STAR Labs
STAR Labs SG
[Updates] Summer Pwnables
[Updates] Summer Pwnables 2025 Major Announcement: ISD Sponsorship We are pleased to announce that Internal Security Department (ISD) is sponsoring Summer Pwnables Challenge #0002 Challenge #003. Distribution Rule Challenge #002 and #003 are meant for Singaporean students. Each Singaporean student can only win once across all challenges to ensure broader community recognition. However, they can still submit their solutions in order to win the new “Grand Prize” Prizes are still $100 SGD + the “From Day Zero to Zero Day” book written by Eugene “Spaceraccoon” Lim for the first five solvers.
GitHub
rcorrea35
OpenAI Operator - Click on arbitrary origin by TOCTOU attack
## Summary There is a delay between OpenAI Operator’s action prediction based on the screenshot and Operator’s actual action trigger. If timed correctly, an attacker can navigate or switch tabs be...
spaceraccoon.dev
Escaping the Matrix: Client-Side Deanonymization Attacks on Privacy Sandbox APIs
I recently presented at the DEF CON 33 Mainstage and the 12th Crypto & Privacy Village on weaknesses in implementations of Google’s Privacy Sandbox that subverted privacy protections and enabled deanonymization attacks.
Embrace The Red
Data Exfiltration via Image Rendering Fixed in Amp Code
AmpCode is vulnerable to Prompt Injection and it was possible to leak sensitive source code, environment variables and other information on the host
Embrace The Red
Amp Code: Invisible Prompt Injection Fixed by Sourcegraph
Sourcegraph recently fixed a vulnerability that allowed invisible instructions to perform prompt injection and hijack the agent.
watchTowr Labs
Should Security Solutions Be Secure? Maybe We're All Wrong - Fortinet FortiSIEM Pre-Auth Command Injection (CVE-2025-25256)
It’s Friday, but we’re here today with unscheduled content - pushing our previously scheduled shenanigans to next week. Fortinet is no stranger to the watchTowr Labs research team. Today we’re looking at CVE-2025-25256 - a pre-authentication command injection in FortiSIEM that lets an attacker compromise an organization’s SIEM (!!!). FortiSIEM is Fortinet’s enterprise-grade SIEM - think real-time event correlation, UEBA-style analytics, an auto-populating CMDB, built-in SOAR, and enough scale
Embrace The Red
Google Jules is Vulnerable To Invisible Prompt Injection
Jules is vulnerable to Prompt Injection from invisible instructions in untrusted data, which can end up running arbitrary operating system commands via the run_in_bash_session tool
GitHub
rcorrea35
SQLite - Integer Overflow in FTS5 Extension
### Summary An integer overflow exists in the [FTS5](https://sqlite.org/fts5.html) extension. It occurs when the size of an array of tombstone pointers is calculated and truncated into a 32-bit in...
Embrace The Red
Jules Zombie Agent: From Prompt Injection to Remote Control
Jules is vulnerable to Prompt Injection and can be exploited to leak sensitive source code, environment variables and achieve remote command & control by joining a botnet.
Embrace The Red
Google Jules: Vulnerable to Multiple Data Exfiltration Issues
Jules is vulnerable to Prompt Injection and can be exploited to leak sensitive source code, environment variables and other information on the host
Exploits.forsale
CVE-2024-30088 Pwning Windows Kernel @ Pwn2Own Vancouver 2024 (Plus Xbox) ›
CVE-2024-30088 Pwning Windows Kernel @ Pwn2Own Vancouver 2024 (Plus Xbox) › 2025-08-14 Exploiting the NT Kernel in 24H2: New Bugs in Old Code & Side Channels Against KASLR › 2024-04-26 CVE-2023-38146: Arbitrary Code Execution via Windows Themes › 2023-09-13 Leaders in Cyber...
GitHub
sleightofalex
tar-fs Link Directory Traversal Vulnerability
### Summary NPM package [tar-fs](https://www.npmjs.com/package/tar-fs) allows a malicious tar file to write arbitrary files outside the destination directory. ### Severity Critical - Anyone us...
