InfoSec Planet
A collection of diverse security content from a curated list of sources. This website also serves as a demo for "worker-planet", the software that powers it.
Is “Hackback” Official US Cybersecurity Strategy?
on 01/04/2026
The 2026 US “Cyber Strategy for America” document is mostly the same thing we’ve seen out of the White House for over a decade, but with a more aggressive tone.
But one sentence stood out: “We will unleash the private sector by creating incentives to identify and disrupt adversary networks and scale our national capabilities.” This sounds like a call for hackback: giv [...]
See full content
Mutation testing for the agentic era
on 01/04/2026
Code coverage is one of the most dangerous quality metrics in software testing. Many developers fail to realize that code coverage lies by omission: it measures execution, not verification. Test suites with high coverage can obfuscate the fact that critical functionality is untested as software develops over time. We saw this when mutation testing uncovered a high-severity Arkis protocol vulnerabi [...]
See full content
A Taxonomy of Cognitive Security
on 01/04/2026
Last week, I listened to a fascinating talk by K. Melton on cognitive security, cognitive hacking, and reality pentesting. The slides from the talk are here, but—even better—Menton has a long essay laying out the basic concepts and ideas.
The whole thing is important and well worth reading, and I hesitate to excerpt. Here’s a taste:
The NeuroCompiler is where raw sensory data get [...]
See full content
BugQuest 2026: 31 Days of Broken Access Control
by Ayoub on 01/04/2026
In March 2026, we ran BugQuest, a 31-day campaign covering everything you need to know about finding and exploiting broken access control vulnerabilities. From understanding the basics of authentication and authorization to spotting subtle authorization bypasses in real code, we broke down one of the most critical vulnerability classes in modern web applications.
Broken access controls have consis [...]
See full content
Bypassing Strict SSH Server Verification via Connection Pool Reuse in libcurl
on 31/03/2026
curl disclosed a bug submitted by whitehat411: https://hackerone.com/reports/3639277 [...]
See full content
Use-After-Free race condition in url_move_hostname() via shared connection pool
on 31/03/2026
curl disclosed a bug submitted by h3xb1tx: https://hackerone.com/reports/3638715 [...]
See full content
VRP 2025 Year in Review
on 31/03/2026
Posted by Dirk Göhmann, Tony Mendez, and the Vulnerability Rewards Program Team2025 marked a special year in the history of vulnerability rewards and bug bounty programs at Google: our 15th anniversary 🎉🎉🎉! Originally started in 2010, our vulnerability reward program (VRP) has seen constant additions and expansions over the past decade and a half, clearly indicating the value the programs under [...]
See full content
DLL side-loading vulnerability in Sony Music Center for PC Ver. 2.7.2 (Latest version)
on 31/03/2026
Sony disclosed a bug submitted by resurrect20: https://hackerone.com/reports/3355766 [...]
See full content
Unauthenticated SSRF via Public Reference API -Sharing Token Bypass
on 31/03/2026
Nextcloud disclosed a bug submitted by eclipse07077: https://hackerone.com/reports/3479692 [...]
See full content
Inventors of Quantum Cryptography Win Turing Award
on 31/03/2026
Charles Bennett and Gilles Brassard have won the 2026 Turing Award for inventing quantum cryptography.
I am incredibly pleased to see them get this recognition. I have always thought the technology to be fantastic, even though I think it’s largely unnecessary. I wrote up my thoughts back in 2008, in an essay titled “Quantum Cryptography: As Awesome As It Is Pointless.”
Back then, [...]
See full content
How we made Trail of Bits AI-native (so far)
on 31/03/2026
This post is adapted from a talk I gave at [un]prompted, the AI security practitioner conference. Thanks to Gadi Evron for inviting me to speak. You can watch the recorded presentation below or download the slides.
Most companies hand out ChatGPT licenses and wait for the productivity numbers to move. We built a system instead.
A year ago, about 5% of Trail of Bits was on board with our AI initiat [...]
