InfoSec Planet

A collection of diverse security content from a curated list of sources. This website also serves as a demo for "worker-planet", the software that powers it.

Cybersecurity in the Age of Instant Software

on 07/04/2026

AI is rapidly changing how software is written, deployed, and used. Trends point to a future where AIs can write custom software quickly and easily: “instant software.” Taken to an extreme, it might become easier for a user to have an AI write an application on demand—a spreadsheet, for example—and delete it when you’re done using it than to buy one commercially. Future systems could i [...]

See full content

Russia Hacked Routers to Steal Microsoft Office Tokens

by BrianKrebs on 07/04/2026

Hackers linked to Russia’s military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign allowed state-backed Russian hackers to quietly siphon authentication tokens from users on more than 18,000 networks without deploying any malicious software or code. Micros [...]

See full content

Health check errors silently dropped when channel buffer full

on 07/04/2026

AWS VDP disclosed a bug submitted by misop00p: https://hackerone.com/reports/3620761 [...]

See full content

IDOR on via direct photo URL leads to unauthorized access to deleted and other users' photos

on 07/04/2026

Nextcloud disclosed a bug submitted by shiva2550: https://hackerone.com/reports/3518758 [...]

See full content

PortSwigger partners with Meta Bug Bounty to empower bug hunters with training and Pro licenses

on 07/04/2026

More power for bug hunters An education-first approach to bug bounty Rewards on Meta's Bug Bounty Platform Our shared vision Ready to get started? We’re excited to announce a new partnership with Meta [...]

See full content

What we learned about TEE security from auditing WhatsApp's Private Inference

on 07/04/2026

WhatsApp’s new “Private Inference” feature represents one of the most ambitious attempts to combine end-to-end encryption with AI-powered capabilities, such as message summarization. To make this possible, Meta built a system that processes encrypted user messages inside trusted execution environments (TEEs), secure hardware enclaves designed so that not even Meta can access the plaintext. Our now [...]

See full content

Hong Kong Police Can Force You to Reveal Your Encryption Keys

on 07/04/2026

According to a new law, the Hong Kong police can demand that you reveal the encryption keys protecting your computer, phone, hard drives, etc.—even if you are just transiting the airport. In a security alert dated March 26, the U.S. Consulate General said that, on March 23, 2026, Hong Kong authorities changed the rules governing enforcement of the National Security Law. Under the revised fra [...]

See full content

no_proxy IDN mismatch: Unicode hostnames bypass proxy exclusion list

on 07/04/2026

curl disclosed a bug submitted by mzfr: https://hackerone.com/reports/3650443 [...]

See full content

FTP entrypath accepts 0xFF (Telnet IAC) through incomplete ISCNTRL filter, sent on wire via CWD on connection reuse

on 07/04/2026

curl disclosed a bug submitted by mzfr: https://hackerone.com/reports/3650473 [...]

See full content

Improper enforcement of CURLOPT_SOCKS5_AUTH due to missing reuse key validation in libcurl

on 07/04/2026

curl disclosed a bug submitted by cutiapretaa: https://hackerone.com/reports/3650435 [...]

See full content

Five key takeaways from the UK’s new Cyber Security & Resilience Bill

by Ed Parsons on 07/04/2026

The content of the Cyber Security & Resilience Bill (CSRB) recently introduced to Parliament contained few surprises. Having spent a significant amount of time working with European cyber-security frameworks, particularly NIS2, I see the Bill as both a continuation of the trend towards common approaches, and a signal of how seriously governments now take cyber risk. From my perspective, there are [...]

See full content

Cross-Site Leakage of Review Ownership via Navigation Detection

on 06/04/2026

Glassdoor disclosed a bug submitted by downgrade: https://hackerone.com/reports/2516237 [...]

See full content

eflected Vulnerability in Glassdoor Blog earch

on 06/04/2026

Glassdoor disclosed a bug submitted by zorixu: https://hackerone.com/reports/2682538 [...]

See full content

Full account takeover without user Interaction

on 06/04/2026

Glassdoor disclosed a bug submitted by imtheking: https://hackerone.com/reports/1820146 [...]

