GitHub
rcorrea35
ChatGPT Agent - XSS on file://home/oai/redirect.html
### Summary ChatGPT's Agent mode can use a browser inside a remote VM (just like Operator). `file:///home/oai/redirect.html` is a file available in the remote VM by default, and it has an XSS ...
GitHub
rcorrea35
FFmpeg - Heap-buffer-overflow write in jpeg2000dec
### Summary The vulnerability lies in the Channel Definition cdef atom of JPEG2000 which is used to define the mapping of associated components to channels. If a chroma-subsampled pixel format is ...
Connor McGarr’s Blog
Connor McGarr
Windows Internals: Secure Calls - The Bridge Between NT and SK
Examining the interface by which NT requests the services of SK through the SkBridge project
PortSwigger Research
Zakhar Fedotkin
Cookie Chaos: How to bypass __Host and __Secure cookie prefixes
Browsers added cookie prefixes to protect your sessions and stop attackers from setting harmful cookies. In this post, you’ll see how to bypass cookie defenses using discrepancies in browser and serve
PT SWARM
admin
Kernel-hack-drill and a new approach to exploiting CVE-2024-50264 in the Linux kernel
Some memory corruption bugs are much harder to exploit than others. They can involve race conditions, crash the system, and impose limitations that make a researcher’s life difficult. Working with such fragile vulnerabilities demands significant time and effort. CVE-2024-50264 in the Linux kernel is one such hard bug, which received the Pwnie Award 2025 as […]
Alexander Popov
Kernel-hack-drill and a new approach to exploiting CVE-2024-50264 in the Linux kernel
Some memory corruption bugs are much harder to exploit than others. They can involve race conditions, crash the system, and impose limitations that make a researcher's life difficult. Working with such fragile vulnerabilities demands significant time and effort. CVE-2024-50264 in the Linux kernel is one such hard bug, which received the Pwnie Award 2025 as the Best Privilege Escalation. In this article, I introduce my personal project kernel-hack-drill and show how it helped me to exploit CVE-2024-50264.
Doyensec's Blog
ksmbd - Fuzzing Improvements and Vulnerability Discovery
# ksmbd - Fuzzing Improvements and Vulnerability Discovery (2/3) 02 Sep 2025 - Posted by Norbert Szetei ## Introduction This is a follow-up to the article originally published here. Our initial research uncovered several unauthenticated bugs, but we had only touched the attack surface lightly....
Embrace The Red
Wrap Up: The Month of AI Bugs
Wrap Up: The Month of AI Bugs - Full List of Postings
Embrace The Red
AgentHopper: An AI Virus Research Project
AgentHopper: A proof-of-concept AI Virus
watchTowr Labs
Cache Me If You Can (Sitecore Experience Platform Cache Poisoning to RCE)
What is the main purpose of a Content Management System (CMS)? We have to accept that when we ask such existential and philosophical questions, we’re also admitting that we have no idea and that there probably isn’t an easy answer (this is our excuse, and we’re sticking with it). However, we’d bet that you, the reader, probably would say something like “to create and deploy websites”. One might even believe each CMS comes with Bambi’s phone number. Delusion aside, the general consensus seems
Embrace The Red
Windsurf MCP Integration: Missing Security Controls Put Users at Risk
Windsurf is vulnerable to Prompt Injection and can invoke any MCP tool without human in the loop.