See full content
HackerOne Vulnerability Report: libcurl SSL/TLS Identity Leakage via Insecure Connection Reuse
on 31/03/2026
curl disclosed a bug submitted by ankitsingh131225: https://hackerone.com/reports/3636244 [...]
See full content
HTTP/2 PUSH_PROMISE header loss on OOM bypasses scheme validation (regression of 2e8c922a89)
on 31/03/2026
curl disclosed a bug submitted by m42kl33: https://hackerone.com/reports/3636044 [...]
See full content
Unbounded GZIP Decompression Leading to Event-Loop Starvation
on 31/03/2026
curl disclosed a bug submitted by ok3y: https://hackerone.com/reports/3632427 [...]
See full content
SSRF Filter Bypass via Unblocked NAT64 Local-Use IPv6 Prefix (64:ff9b:1::/48)
on 31/03/2026
arkadiyt-projects disclosed a bug submitted by tipsen: https://hackerone.com/reports/3634400 [...]
See full content
Path Traversal in writeFile via Unsafe Prefix Containment Check Allows Out-of-Directory Writes
on 31/03/2026
arkadiyt-projects disclosed a bug submitted by tipsen: https://hackerone.com/reports/3634571 [...]
See full content
Compromised axios npm package delivers cross-platform RAT
on 31/03/2026
An attacker hijacked an axios maintainer's npm account to publish malicious releases that deliver a cross-platform RAT. [...]
See full content
HashDoS in V8
on 30/03/2026
Node.js disclosed a bug submitted by sharp_edged: https://hackerone.com/reports/3511792 [...]
See full content
Permission Model Bypass in realpathSync.native Allows File Existence Disclosure
on 30/03/2026
Node.js disclosed a bug submitted by stif: https://hackerone.com/reports/3480841 [...]
See full content
Timing side-channel in HMAC verification via memcmp() in crypto_hmac.cc leads to potential MAC forgery
on 30/03/2026
Node.js disclosed a bug submitted by x_probe: https://hackerone.com/reports/3533945 [...]
See full content
Node.js Permission Model bypass: UDS server bind/listen works without `--allow-net`
on 30/03/2026
Node.js disclosed a bug submitted by xavlimsg: https://hackerone.com/reports/3559715 [...]
See full content
Denial of Service via `__proto__` header name in `req.headersDistinct` (Uncaught `TypeError` crashes Node.js process)
on 30/03/2026
Node.js disclosed a bug submitted by yushengchen: https://hackerone.com/reports/3560402 [...]
See full content
CVE-2024-36137 Patch Bypass - FileHandle.chmod/chown
on 30/03/2026
Node.js disclosed a bug submitted by wooseokdotkim: https://hackerone.com/reports/3449392 [...]
See full content
Memory leak in Node.js HTTP/2 server via WINDOW_UPDATE on stream 0 leads to resource exhaustion
on 30/03/2026
Node.js disclosed a bug submitted by galbarnahum: https://hackerone.com/reports/3531737 [...]
See full content
CISO Spotlight: Dimitris Georgiou on Building Security that Serves People First
by Tim Erlin on 30/03/2026
Dimitris Georgiou has been a self-professed computer geek since the early 80s. At university, he studied the convergence of educational technology with computer science as part of his psychology MA – finding, to his disbelief, that systems were perilously insecure.
Since then, he’s always worked in and around cybersecurity. He’s had roles as a computer science teacher, a technology manager, a [...]
See full content
Apple’s Camera Indicator Lights
on 30/03/2026
A thoughtful review of Apple’s system to alert users that the camera is on. It’s really well-designed, and important in a world where malware could surreptitiously start recording.
The reason it’s tempting to think that a dedicated camera indicator light is more secure than an on-display indicator is the fact that hardware is generally more secure than software, because it’ [...]
See full content
CRLF Injection in HAProxy PROXY Protocol via CURLOPT_HAPROXY_CLIENT_IP allows IP spoofing and protocol injection
on 30/03/2026
curl disclosed a bug submitted by sakthi02_sk: https://hackerone.com/reports/3633534 [...]