See full content

New Mexico’s Meta Ruling and Encryption

on 06/04/2026

Mike Masnick points out that the recent New Mexico court ruling against Meta has some bad implications for end-to-end encryption, and security in general: If the “design choices create liability” framework seems worrying in the abstract, the New Mexico case provides a concrete example of where it leads in practice. One of the key pieces of evidence the New Mexico attorney general used [...]

See full content

Reported Denial of Service

on 06/04/2026

Monero disclosed a bug submitted by jehrenhofermagicgrants: https://hackerone.com/reports/3241102 [...]

See full content

Reported RPC Overflow

on 06/04/2026

Monero disclosed a bug submitted by jehrenhofermagicgrants: https://hackerone.com/reports/3240792 [...]

See full content

Unauthorized usage of External API Key (Usage of Google Maps API Key ==> $$$

on 06/04/2026

Glassdoor disclosed a bug submitted by avielt: https://hackerone.com/reports/881118 [...]

See full content

Google Wants to Transition to Post-Quantum Cryptography by 2029

on 06/04/2026

Google says that it will fully transition to post-quantum cryptography by 2029. I think this is a good move, not because I think we will have a useful quantum computer anywhere near that year, but because crypto-agility is always a good thing. Slashdot thread. [...]

See full content

# SCURLOPT_SSH_KNOWNHOSTS and host fingerprint pins are silently bypassed when an SSH connection is reused from the connection pool

on 06/04/2026

curl disclosed a bug submitted by spiderchan26: https://hackerone.com/reports/3645415 [...]

See full content

SMTP Command Injection via CRLF in libcurl MAIL_FROM / MAIL_RCPT (lib/smtp.c)

on 06/04/2026

curl disclosed a bug submitted by divsz: https://hackerone.com/reports/3651975 [...]

See full content

Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab

by BrianKrebs on 06/04/2026

An elusive hacker who went by the handle “UNKN” and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face. Authorities in Germany say 31-year-old Russian Daniil Maksimovich Shchukin headed both cybercrime gangs and helped carry out at least 130 acts of computer sabotage and extortion against victims across the country between 2019 and 2021. Shchukin was n [...]

See full content

ignoring 'options' when doing connection reuse

on 05/04/2026

curl disclosed a bug submitted by spichanlio76: https://hackerone.com/reports/3646914 [...]

See full content

Data race in Curl_dnscache_add_negative() corrupts shared DNS cache heap corruption and double-free when using CURLOPT_SHARE with CURL_LOCK_DATA_DNS

on 04/04/2026

curl disclosed a bug submitted by intrax: https://hackerone.com/reports/3645361 [...]

See full content

Internal application wrapper or script using curl

on 03/04/2026

curl disclosed a bug submitted by rougerseven7: https://hackerone.com/reports/3648199 [...]

See full content

Friday Squid Blogging: Jurassic Fish Chokes on Squid

on 03/04/2026

Here’s a fossil of a 150-million year old fish that choked to death on a belemnite rostrum: the hard, internal shell of an extinct, squid-like animal. Original paper. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy. [...]

See full content

Missing server identity policy enforcement in SSH connection reuse allows host key verification bypass via pool poisoning

on 03/04/2026

curl disclosed a bug submitted by intrax71: https://hackerone.com/reports/3640932 [...]

See full content

Cookie attribute TAB injection regression in Set-Cookie parsing

on 03/04/2026

curl disclosed a bug submitted by calaba_zas: https://hackerone.com/reports/3641893 [...]

See full content

Company that Secretly Records and Publishes Zoom Meetings

on 03/04/2026

WebinarTV searches the internet for public Zoom invites, joins the meetings, secretly records them, and publishes (alternate link) the recordings. It doesn’t use the Zoom record feature, so Zoom can’t do anything about it. [...]

See full content

Simplifying MBA obfuscation with CoBRA

on 03/04/2026

Mixed Boolean-Arithmetic (MBA) obfuscation disguises simple operations like x + y behind tangles of arithmetic and bitwise operators. Malware authors and software protectors rely on it because no standard simplification technique covers both domains simultaneously; algebraic simplifiers don’t understand bitwise logic, and Boolean minimizers can’t handle arithmetic. We’re releasing CoBRA, an [...]

