Pre-authentication SQL injection to RCE in GLPI (CVE-2025-24799/CVE-2025-24801) #GLPI #SQLinjection #RCE #webexploitation #cybersecurity https://blog.lexfo.fr/glpi-sql-to-rce.html
blog.lexfo.fr
Pre-authentication SQL injection to RCE in GLPI (CVE-2025-24799/CVE-2025-24801)
<p>Exploitation of multiple vulnerabilities in GLPI to gain remote code execution from unauthenticated privileges.</p>
Modus Operandi of Ruthless Mantis https://catalyst.prodaft.com/public/report/modus-operandi-of-ruthless-mantis/overview
Smart male chastity lock cock-up #SmartMaleChastityLock #PenTestPartners #SecurityConsulting #VulnerabilityDisclosure #IoTSecurity https://www.pentestpartners.com/security-blog/smart-male-chastity-lock-cock-up/
Pen Test Partners
Smart male chastity lock cock-up | Pen Test Partners
TL;DR Smart Bluetooth male chastity lock, designed for user to give remote control to a trusted 3rd party using mobile app/API Multiple API flaws meant anyone could remotely lock all devices and prevent users from releasing themselves Removal then requires…
Fake Reddit and WeTransfer pages are spreading stealer malware #FakeReddit #WeTransfer #StealerMalware #CybersecurityThreats #LummaStealer https://moonlock.com/fake-reddit-wetransfer-lumma-stealer
Moonlock
Fake Reddit and WeTransfer pages are spreading malware
Lumma Stealer and AMOS are used in the campaign.
Memory Corruption in Delphi #DelphiMemoryCorruption #MemorySafety #ProgrammingVulnerabilities #SecureCode #IncludeSecurityBlog https://blog.includesecurity.com/2025/03/memory-corruption-in-delphi/
Include Security Research Blog
Memory Corruption in Delphi - Include Security Research Blog
In our team's latest blog post, we build a few examples that showcase ways in which memory corruption vulnerabilities could manifest in Delphi code despite being included in a list of "memory safe" languages within a paper published by the NSA. We cover how…
👍1
Decrypting Encrypted files from Akira Ransomware (Linux/ESXI variant 2024) using a bunch of GPUs #DecryptingAkiraRansomware #GPUbruteforce #ReverseEngineering #FileEncryption #ESXIdatarecovery https://tinyhack.com/2025/03/13/decrypting-encrypted-files-from-akira-ransomware-linux-esxi-variant-2024-using-a-bunch-of-gpus/
Tinyhack.com
Decrypting Encrypted files from Akira Ransomware (Linux/ESXI variant 2024) using a bunch of GPUs
I recently helped a company recover their data from the Akira ransomware without paying the ransom. I'm sharing how I did it, along with the full source code.
Update: since this article was written, a new version of Akira ransomware has appeared that…
Update: since this article was written, a new version of Akira ransomware has appeared that…
Android Kernel Adventures: Insights into Compilation, Customization and Application Analysis #AndroidKernel #Compilation #Customization #ApplicationAnalysis #SecurityAnalysis https://revflash.medium.com/android-kernel-adventures-insights-into-compilation-customization-and-application-analysis-d20af6f2080a
Medium
Android Kernel Adventures: Insights into Compilation, Customization and Application Analysis
This article marks the first in a series aimed at sharing my adventures, personal notes, and insights into the Android kernel. My focus…
History of NULL Pointer Dereferences on macOS #macOSHistory #AFINE #SecureDigital #NULLPointer #exploitmitigations https://afine.com/history-of-null-pointer-dereferences-on-macos/
AFINE - digitally secure
NULL Pointer Dereference on macOS: Exploitation History - AFINE - digitally secure
Technical analysis of NULL Pointer Dereference bugs, mitigations, and exploit development challenges on Apple Silicon macOS.