See full content
HTTP/2 server push accepts a non-authoritative :scheme=https over cleartext h2c, enabling HTTPS cache-key poisoning
on 29/03/2026
curl disclosed a bug submitted by xkiluar: https://hackerone.com/reports/3630310 [...]
See full content
Friday Squid Blogging: Bioluminescent Bacteria in Squid
on 27/03/2026
The Hawaiian bobtail squid has bioluminescent bacteria.
[...]
See full content
Password Strength Policy Bypass via Server-Side Validation Flaw
on 27/03/2026
Tucows (VDP) disclosed a bug submitted by 2026: https://hackerone.com/reports/3523703 [...]
See full content
Potential DoS due to PasswordPoliciesNotMet in errors.go
on 27/03/2026
passhash disclosed a bug submitted by sinic: https://hackerone.com/reports/2441029 [...]
See full content
Missing policies for password in password_policies.go
on 27/03/2026
passhash disclosed a bug submitted by sinic: https://hackerone.com/reports/2439734 [...]
See full content
Intigriti Bug Bytes #234 - March 2026 🚀
by Ayoub on 27/03/2026
Hello hackers,
Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring:
Earning $180K via SSRFs
Free Burp Suite Pro licenses for top hackers
Bypassing tricky file upload restrictions
Injecting malicious code into AI coding assistants
And so much more! Let’s dive in!
New: PortSwigger collaboration with Intigriti
We've teamed up with PortSwigger to reward high-p [...]
See full content
Unpatchable Vulnerabilities of Kubernetes: CVE-2020-8561
on 27/03/2026
A look at how Kubernetes CVE-2020-8561 works [...]
See full content
Assertion error in node_url.cc via malformed URL format leads to Node.js crash
on 26/03/2026
Node.js disclosed a bug submitted by rafaelgss: https://hackerone.com/reports/3546390 [...]
See full content
As the US Midterms Approach, AI Is Going to Emerge as a Key Issue Concerning Voters
on 26/03/2026
In December, the Trump administration signed an executive order that neutered states’ ability to regulate AI by ordering his administration to both sue and withhold funds from states that try to do so. This action pointedly supported industry lobbyists keen to avoid any constraints and consequences on their deployment of AI, while undermining the efforts of consumers, advocates, and industry [...]
See full content
Server-side ReDoS via user-controlled regex in OIDC Access Policy
on 26/03/2026
RubyGems disclosed a bug submitted by 6b_jjj: https://hackerone.com/reports/3542546 [...]
See full content
Bearer Token Leaked to Attacker via .netrc Despite CVE-2026-3783 Fix
on 26/03/2026
curl disclosed a bug submitted by wizard021: https://hackerone.com/reports/3611825 [...]
See full content
Security Vulnerability Report: Protocol Injection via Programmatic Options
on 26/03/2026
curl disclosed a bug submitted by ankitsingh_76: https://hackerone.com/reports/3627638 [...]
See full content
HTTP/1.1 Response Desynchronization via conflicting CL/TE headers in Proxy CONNECT
on 25/03/2026
curl disclosed a bug submitted by 3lcarry: https://hackerone.com/reports/3623064 [...]
See full content
Security for the Quantum Era: Implementing Post-Quantum Cryptography in Android
on 25/03/2026
Posted by Eric Lynch, Product Manager, Android and Dom Elliott, Group Product Manager, Google Play
Modern digital security is at a turning point. We are on the threshold of using quantum computers to solve "impossible" problems in drug discovery, materials science, and energy—tasks that even the most powerful classical supercomputers cannot handle. However, the same unique ability to consider di [...]
See full content
Sen. Wyden Warns of Another Section 702 Abuse
on 25/03/2026
Sen. Ron Wyden is warning us of an abuse of Section 702:
Wyden took to the Senate floor to deliver a lengthy speech, ostensibly about the since approved (with support of many Democrats) nomination of Joshua Rudd to lead the NSA. Wyden was protesting that nomination, but in the context of Rudd being unwilling to agree to basic constitutional limitations on NSA surveillance. But that’s just a [...]