See full content

US Bans All Foreign-Made Consumer Routers

on 02/04/2026

This is for new routers; you don’t have to throw away your existing ones: The Executive Branch determination noted that foreign-produced routers (1) introduce “a supply chain vulnerability that could disrupt the U.S. economy, critical infrastructure, and national defense” and (2) pose “a severe cybersecurity risk that could be leveraged to immediately and severely disrupt U [...]

See full content

Google Workspace’s continuous approach to mitigating indirect prompt injections

on 02/04/2026

Posted by Adam Gavish, Google GenAI Security TeamIndirect prompt injection (IPI) is an evolving threat vector targeting users of complex AI applications with multiple data sources, such as Workspace with Gemini. This technique enables the attacker to influence the behavior of an LLM by injecting malicious instructions into the data or tools used by the LLM as it completes the user’s query. This ma [...]

See full content

Possible US Government iPhone Hacking Tool Leaked

on 02/04/2026

Wired writes (alternate source): Security researchers at Google on Tuesday released a report describing what they’re calling “Coruna,” a highly sophisticated iPhone hacking toolkit that includes five complete hacking techniques capable of bypassing all the defenses of an iPhone to silently install malware on a device when it visits a website containing the exploitation code. In t [...]

See full content

Is “Hackback” Official US Cybersecurity Strategy?

on 01/04/2026

The 2026 US “Cyber Strategy for America” document is mostly the same thing we’ve seen out of the White House for over a decade, but with a more aggressive tone. But one sentence stood out: “We will unleash the private sector by creating incentives to identify and disrupt adversary networks and scale our national capabilities.” This sounds like a call for hackback: giv [...]

See full content

Mutation testing for the agentic era

on 01/04/2026

Code coverage is one of the most dangerous quality metrics in software testing. Many developers fail to realize that code coverage lies by omission: it measures execution, not verification. Test suites with high coverage can obfuscate the fact that critical functionality is untested as software develops over time. We saw this when mutation testing uncovered a high-severity Arkis protocol vulnerabi [...]

See full content

A Taxonomy of Cognitive Security

on 01/04/2026

Last week, I listened to a fascinating talk by K. Melton on cognitive security, cognitive hacking, and reality pentesting. The slides from the talk are here, but—even better—Menton has a long essay laying out the basic concepts and ideas. The whole thing is important and well worth reading, and I hesitate to excerpt. Here’s a taste: The NeuroCompiler is where raw sensory data get [...]

See full content

BugQuest 2026: 31 Days of Broken Access Control

by Ayoub on 01/04/2026

In March 2026, we ran BugQuest, a 31-day campaign covering everything you need to know about finding and exploiting broken access control vulnerabilities. From understanding the basics of authentication and authorization to spotting subtle authorization bypasses in real code, we broke down one of the most critical vulnerability classes in modern web applications. Broken access controls have consis [...]

See full content

Bypassing Strict SSH Server Verification via Connection Pool Reuse in libcurl

on 31/03/2026

curl disclosed a bug submitted by whitehat411: https://hackerone.com/reports/3639277 [...]

See full content

Use-After-Free race condition in url_move_hostname() via shared connection pool

on 31/03/2026

curl disclosed a bug submitted by h3xb1tx: https://hackerone.com/reports/3638715 [...]

See full content

VRP 2025 Year in Review

on 31/03/2026

Posted by Dirk Göhmann, Tony Mendez, and the Vulnerability Rewards Program Team2025 marked a special year in the history of vulnerability rewards and bug bounty programs at Google: our 15th anniversary 🎉🎉🎉! Originally started in 2010, our vulnerability reward program (VRP) has seen constant additions and expansions over the past decade and a half, clearly indicating the value the programs under [...]

See full content

DLL side-loading vulnerability in Sony Music Center for PC Ver. 2.7.2 (Latest version)

on 31/03/2026

Sony disclosed a bug submitted by resurrect20: https://hackerone.com/reports/3355766 [...]

