs are much harder to exploit than others. They can involve race conditions, crash the system, and impose limitations that make a researcher's life difficult. Working with such fragile vulnerabilities demands significant time and effort. CVE-2024-50264 in the Linux kernel is one such hard bug, which received the Pwnie Award 2025 as the Best Privilege Escalation. In this article, I introduce my personal project kernel-hack-drill and show how it helped me to exploit CVE-2024-50264.
Doyensec's Blog
ksmbd - Fuzzing Improvements and Vulnerability Discovery
# ksmbd - Fuzzing Improvements and Vulnerability Discovery (2/3) 02 Sep 2025 - Posted by Norbert Szetei ## Introduction This is a follow-up to the article originally published here. Our initial research uncovered several unauthenticated bugs, but we had only touched the attack surface lightly....
Hacking Lab
Taesoo Kim
ATLANTIS: AI-driven Threat Localization, Analysis, and Triage Intelligence System
# ATLANTIS: AI-driven Threat Localization, Analysis, and Triage Intelligence System Taesoo Kim, HyungSeok Han, Soyeon Park, Dae R. Jeong, Dohyeok Kim, Dongkwan Kim, Eunsoo Kim, Jiho Kim, Joshua Wang, Kangsu Kim, Sangwoo Ji, Woosun Song, Hanqing Zhao, Andrew Chin, Gyejin Lee, Kevin Stevens, Mansour...
Embrace The Red
Wrap Up: The Month of AI Bugs
Wrap Up: The Month of AI Bugs - Full List of Postings
Embrace The Red
AgentHopper: An AI Virus Research Project
AgentHopper: A proof-of-concept AI Virus
watchTowr Labs
Cache Me If You Can (Sitecore Experience Platform Cache Poisoning to RCE)
What is the main purpose of a Content Management System (CMS)? We have to accept that when we ask such existential and philosophical questions, we’re also admitting that we have no idea and that there probably isn’t an easy answer (this is our excuse, and we’re sticking with it). However, we’d bet that you, the reader, probably would say something like “to create and deploy websites”. One might even believe each CMS comes with Bambi’s phone number. Delusion aside, the general consensus seems
Embrace The Red
Windsurf MCP Integration: Missing Security Controls Put Users at Risk
Windsurf is vulnerable to Prompt Injection and can invoke any MCP tool without human in the loop.
Blog - Atredis Partners
Matt Burch
Where’s the Money - Supplemental Findings
403 Forbidden 403...