See full content
Try our new dimensional analysis Claude plugin
on 25/03/2026
We’re releasing a new Claude plugin for developing and auditing code that implements dimensional analysis, a technique we explored in our most recent blog post. Most LLM-based security skills ask the model to find bugs. Our new dimensional-analysis plugin for Claude Code takes a different approach: it uses the LLM to annotate your codebase with dimensional types, then flags mismatches mechanically [...]
See full content
Function `do_pubkey()` can have out-of-bound read issue
on 25/03/2026
curl disclosed a bug submitted by tynus: https://hackerone.com/reports/3617719 [...]
See full content
Intigriti 0326 CTF Challenge: Chaining DOM clobbering and CSP bypasses for XSS
by Ayoub on 25/03/2026
At Intigriti, we host monthly web-based Capture The Flag (CTF) challenges as a way to engage with the security researcher community. This month's challenge, brought forward by Kulindu, presented us with a Secure Search Portal that, on the surface, appeared to be well protected. A strict Content Security Policy and DOMPurify sanitization gave the impression that this month's task of executing an XS [...]
See full content
Potential Subdomain Takeover on IBM.com domain.
on 24/03/2026
IBM disclosed a bug submitted by bugmithalchemist: https://hackerone.com/reports/3592387 [...]
See full content
Team Mirai and Democracy
on 24/03/2026
Japan’s election last month and the rise of the country’s newest and most innovative political party, Team Mirai, illustrates the viability of a different way to do politics.
In this model, technology is used to make democratic processes stronger, instead of undermining them. It is harnessed to root out corruption, instead of serving as a cash cow for campaign donations.
Imagine an election where [...]
See full content
Spotting issues in DeFi with dimensional analysis
on 24/03/2026
Using dimensional analysis, you can categorically rule out a whole category of logic and arithmetic bugs that plague DeFi formulas. No code changes required, just better reasoning!
One of the first lessons in physics is learning to think in terms of dimensions. Physicists can often spot a flawed formula in seconds just by checking whether the dimensions make sense. I once had a teacher who even ke [...]
See full content
Access to Deactivated LinkedIn Company Pages via Competitor Analytics API
on 24/03/2026
LinkedIn disclosed a bug submitted by riadalrashed: https://hackerone.com/reports/3604288 [...]
See full content
Vulnerability disclosure for AI safeguards. How open should programs be and what incentives are necessary?
by Ed Parsons on 24/03/2026
What you will learn
How vulnerability disclosure applies specifically to AI safeguards and systems.
The pros and cons of making AI disclosure programs more open/restricted.
The kinds of incentives that motivate researchers.
Which disclosure program structures can help organizations improve their AI security.
In a recent NCSC blog post on adapting vulnerability disclosure for AI safeguards, [...]
See full content
LiteLLM and Telnyx compromised on PyPI: Tracing the TeamPCP supply chain campaign
on 24/03/2026
On March 24 and 27, 2026, malicious PyPI releases of LiteLLM and Telnyx were published as part of the TeamPCP supply chain campaign. We trace the full campaign from Trivy through npm, Checkmarx, and into PyPI. [...]
See full content
‘CanisterWorm’ Springs Wiper Attack Targeting Iran
by BrianKrebs on 23/03/2026
A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Iran’s time zone or have Farsi set as the default language.
Experts say the wiper campaign against Iran materialized this past weekend and came from a relatively new cybercrime [...]
See full content
Microsoft Xbox One Hacked
on 23/03/2026
It’s an impressive feat, over a decade after the box was released:
Since reset glitching wasn’t possible, Gaasedelen thought some voltage glitching could do the trick. So, instead of tinkering with the system rest pin(s) the hacker targeted the momentary collapse of the CPU voltage rail. This was quite a feat, as Gaasedelen couldn’t ‘see’ into the Xbox One, so had to [...]