CVE-2025-24016: Unsafe Deserialization Vulnerability in Wazuh Leading to Remote Code Execution #WazuhCVE #RCEvulnerability #UnsafeDeserialization #RemoteCodeExecution #PatchAnalysis https://cvereports.com/cve-2025-24016-unsafe-deserialization-vulnerability-in-wazuh-leading-to-remote-code-execution/
!exploitable Episode Three - Devfile Adventures #Doyensec #DevfileAdventures #ArbitraryFileWrite #CVE2024-0402 #ExploitableEpisode https://blog.doyensec.com/2025/03/18/exploitable-gitlab.html
Doyensec
!exploitable Episode Three - Devfile Adventures
I know, we have written it multiple times now, but in case you are just tuning in, Doyensec had found themselves on a cruise ship touring the Mediterranean for our company retreat. To kill time between parties, we had some hacking sessions analyzing real…
SSD Advisory – Linux kernel hfsplus slab-out-of-bounds Write #LinuxKernel #Vulnerabilities #FileSystems https://ssd-disclosure.com/ssd-advisory-linux-kernel-hfsplus-slab-out-of-bounds-write/
SSD Secure Disclosure
SSD Advisory - Linux kernel hfsplus slab-out-of-bounds Write - SSD Secure Disclosure
Summary This advisory describes an out-of-bounds write vulnerability in the Linux kernel that achieves local privilege escalation on Ubuntu 22.04 for active user sessions. Credit An independent security researcher working with SSD Secure Disclosure. Vendor…
CEF Debugger Enabled in Google Web Designer #CEFDebugger #GoogleWebDesigner #BugHunters #WebDevelopment #Debugging https://bughunters.google.com/reports/vrp/qMhY4nw9i
Google
CEF Debugger Enabled in Google Web Designer | Google Bug Hunters
Found a security vulnerability? Discover our forms for reporting security issues to Google: for the standard VRP, Google Play, and Play Data Abuse.
Local Privilege Escalation via Unquoted Search Path in Plantronics Hub #PlantronicsHub #PrivilegeEscalation #Vulnerability #CyberSecurity #8com https://www.8com.de/cyber-security-blog/local-privilege-escalation-via-unquoted-search-path-in-plantronics-hub
www.8com.de
Privilege Escalation in Plantronics Hub
Local Privilege Escalation via Unquoted Search Path in Plantronics Hub through OpenScape
SAML roulette: the hacker always wins #SAMLroulette #HackersWin #RoundTripAttacks #NamespaceConfusion #UnauthenticatedAdminAccess https://portswigger.net/research/saml-roulette-the-hacker-always-wins
PortSwigger Research
SAML roulette: the hacker always wins
Introduction In this post, we’ll show precisely how to chain round-trip attacks and namespace confusion to achieve unauthenticated admin access on GitLab Enterprise by exploiting the ruby-saml library
Supply Chain Attacks on Linux distributions - Overview #linux #opensource #supplychain #security #infrastructure https://fenrisk.com/supply-chain-attacks
Fenrisk
Supply Chain Attacks on Linux distributions - Overview
Security experts
By Executive Order, We Are Banning Blacklists - Domain-Level RCE in Veeam Backup & Replication (CVE-2025-23120) #ExecutiveOrder #BanningBlacklists #VeeamReplication #CVE202523120 #RCEVulnerabilities https://labs.watchtowr.com/by-executive-order-we-are-banning-blacklists-domain-level-rce-in-veeam-backup-replication-cve-2025-23120/
watchTowr Labs
By Executive Order, We Are Banning Blacklists - Domain-Level RCE in Veeam Backup & Replication (CVE-2025-23120)
It’s us again!
Once again, we hear the collective groans - but we're back and with yet another merciless pwnage of an inspired and clearly comprehensive RCE solution - no, wait, it's another vuln in yet another backup and replication solution..
While we…
Once again, we hear the collective groans - but we're back and with yet another merciless pwnage of an inspired and clearly comprehensive RCE solution - no, wait, it's another vuln in yet another backup and replication solution..
While we…
The Problem With Browser Bookmark Security #BrowserBookmarkSecurity #UnencryptedBookmarks #CybersecurityThreats #DataPrivacy #GDPRCCPACompliance https://webcull.com/blog/2025/03/the-problems-with-browser-bookmark-security
WebCull
The Problem With Browser Bookmark Security - WebCull Blog
Web browsers store bookmarks in plain text, making them vulnerable to malware, unauthorized access, profiling, and potential regulatory risks.
Doing the Due Diligence: Analyzing the Next.js Middleware Bypass (CVE-2025-29927) #Next.jsVulnerability #MiddlewareBypass #CVE202529927 #SecurityResearch #DueDiligence https://slcyber.io/assetnote-security-research-center/doing-the-due-diligence-analysing-the-next-js-middleware-bypass-cve-2025-29927/
Searchlight Cyber
Analyzing Next.js Middleware Bypass (CVE-2025-29927) | SearchlightCyber
This critical vulnerability allowed attackers to bypass authentication implemented in the middleware layer. With the popularity of this framework on the internet and within our customers' attack surfaces, our Security Research team took a deeper look at the…
Bypassing Detections with Command-Line Obfuscation #CommandLineObfuscation #BypassingDetections #ArgFuscator #Windows #LinuxMACOS https://www.wietzebeukema.nl/blog/bypassing-detections-with-command-line-obfuscation
www.wietzebeukema.nl
Bypassing Detections with Command-Line Obfuscation
Defensive tools like AVs and EDRs rely on command-line arguments for detecting malicious activity. This post demonstrates how command-line obfuscation, a shell-independent technique that exploits executables’ parsing “flaws”, can bypass such detections. It…