Blog - Atredis Partners
Matt Burch
Where’s the Money - Supplemental Findings
403 Forbidden 403...
Check Point Research
shlomoo@checkpoint.com
Chasing the Silver Fox: Cat & Mouse in Kernel Shadows
An ongoing in-the-wild campaign by Silver Fox APT abuses a previously unknown vulnerable driver to terminate protected processes
Kri Dontje
Libbiosig, Tenda, SAIL, PDF XChange, Foxit vulnerabilities
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
Rhino Security Labs
Whit Taylor
Referral Beware, Your Rewards are Mine
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
Embrace The Red
Cline: Vulnerable To Data Exfiltration And How To Protect Your Data
Cline Coding Agent Vulnerable To Data Exfiltration and how to protect your data
watchTowr Labs
The One Where We Just Steal The Vulnerabilities (CrushFTP CVE-2025-54309)
On July 18, 2025, users of CrushFTP woke up to an announcement: As we’ve all experienced in 2025, 2025 has been the year of vendors burying their heads in the sand with regard to in-the-wild exploitation, even in the face of impressively indisputable evidence, and using their status as a CNA to somehow get CVEs with suspiciously similar identifiers to the point that confusion appears almost intentional. But CrushFTP did something special in their message - perhaps without realising, they lever
Embrace The Red
AWS Kiro: Arbitrary Code Execution via Indirect Prompt Injection
Agents That Can Overwrite Their Own Configuration and Security Settings
Check Point Research
samanthar@checkpoint.com
ZipLine Campaign: A Sophisticated Phishing Attack Targeting US Companies
Check Point Research exposes ZipLine, an advanced phishing campaign targeting U.S. manufacturing with MixShell malware and AI-themed lures
PortSwigger Research
Gareth Heyes
Inline Style Exfiltration: leaking data with chained CSS conditionals
I discovered how to use CSS to steal attribute data without selectors and stylesheet imports! This means you can now exploit CSS injection via style attributes! Learn how below: Someone asked if you c
The GitHub Blog
Michael Stepankin
Safeguarding VS Code against prompt injections
See how to reduce the risks of an indirect prompt injection, such as the exposure of confidential files or the execution of code without the user's consent.
Embrace The Red
How Prompt Injection Exposes Manus' VS Code Server to the Internet
This post shows how an indirect prompt injection can trick Manus to expose the VS code server and at the same time leak its connection password, allowing an adversary to connect over the internet and gain full access to Manus's development machine
Embrace The Red
How Deep Research Agents Can Leak Your Data
When enabling Deep Research an agent might go off for a long period of time and invoke many tools and leak information from one tool to another.
GitHub
sleightofalex
SQLite: Integer truncation in findOrCreateAggInfoColumn
## Summary An integer truncation vulnerability exists in SQLite's handling of aggregate queries with a very large number of distinct column references. When the number of columns processed in ...
Talos - Vulnerability Reports
The Biosig Project libbiosig Nex parsing heap-based buffer overflow vulnerability
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
Talos - Vulnerability Reports
The Biosig Project libbiosig ABF parsing integer overflow to heap-based buffer overflow vulnerability
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
Talos - Vulnerability Reports
The Biosig Project libbiosig MFER Tag 3 null write stack-based buffer overflow vulnerability
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
Stories by Renwa on Medium
Renwa
When CTF Meets Bug Bounty: A Critical UXSS in Opera Browser
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
Embrace The Red
Sneaking Invisible Instructions by Developers in Windsurf
A vulnerability in Windsurf Cascade allows malicious instructions to be hidden from developers but followed by the AI, leading to potential data exfiltration. Learn how this 'invisible' attack works.
Embrace The Red
Windsurf: Memory-Persistent Data Exfiltration (SpAIware Exploit)
Windsurf is vulnerable to Prompt Injection and also long-term memory persistence, which allows an adversary to persist malicious instructions for a long period of time, aka. SpAIware attack
Embrace The Red
Hijacking Windsurf: How Prompt Injection Leaks Developer Secrets
Windsurf is vulnerable to indirect prompt injection and can be exploited to leak sensitive source code, environment variables and other information on the host
Hacking Lab
Dong-uk Kim
Windows plays Jenga: Uncovering Design Weaknesses in Windows File System Security (to appear)
Hacking Lab Hacking Lab Home People Publications CVEs Contact Light Dark Automatic Windows plays Jenga: Uncovering Design Weaknesses in Windows File System Security (to appear) Dong-uk Kim, JunYoung Park, Sanghak Oh , Hyoungshick Kim , Insu Yun October 2025 Cite Publication Proceedings of the 32nd...
Hacking Lab
Dongok Kim
CROSS-X: Generalized and Stable Cross-Cache Attack on the Linux Kernel (to appear)
Hacking Lab Hacking Lab Home People Publications CVEs Contact Light Dark Automatic CROSS-X: Generalized and Stable Cross-Cache Attack on the Linux Kernel (to appear) Dongok Kim, Juhyun Song, Insu Yun October 2025 Cite Publication Proceedings of the 32nd ACM Conference on Computer and Communications...