See full content
Friday Squid Blogging: Jumbo Flying Squid in the South Pacific
on 20/03/2026
The population needs better conservation.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Blog moderation policy.
[...]
See full content
Fail-Open in set_tlsext_servername_callback on pyopenssl via unhandled exceptions leads to security bypass
on 20/03/2026
Python Cryptographic Authority disclosed a bug submitted by uv3doble: https://hackerone.com/reports/3558277 [...]
See full content
[Privilege Escalation] User can Pin|Unpin Any Comment on Any Project or Locale
on 20/03/2026
Mozilla disclosed a bug submitted by adilnbabras: https://hackerone.com/reports/3025797 [...]
See full content
Exposed .git/config File Leading to Potential Sensitive Information Disclosure
on 20/03/2026
curl disclosed a bug submitted by zoroo2: https://hackerone.com/reports/3612891 [...]
See full content
Feds Disrupt IoT Botnets Behind Huge DDoS Attacks
by BrianKrebs on 20/03/2026
The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million Internet of Things (IoT) devices, such as routers and web cameras. The feds say the four botnets — named Aisuru, Kimwolf, JackSkid and Mossad — are responsible for a series of recent record-smashing [...]
See full content
Exploiting broken access control vulnerabilities
by Ayoub on 20/03/2026
Broken access control vulnerabilities have consistently remained at the top of the OWASP Top 10, and for a good reason. As web applications continue to grow in complexity, with the introduction of role-based access controls, multi-tenant support, and granular permission models, the likelihood of access control flaws increases significantly.
Unlike other vulnerability classes that often rely on ins [...]
See full content
Add labels to arbitrary issues/prs & compromise github actions label checks
on 19/03/2026
GitHub disclosed a bug submitted by ahacker1: https://hackerone.com/reports/3527771 [...]
See full content
PATs without the required scope can leak issues
on 19/03/2026
GitHub disclosed a bug submitted by s3rdz0: https://hackerone.com/reports/3522254 [...]
See full content
Lack of Validation in Reward Redemption Allows Unlimited Burp Suite License Abuse
on 18/03/2026
HackerOne disclosed a bug submitted by theokeen: https://hackerone.com/reports/3378540 [...]
See full content
HSTS accepted from HTTP origin behind HTTPS proxy
on 17/03/2026
curl disclosed a bug submitted by lg_oled77c5pua: https://hackerone.com/reports/3609505 [...]
See full content
Unescaped username in SASL DIGEST-MD5 response allows injection
on 17/03/2026
curl disclosed a bug submitted by am-perip: https://hackerone.com/reports/3608522 [...]
See full content
Session Cookie Leakage via Static Header Field in WebViewerFragment
on 17/03/2026
LinkedIn disclosed a bug submitted by dphoeniixx: https://hackerone.com/reports/3475626 [...]
See full content
Business Logic Bypass Allows Setting Read Access Role Without Pro Plan Subscription
on 16/03/2026
Lovable VDP disclosed a bug submitted by ziadmomen: https://hackerone.com/reports/3591764 [...]
See full content
SMB READ_ANDX DataOffset not validated
on 16/03/2026
curl disclosed a bug submitted by tavro: https://hackerone.com/reports/3603300 [...]
See full content
Unauthenticated access to private files on app.fizzy.do via Active Storage URLs leads to information disclosure
on 16/03/2026
Basecamp disclosed a bug submitted by perxibes: https://hackerone.com/reports/3467641 - Bounty: $100 [...]
See full content
HTTP/1.1 Must Die: Conquering the 0.CL Challenge
on 13/03/2026
Note: This is a guest post by pentester Julen Garrido Estévez (@b3xal). 1. Acknowledgements 2. Intro 3. Required tools 4. Strategy to solve/exploit the lab 5. Detecting 0.CL 5.1. Practical confirmatio [...]
See full content
Authorization Bypass in Starknet Snap via enableAuthorize parameter leads to unauthorized transaction signing
on 13/03/2026
Consensys disclosed a bug submitted by aszx87410: https://hackerone.com/reports/3507241 [...]