See full content

Unauthenticated SSRF via Public Reference API -Sharing Token Bypass

on 31/03/2026

Nextcloud disclosed a bug submitted by eclipse07077: https://hackerone.com/reports/3479692 [...]

See full content

How we made Trail of Bits AI-native (so far)

on 31/03/2026

This post is adapted from a talk I gave at [un]prompted, the AI security practitioner conference. Thanks to Gadi Evron for inviting me to speak. You can watch the recorded presentation below or download the slides. Most companies hand out ChatGPT licenses and wait for the productivity numbers to move. We built a system instead. A year ago, about 5% of Trail of Bits was on board with our AI initiat [...]

See full content

HackerOne Vulnerability Report: libcurl SSL/TLS Identity Leakage via Insecure Connection Reuse

on 31/03/2026

curl disclosed a bug submitted by ankitsingh131225: https://hackerone.com/reports/3636244 [...]

See full content

HTTP/2 PUSH_PROMISE header loss on OOM bypasses scheme validation (regression of 2e8c922a89)

on 31/03/2026

curl disclosed a bug submitted by m42kl33: https://hackerone.com/reports/3636044 [...]

See full content

Unbounded GZIP Decompression Leading to Event-Loop Starvation

on 31/03/2026

curl disclosed a bug submitted by ok3y: https://hackerone.com/reports/3632427 [...]

See full content

SSRF Filter Bypass via Unblocked NAT64 Local-Use IPv6 Prefix (64:ff9b:1::/48)

on 31/03/2026

arkadiyt-projects disclosed a bug submitted by tipsen: https://hackerone.com/reports/3634400 [...]

See full content

Path Traversal in writeFile via Unsafe Prefix Containment Check Allows Out-of-Directory Writes

on 31/03/2026

arkadiyt-projects disclosed a bug submitted by tipsen: https://hackerone.com/reports/3634571 [...]

See full content

Compromised axios npm package delivers cross-platform RAT

on 31/03/2026

An attacker hijacked an axios maintainer's npm account to publish malicious releases that deliver a cross-platform RAT. [...]

See full content

HashDoS in V8

on 30/03/2026

Node.js disclosed a bug submitted by sharp_edged: https://hackerone.com/reports/3511792 [...]

See full content

Permission Model Bypass in realpathSync.native Allows File Existence Disclosure

on 30/03/2026

Node.js disclosed a bug submitted by stif: https://hackerone.com/reports/3480841 [...]

See full content

Timing side-channel in HMAC verification via memcmp() in crypto_hmac.cc leads to potential MAC forgery

on 30/03/2026

Node.js disclosed a bug submitted by x_probe: https://hackerone.com/reports/3533945 [...]

See full content

Node.js Permission Model bypass: UDS server bind/listen works without `--allow-net`

on 30/03/2026

Node.js disclosed a bug submitted by xavlimsg: https://hackerone.com/reports/3559715 [...]

See full content

Denial of Service via `__proto__` header name in `req.headersDistinct` (Uncaught `TypeError` crashes Node.js process)

on 30/03/2026

Node.js disclosed a bug submitted by yushengchen: https://hackerone.com/reports/3560402 [...]

See full content

CVE-2024-36137 Patch Bypass - FileHandle.chmod/chown

on 30/03/2026

Node.js disclosed a bug submitted by wooseokdotkim: https://hackerone.com/reports/3449392 [...]

See full content

Memory leak in Node.js HTTP/2 server via WINDOW_UPDATE on stream 0 leads to resource exhaustion

on 30/03/2026

Node.js disclosed a bug submitted by galbarnahum: https://hackerone.com/reports/3531737 [...]

See full content

CISO Spotlight: Dimitris Georgiou on Building Security that Serves People First

by Tim Erlin on 30/03/2026

Dimitris Georgiou has been a self-professed computer geek since the early 80s. At university, he studied the convergence of educational technology with computer science as part of his psychology MA – finding, to his disbelief, that systems were perilously insecure.  Since then, he’s always worked in and around cybersecurity. He’s had roles as a computer science teacher, a technology manager, a [...]