Stratum Security Blog
Colin McQueen
Azure SSRF with Workflow Designer Feature
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
Embrace The Red
Amazon Q Developer for VS Code Vulnerable to Invisible Prompt Injection
Amazon Q Developer for VS Code Vulnerable to Invisible Prompt Injection
watchTowr Labs
Guess Who Would Be Stupid Enough To Rob The Same Vault Twice? Pre-Auth RCE Chains in Commvault
We’re back, and we’ve finished telling everyone that our name was on the back of Phrack!!!!1111 Whatever, nerds. Today, we're back to scheduled content. Like our friendly neighbourhood ransomware gangs and APT groups, we've continued to spend irrational amounts of time looking at critical enterprise-grade solutions - the ones that we think are made of the really good string. If you recall, in a previous adventure, we found vulnerabilities in Commvault that allowed us to turn Commvault's enter
Talos - Vulnerability Reports
Tenda AC6 V5.0 HTTP authentication bypass vulnerability
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
Talos - Vulnerability Reports
Tenda AC6 V5.0 Tenda App Router Authentication cleartext transmission vulnerability
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
Talos - Vulnerability Reports
Tenda AC6 V5.0 Firmware Signature Validation firmware update vulnerability
This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. You can email the...
Embrace The Red
Amazon Q Developer: Remote Code Execution with Prompt Injection
Amazon Q Developer Compromising Developer Machines
PortSwigger Research
James Kettle
Beware the false false-positive: how to distinguish HTTP pipelining from request smuggling
Sometimes people think they've found HTTP request smuggling, when they're actually just observing HTTP keep-alive or pipelining. This is usually a false positive, but sometimes there's actually a real
Doyensec's Blog
Trivial C# Random Exploitation
# Trivial C\# Random Exploitation 19 Aug 2025 - Posted by Dennis Goodlett Exploiting random number generators requires math, right? Thanks to C#’s `Random`, that is not necessarily the case! I ran into an HTTP 2.0 web service issuing password reset tokens from a custom encoding of `(new...
Embrace The Red
Amazon Q Developer: Secrets Leaked via DNS and Prompt Injection
Amazon Q Developer Leaking Sensitive Data To External Systems Via DNS Requests (no human in the loop)
GitHub
rcorrea35
OpenAI Operator - Click on arbitrary origin by TOCTOU attack
## Summary There is a delay between OpenAI Operator’s action prediction based on the screenshot and Operator’s actual action trigger. If timed correctly, an attacker can navigate or switch tabs be...
STAR Labs
STAR Labs SG
[Updates] Summer Pwnables
[Updates] Summer Pwnables 2025 Major Announcement: ISD Sponsorship We are pleased to announce that Internal Security Department (ISD) is sponsoring Summer Pwnables Challenge #0002 Challenge #003. Distribution Rule Challenge #002 and #003 are meant for Singaporean students. Each Singaporean student can only win once across all challenges to ensure broader community recognition. However, they can still submit their solutions in order to win the new “Grand Prize” Prizes are still $100 SGD + the “From Day Zero to Zero Day” book written by Eugene “Spaceraccoon” Lim for the first five solvers.
spaceraccoon.dev
Escaping the Matrix: Client-Side Deanonymization Attacks on Privacy Sandbox APIs
I recently presented at the DEF CON 33 Mainstage and the 12th Crypto & Privacy Village on weaknesses in implementations of Google’s Privacy Sandbox that subverted privacy protections and enabled deanonymization attacks.
Embrace The Red
Data Exfiltration via Image Rendering Fixed in Amp Code
AmpCode is vulnerable to Prompt Injection and it was possible to leak sensitive source code, environment variables and other information on the host
Embrace The Red
Amp Code: Invisible Prompt Injection Fixed by Sourcegraph
Sourcegraph recently fixed a vulnerability that allowed invisible instructions to perform prompt injection and hijack the agent.
watchTowr Labs
Should Security Solutions Be Secure? Maybe We're All Wrong - Fortinet FortiSIEM Pre-Auth Command Injection (CVE-2025-25256)
It’s Friday, but we’re here today with unscheduled content - pushing our previously scheduled shenanigans to next week. Fortinet is no stranger to the watchTowr Labs research team. Today we’re looking at CVE-2025-25256 - a pre-authentication command injection in FortiSIEM that lets an attacker compromise an organization’s SIEM (!!!). FortiSIEM is Fortinet’s enterprise-grade SIEM - think real-time event correlation, UEBA-style analytics, an auto-populating CMDB, built-in SOAR, and enough scale
Embrace The Red
Google Jules is Vulnerable To Invisible Prompt Injection
Jules is vulnerable to Prompt Injection from invisible instructions in untrusted data, which can end up running arbitrary operating system commands via the run_in_bash_session tool