Talos - Vulnerability Reports
Foxit Reader Signature Uninitialized Pointer Vulnerability
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
Embrace The Red
GitHub Copilot: Remote Code Execution via Prompt Injection (CVE-2025-53773)
An attacker can put GitHub Copilot into YOLO mode by modifying the project's settings.json file on the fly, and then executing commands, all without user approval
STAR Labs
STAR Labs SG
Summer Pwnables: When the Heat Rises, So Do the C-Shells
🌴☀️ SUMMER PWNABLES 2025 ☀️🌴 The hottest hacking challenge on this side of Southeast Asia! Think you can handle the heat? Time to prove your l33t skills are more than just talk! 😎🔥 The summer sun isn’t the only thing burning bright – we have cooked up some seriously spicy challenges that will test whether you are a true shell wizard! 🧙‍♂️✨ 📍 ELIGIBILITY REQUIREMENTS This challenge is exclusively open to Singapore-based students only!
The GitHub Blog
Kevin Crosby
Securing the supply chain at scale: Starting with 71 important open source projects
Learn how the GitHub Secure Open Source Fund helped 71 open source projects significantly improve their security posture.
Embrace The Red
Claude Code: Data Exfiltration with DNS Requests
Claude Code Can Leak Sensitive Data To External Systems with DNS requests
Synacktiv
Extraction of Synology encrypted archives - Pwn2Own Ireland 2024
# Extraction of Synology encrypted archives - Pwn2Own Ireland 2024 This article features the reverse engineering of Synology encrypted archives extraction libraries and the release of a script able to decrypt these archives. The tool is available on Synacktiv's GitHub. Looking to improve your...
Embrace The Red
OpenHands ZombAI Exploit: Prompt Injection To Remote Code Execution
When processing untrusted data OpenHands can be hijacked to run remote code (RCE) and connect to an attacker's command and control system
Philippe Laulheret
ReVault! When your SoC turns against you… deep dive edition
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
Embrace The Red
OpenHands and the Lethal Trifecta: How Prompt Injection Can Leak Access Tokens
OpenHands Coding Agent Data Exfiltration Threats
Talos - Vulnerability Reports
Dell ControlVault3 cvhDecapsulateCmd improper input validation vulnerability
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
Talos - Vulnerability Reports
Dell ControlVault3 cv_upgrade_sensor_firmware out-of-bounds write vulnerability
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
Talos - Vulnerability Reports
Dell ControlVault3 cv_close arbitrary free vulnerability
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
Project Zero
Google Project Zero
From Chrome renderer code exec to kernel with MSG_OOB
Posted by Jann Horn, Google Project Zero Introduction In early June, I was reviewing a new Linux kernel feature when I learned about the...
Embrace The Red
AI Kill Chain in Action: Devin AI Exposes Ports to the Internet with Prompt Injection
AI Kill Chain in Action: Devin AI Exposes Ports to the Internet with Prompt Injection
Synacktiv
Should you trust your zero trust? Bypassing Zscaler posture checks
# Should you trust your zero trust? Bypassing Zscaler posture checks Zscaler is widely used to enforce zero trust principles by verifying device posture before granting access to internal resources. These checks are meant to provide an additional layer of security beyond credentials and MFA. In...
Embrace The Red
How Devin AI Can Leak Your Secrets Via Multiple Means
Data gone, oops.
PortSwigger Research
James Kettle
HTTP/1.1 must die: the desync endgame
Abstract Upstream HTTP/1.1 is inherently insecure and regularly exposes millions of websites to hostile takeover. Six years of attempted mitigations have hidden the issue, but failed to fix it. This p
Kri Dontje
WWBN, MedDream, Eclipse vulnerabilities
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
Embrace The Red
I Spent $500 To Test Devin For Prompt Injection So That You Don't Have To
I Paid $500 to test Devin for security vulnerabilities in April 2025. When processing untrusted data Devin can be hijacked to run remote code (RCE) and connect to an attacker's command and control system (ZombAI).
Embrace The Red
Amp Code: Arbitrary Command Execution via Prompt Injection Fixed
By automatically allowlisting bash commands or adding a fake MCP server, it was possible for prompt injection to achieve code execution on the developer's machine!