See full content

CRLF Injection in HAProxy PROXY Protocol via CURLOPT_HAPROXY_CLIENT_IP allows IP spoofing and protocol injection

on 30/03/2026

curl disclosed a bug submitted by sakthi02_sk: https://hackerone.com/reports/3633534 [...]

See full content

HTTP/2 server push accepts a non-authoritative :scheme=https over cleartext h2c, enabling HTTPS cache-key poisoning

on 29/03/2026

curl disclosed a bug submitted by xkiluar: https://hackerone.com/reports/3630310 [...]

See full content

Password Strength Policy Bypass via Server-Side Validation Flaw

on 27/03/2026

Tucows (VDP) disclosed a bug submitted by 2026: https://hackerone.com/reports/3523703 [...]

See full content

Potential DoS due to PasswordPoliciesNotMet in errors.go

on 27/03/2026

passhash disclosed a bug submitted by sinic: https://hackerone.com/reports/2441029 [...]

See full content

Missing policies for password in password_policies.go

on 27/03/2026

passhash disclosed a bug submitted by sinic: https://hackerone.com/reports/2439734 [...]

See full content

Intigriti Bug Bytes #234 - March 2026 🚀

by Ayoub on 27/03/2026

Hello hackers, Welcome to the latest edition of Bug Bytes! In this month’s issue, we’ll be featuring:   Earning $180K via SSRFs Free Burp Suite Pro licenses for top hackers  Bypassing tricky file upload restrictions Injecting malicious code into AI coding assistants And so much more! Let’s dive in! New: PortSwigger collaboration with Intigriti We've teamed up with PortSwigger to reward high-p [...]

See full content

Unpatchable Vulnerabilities of Kubernetes: CVE-2020-8561

on 27/03/2026

A look at how Kubernetes CVE-2020-8561 works [...]

See full content

Assertion error in node_url.cc via malformed URL format leads to Node.js crash

on 26/03/2026

Node.js disclosed a bug submitted by rafaelgss: https://hackerone.com/reports/3546390 [...]

See full content

Server-side ReDoS via user-controlled regex in OIDC Access Policy

on 26/03/2026

RubyGems disclosed a bug submitted by 6b_jjj: https://hackerone.com/reports/3542546 [...]

See full content

Bearer Token Leaked to Attacker via .netrc Despite CVE-2026-3783 Fix

on 26/03/2026

curl disclosed a bug submitted by wizard021: https://hackerone.com/reports/3611825 [...]

See full content

Security Vulnerability Report: Protocol Injection via Programmatic Options

on 26/03/2026

curl disclosed a bug submitted by ankitsingh_76: https://hackerone.com/reports/3627638 [...]

See full content

HTTP/1.1 Response Desynchronization via conflicting CL/TE headers in Proxy CONNECT

on 25/03/2026

curl disclosed a bug submitted by 3lcarry: https://hackerone.com/reports/3623064 [...]

See full content

Security for the Quantum Era: Implementing Post-Quantum Cryptography in Android

on 25/03/2026

Posted by Eric Lynch, Product Manager, Android and Dom Elliott, Group Product Manager, Google Play Modern digital security is at a turning point. We are on the threshold of using quantum computers to solve "impossible" problems in drug discovery, materials science, and energy—tasks that even the most powerful classical supercomputers cannot handle. However, the same unique ability to consider di [...]

See full content

Try our new dimensional analysis Claude plugin

on 25/03/2026

We’re releasing a new Claude plugin for developing and auditing code that implements dimensional analysis, a technique we explored in our most recent blog post. Most LLM-based security skills ask the model to find bugs. Our new dimensional-analysis plugin for Claude Code takes a different approach: it uses the LLM to annotate your codebase with dimensional types, then flags mismatches mechanically [...]

See full content

Function `do_pubkey()` can have out-of-bound read issue

on 25/03/2026

curl disclosed a bug submitted by tynus: https://hackerone.com/reports/3617719 [...]