See full content
SQL Injection vulnerability found on ibm.com endpoint
on 12/03/2026
IBM disclosed a bug submitted by cr3ckerxploit: https://hackerone.com/reports/3578842 [...]
See full content
Curl_compareheader() fails to match multi-value HTTP headers
on 12/03/2026
curl disclosed a bug submitted by henriqueg: https://hackerone.com/reports/3598444 [...]
See full content
urlapi: off-by-one in custom scheme validation skips last character
on 12/03/2026
curl disclosed a bug submitted by otiscui: https://hackerone.com/reports/3598358 [...]
See full content
Automation without alignment: The hidden cost of modern DAST
on 12/03/2026
Register for the webinar: Burp Suite DAST x Burp Suite Professional: Better Together (Thursday, March 19 2026 16:00 UTC) I'm a firm believer that if you want to understand how secure an application re [...]
See full content
The CISO’s Dilemma: How To Scale AI Securely
by Tim Erlin on 12/03/2026
Your board wants AI. Your developers are building with it. Your budget committee is asking for an ROI timeline. But as CISO, you're the one who has to answer when the inevitable question comes up: "How do we know this is secure?"
If you're like most security leaders, you're caught between two impossible positions. Say yes to AI initiatives without proper security controls, and you're responsib [...]
See full content
Bypass of Open Redirect Fix on lovable.dev via /..// Path Traversal in redirect parameter
on 12/03/2026
Lovable VDP disclosed a bug submitted by marioniangi: https://hackerone.com/reports/3599248 [...]
See full content
Hacking with permission: the rules that make it ethical
by Eleanor Barlow on 12/03/2026
Ethical hacking, often via Bug Bounty Programs or VDPs, operates within defined frameworks. These include a community Code of Conduct (CoC), setting program Rules of Engagement (RoE), and clarifying platform Terms of Service (ToS). Companies that invest in proactive security need to understand what these terms mean and the function they play in maintaining a secure and compliant program.
The chall [...]
See full content
NULL Pointer Dereference (DoS) in libcurl SFTP QUOTE command parsing due to missing return statement
on 11/03/2026
curl disclosed a bug submitted by m777m0: https://hackerone.com/reports/3597359 [...]
See full content
Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
by BrianKrebs on 11/03/2026
A hacktivist group with links to Iran’s intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker’s largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker’s main U. [...]
See full content
Agent-to-Agent Attacks Are Coming: What API Security Teaches Us About Securing AI Systems
by Tim Erlin on 11/03/2026
AI systems are no longer just isolated models responding to human prompts.
In modern production environments, they are increasingly chained together – delegating tasks, calling tools, and coordinating decisions with limited or no human oversight. Almost all that communication happens through APIs.
This shift offers enormous productivity benefits. But it has also complicated secu [...]
See full content
Six mistakes in ERC-4337 smart accounts
on 11/03/2026
Account abstraction transforms fixed “private key can do anything” models into programmable systems that enable batching, recovery and spending limits, and flexible gas payment. But that programmability introduces risks: a single bug can be as catastrophic as leaking a private key.
After auditing dozens of ERC‑4337 smart accounts, we’ve identified six vulnerability patterns that frequently appear. [...]
See full content
PortSwigger X Intigriti: Burp Suite Professional licenses up for grabs with this new collaboration
on 11/03/2026
At PortSwigger, we’re always looking for ways to enable the world to secure the web, and today we’re excited to take that mission a step further. We’re pleased to announce a new collaboration bringing [...]
See full content
CVE-2026-3805: use after free in SMB connection reuse
on 11/03/2026
curl disclosed a bug submitted by rat5ak: https://hackerone.com/reports/3591944 [...]
See full content
CVE-2026-3784: wrong proxy connection reuse with credentials
on 11/03/2026
curl disclosed a bug submitted by nobcoder: https://hackerone.com/reports/3584903 [...]
See full content
CVE-2026-3783: token leak with redirect and netrc
on 11/03/2026
curl disclosed a bug submitted by spectreglobalsec: https://hackerone.com/reports/3583983 [...]