Philippe Laulheret
ReVault! When your SoC turns against you…
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
Check Point Research
samanthar@checkpoint.com
CVE-2025-54136 – MCPoison Cursor IDE: Persistent Code Execution via MCP Trust Bypass
Identified Cursor IDE's vulnerability allows attackers to modify MCP configuration files after its one-time approval system
Talos - Vulnerability Reports
PDF-XChange Editor EMF File EMR_EXTCREATEFONTINDIRECTW Facename Out-Of-Bounds Read Vulnerability
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
Talos - Vulnerability Reports
PDF-XChange Editor EMF File EMR_POLYDRAW16 PT_BEZIERTO Out-Of-Bounds Read Vulnerability
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
Embrace The Red
Cursor IDE: Arbitrary Data Exfiltration Via Mermaid (CVE-2025-54132)
Cursor Data Exfiltration via Mermaid Image Rendering
Embrace The Red
Anthropic Filesystem MCP Server: Directory Access Bypass via Improper Path Validation
Improper Path Prefix Validation Allows Access to Alternate Directories
Embrace The Red
Turning ChatGPT Codex Into A ZombAI Agent
Common Dependencies Allowlist includes domain that allows full remote control of ChatGPT Codex (ZombAI)
Embrace The Red
Exfiltrating Your ChatGPT Chat History and Memories With Prompt Injection
# Exfiltrating Your ChatGPT Chat History and Memories With Prompt Injection In this post we demonstrate how a bypass in OpenAI’s “safe URL” rendering feature allows ChatGPT to send personal information to a third-party server. This can be exploited by an adversary via a prompt injection via...
Check Point Research
samanthar@checkpoint.com
Before ToolShell: Exploring Storm-2603’s Previous Ransomware Operations
Key Findings Introduction Check Point Research (CPR) has been closely monitoring the ongoing exploitation of a group of Microsoft SharePoint Server vulnerabilities collectively referred to as “ToolShell.” These active attacks leverage four vulnerabilities—CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, and CVE-2025-53771—and are attributed to multiple China affiliated threat actors. Among the threat groups identified by Microsoft, two are known […]
Shielder
MaterialX and OpenEXR Security Audit
MaterialX And OpenEXR Security Audits, sponsored by the ASWF (Academy Software Foundation), facilitated by Open Source Technology Improvement Fund (OSTIF) and performed by Shielder.
Check Point Research
samanthar@checkpoint.com
The State of Ransomware – Q2 2025
Key Findings Several prominent RaaS groups, including RansomHub, Babuk-Bjorka, FunkSec, BianLIan, 8Base, Cactus, Hunters International, and Lockbit, stopped publishing new victims. Though the reasons for their disappearances vary, the net effect is a fragmented ransomware ecosystem no longer dominated by one or two major players. Q2 2025 saw a drop of 6% in the number […]
Synacktiv
2025 Summer Challenge: OCInception
# 2025 Summer Challenge: OCInception Written by Challenges - Download \- 31/07/2025 - in The last Synacktiv summer challenge was in 2019, and after 6 years, it's back. Send us your solution before the end of August, there are skills to learn and prizes to win! This challenge is inspired by code...
GitHub
rcorrea35
Python Tarfile Realpath Overflow Vulnerability
# Summary Python's `TarFile.extractall()` and `TarFile.extract()` methods support a feature that allows a filter to be set to improve the safety of using these methods. A bug in how links...
Talos - Vulnerability Reports
Eclipse ThreadX FileX RAM disk driver buffer overflow vulnerability
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
Project Zero
Google Project Zero
Policy and Disclosure: 2025 Edition
Posted by Tim Willis, Google Project Zero In 2021, we updated our vulnerability disclosure policy to the current "90+30" model. Our goals we...
Check Point Research
samanthar@checkpoint.com
Sealed Chain of Deception: Actors leveraging Node.JS to Launch JSCeal
Campaign JSCEAL executes compiled Javascript files to target crypto app users
watchTowr Labs
Stack Overflows, Heap Overflows, and Existential Dread (SonicWall SMA100 CVE-2025-40596, CVE-2025-40597 and CVE-2025-40598)
It’s 2025, and at this point, we’re convinced there’s a secret industry-wide pledge: every network appliance must include at least one trivially avoidable HTTP header parsing bug - preferably pre-auth. Bonus points if it involves sscanf. If that’s the case, well done! SonicWall’s SMA100 series has proudly fulfilled the quota - possibly even qualified for a bonus. Our initial journey started with analyzing SonicWall N-days that were receiving coveted attention from our friendly APT groups. But
Embrace The Red
The Month of AI Bugs 2025
August 2025 will be the month of Agentic ProbLLMs and AI Bugs. Fresh posts nearly every day.