See full content

Intigriti 0326 CTF Challenge: Chaining DOM clobbering and CSP bypasses for XSS

by Ayoub on 25/03/2026

At Intigriti, we host monthly web-based Capture The Flag (CTF) challenges as a way to engage with the security researcher community. This month's challenge, brought forward by Kulindu, presented us with a Secure Search Portal that, on the surface, appeared to be well protected. A strict Content Security Policy and DOMPurify sanitization gave the impression that this month's task of executing an XS [...]

See full content

Potential Subdomain Takeover on IBM.com domain.

on 24/03/2026

IBM disclosed a bug submitted by bugmithalchemist: https://hackerone.com/reports/3592387 [...]

See full content

Spotting issues in DeFi with dimensional analysis

on 24/03/2026

Using dimensional analysis, you can categorically rule out a whole category of logic and arithmetic bugs that plague DeFi formulas. No code changes required, just better reasoning! One of the first lessons in physics is learning to think in terms of dimensions. Physicists can often spot a flawed formula in seconds just by checking whether the dimensions make sense. I once had a teacher who even ke [...]

See full content

Access to Deactivated LinkedIn Company Pages via Competitor Analytics API

on 24/03/2026

LinkedIn disclosed a bug submitted by riadalrashed: https://hackerone.com/reports/3604288 [...]

See full content

Vulnerability disclosure for AI safeguards. How open should programs be and what incentives are necessary?

by Ed Parsons on 24/03/2026

What you will learn How vulnerability disclosure applies specifically to AI safeguards and systems. The pros and cons of making AI disclosure programs more open/restricted. The kinds of incentives that motivate researchers. Which disclosure program structures can help organizations improve their AI security. In a recent NCSC blog post on adapting vulnerability disclosure for AI safeguards, [...]

See full content

LiteLLM and Telnyx compromised on PyPI: Tracing the TeamPCP supply chain campaign

on 24/03/2026

On March 24 and 27, 2026, malicious PyPI releases of LiteLLM and Telnyx were published as part of the TeamPCP supply chain campaign. We trace the full campaign from Trivy through npm, Checkmarx, and into PyPI. [...]

See full content

‘CanisterWorm’ Springs Wiper Attack Targeting Iran

by BrianKrebs on 23/03/2026

A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Iran’s time zone or have Farsi set as the default language. Experts say the wiper campaign against Iran materialized this past weekend and came from a relatively new cybercrime [...]

See full content

Fail-Open in set_tlsext_servername_callback on pyopenssl via unhandled exceptions leads to security bypass

on 20/03/2026

Python Cryptographic Authority disclosed a bug submitted by uv3doble: https://hackerone.com/reports/3558277 [...]

See full content

[Privilege Escalation] User can Pin|Unpin Any Comment on Any Project or Locale

on 20/03/2026

Mozilla disclosed a bug submitted by adilnbabras: https://hackerone.com/reports/3025797 [...]

See full content

Exposed .git/config File Leading to Potential Sensitive Information Disclosure

on 20/03/2026

curl disclosed a bug submitted by zoroo2: https://hackerone.com/reports/3612891 [...]

See full content

Feds Disrupt IoT Botnets Behind Huge DDoS Attacks

by BrianKrebs on 20/03/2026

The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million Internet of Things (IoT) devices, such as routers and web cameras. The feds say the four botnets — named Aisuru, Kimwolf, JackSkid and Mossad — are responsible for a series of recent record-smashing [...]

See full content

Exploiting broken access control vulnerabilities

by Ayoub on 20/03/2026

Broken access control vulnerabilities have consistently remained at the top of the OWASP Top 10, and for a good reason. As web applications continue to grow in complexity, with the introduction of role-based access controls, multi-tenant support, and granular permission models, the likelihood of access control flaws increases significantly. Unlike other vulnerability classes that often rely on ins [...]

See full content

Add labels to arbitrary issues/prs & compromise github actions label checks

on 19/03/2026

GitHub disclosed a bug submitted by ahacker1: https://hackerone.com/reports/3527771 [...]

See full content

PATs without the required scope can leak issues

on 19/03/2026

GitHub disclosed a bug submitted by s3rdz0: https://hackerone.com/reports/3522254 [...]