See full content
Microsoft Patch Tuesday, March 2026 Edition
by BrianKrebs on 11/03/2026
Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressing “zero-day” flaws this month (compared to February’s five zero-day treat), but as usual some patches may deserve more rapid attention from organizations using Windows. Here are a few highlights from this month’s Patch Tue [...]
See full content
Intigriti collaborates with PortSwigger to support ethical hacking excellence
by Eleanor Barlow on 11/03/2026
Intigriti and PortSwigger collaborate to reward hard-working hackers
Best known as the creator of Burp Suite, the industry-standard toolkit for manual web application security testing, PortSwigger is a UK-based cybersecurity company on a mission to help the world secure the web.
Today, their tools are trusted by over 20,000 organizations worldwide to detect and prevent cyber threats. To further su [...]
See full content
Connection Reuse Ignores OAuth Bearer Token Mismatch
on 10/03/2026
curl disclosed a bug submitted by sabari_n: https://hackerone.com/reports/3595753 [...]
See full content
CURLOPT_UNRESTRICTED_AUTH Dangerous Default Documentation Gap
on 10/03/2026
curl disclosed a bug submitted by sabari_n: https://hackerone.com/reports/3595764 [...]
See full content
Uncovering agent logging gaps in Copilot Studio
on 10/03/2026
During research, we sometimes encounter scenarios that remind us that it's a good idea to trust but verify. In September 2025, we noticed that certain Microsoft Copilot Studio agent settings did not log certain administrative actions related to sharing, authentication, logging, and publication of Copilot Studio agents. [...]
See full content
Arbitrary Code Execution via Scanner Bypass in **aws-diagram-mcp-server** `exec()` Namespace
on 09/03/2026
AWS VDP disclosed a bug submitted by locus-x64: https://hackerone.com/reports/3557138 [...]
See full content
Users can change project visibility which requires high subscription by just changing request body
on 09/03/2026
Lovable VDP disclosed a bug submitted by hossam25: https://hackerone.com/reports/3370430 [...]
See full content
LM Challenge-Response Hash Always Sent in SMB Authentication
on 09/03/2026
curl disclosed a bug submitted by brewm4ster: https://hackerone.com/reports/3584491 [...]
See full content
Behind the console: Active phishing campaign targeting AWS console credentials
on 09/03/2026
Datadog Security Research identified an active adversary-in-the-middle (AiTM) phishing campaign targeting AWS Console credentials via typosquatted domains that mimic AWS infrastructure. [...]
See full content
How AI Assistants are Moving the Security Goalposts
by BrianKrebs on 08/03/2026
AI-based assistants or “agents” — autonomous programs that have access to the user’s computer, files, online services and can automate virtually any task — are growing in popularity with developers and IT workers. But as so many eyebrow-raising headlines over the past few weeks have shown, these powerful and assertive new tools are rapidly shifting the security priori [...]
See full content
In curl's SASL OAUTHBEARER authentication, including the SOH character (0x01) in the username corrupts the message structure.
on 08/03/2026
curl disclosed a bug submitted by y_security: https://hackerone.com/reports/3584865 [...]
See full content
Injection in path parameter of Ingress-nginx
on 07/03/2026
Kubernetes disclosed a bug submitted by fisjkars: https://hackerone.com/reports/2701701 [...]
See full content
IDOR to make someone attend or leave an event
on 06/03/2026
LinkedIn disclosed a bug submitted by safehacker_2715: https://hackerone.com/reports/1734639 [...]
See full content
Blocking a company page admin prevents him from delete paid media admin or edit his roles
on 05/03/2026
LinkedIn disclosed a bug submitted by riadalrashed: https://hackerone.com/reports/2339192 [...]
See full content
Open Redirect on lovable.dev via redirect parameter leads to phishing attacks
on 05/03/2026
Lovable VDP disclosed a bug submitted by jdc94: https://hackerone.com/reports/3581815 [...]
See full content