See full content

Lack of Validation in Reward Redemption Allows Unlimited Burp Suite License Abuse

on 18/03/2026

HackerOne disclosed a bug submitted by theokeen: https://hackerone.com/reports/3378540 [...]

See full content

HSTS accepted from HTTP origin behind HTTPS proxy

on 17/03/2026

curl disclosed a bug submitted by lg_oled77c5pua: https://hackerone.com/reports/3609505 [...]

See full content

Unescaped username in SASL DIGEST-MD5 response allows injection

on 17/03/2026

curl disclosed a bug submitted by am-perip: https://hackerone.com/reports/3608522 [...]

See full content

Session Cookie Leakage via Static Header Field in WebViewerFragment

on 17/03/2026

LinkedIn disclosed a bug submitted by dphoeniixx: https://hackerone.com/reports/3475626 [...]

See full content

Business Logic Bypass Allows Setting Read Access Role Without Pro Plan Subscription

on 16/03/2026

Lovable VDP disclosed a bug submitted by ziadmomen: https://hackerone.com/reports/3591764 [...]

See full content

SMB READ_ANDX DataOffset not validated

on 16/03/2026

curl disclosed a bug submitted by tavro: https://hackerone.com/reports/3603300 [...]

See full content

Unauthenticated access to private files on app.fizzy.do via Active Storage URLs leads to information disclosure

on 16/03/2026

Basecamp disclosed a bug submitted by perxibes: https://hackerone.com/reports/3467641 - Bounty: $100 [...]

See full content

HTTP/1.1 Must Die: Conquering the 0.CL Challenge

on 13/03/2026

Note: This is a guest post by pentester Julen Garrido Estévez (@b3xal). 1. Acknowledgements 2. Intro 3. Required tools 4. Strategy to solve/exploit the lab 5. Detecting 0.CL 5.1. Practical confirmatio [...]

See full content

Authorization Bypass in Starknet Snap via enableAuthorize parameter leads to unauthorized transaction signing

on 13/03/2026

Consensys disclosed a bug submitted by aszx87410: https://hackerone.com/reports/3507241 [...]

See full content

SQL Injection vulnerability found on ibm.com endpoint

on 12/03/2026

IBM disclosed a bug submitted by cr3ckerxploit: https://hackerone.com/reports/3578842 [...]

See full content

Curl_compareheader() fails to match multi-value HTTP headers

on 12/03/2026

curl disclosed a bug submitted by henriqueg: https://hackerone.com/reports/3598444 [...]

See full content

urlapi: off-by-one in custom scheme validation skips last character

on 12/03/2026

curl disclosed a bug submitted by otiscui: https://hackerone.com/reports/3598358 [...]

See full content

Automation without alignment: The hidden cost of modern DAST

on 12/03/2026

Register for the webinar: Burp Suite DAST x Burp Suite Professional: Better Together (Thursday, March 19 2026 16:00 UTC) I'm a firm believer that if you want to understand how secure an application re [...]

See full content

The CISO’s Dilemma: How To Scale AI Securely

by Tim Erlin on 12/03/2026

Your board wants AI. Your developers are building with it. Your budget committee is asking for an ROI timeline. But as CISO, you're the one who has to answer when the inevitable question comes up: "How do we know this is secure?" If you're like most security leaders, you're caught between two impossible positions. Say yes to AI initiatives without proper security controls, and you're responsib [...]

See full content

Sources

The content of this page is fetched from the following sources:

  1. Datadog Security Labs
  2. The Trail of Bits Blog
  3. Schneier on Security
  4. Krebs on Security
  5. Google Online Security Blog
  6. $BLOG_TITLE
  7. Agarri : Sécurité informatique offensive
  8. Alex Chapman's Blog
  9. www.alphabot.com
  10. ziot
  11. cat ~/footstep.ninja/blog.txt
  12. Ezequiel Pereira
  13. surajdisoja.me
  14. Intigriti
  15. PortSwigger Blog
  16. Richard’s Infosec blog
  17. Ron Chan
  18. ropnop blog
  19. The unofficial HackerOne disclosure timeline
  20. Wallarm