InfoSec Planet

A collection of diverse security content from a curated list of sources. This website also serves as a demo for "worker-planet", the software that powers it.

Double-free vulnerability in libcurl with rustls via NoServerCertVerifier condition leads to application crash

on 16/11/2025

curl disclosed a bug submitted by xkernel: https://hackerone.com/reports/3427670 [...]

See full content

Microsoft Patch Tuesday, November 2025 Edition

by BrianKrebs on 16/11/2025

Microsoft this week pushed security updates to fix more than 60 vulnerabilities in its Windows operating systems and supported software, including at least one zero-day bug that is already being exploited. Microsoft also fixed a glitch that prevented some Windows 10 users from taking advantage of an extra year of security updates, which is nice because the zero-day flaw and other critical weakness [...]

See full content

Bug Bounty Tips From The Trenches With @ZACK0X01

on 16/11/2025

See full content

a new kind of Capture The Flag hacking

on 16/11/2025

See full content

Incorrect sizeof() in Rustls Backend Memory Allocation

on 15/11/2025

curl disclosed a bug submitted by pelioro: https://hackerone.com/reports/3427460 [...]

See full content

Off-by-One Buffer Overflow in SMB Path Handler

on 15/11/2025

curl disclosed a bug submitted by pelioro: https://hackerone.com/reports/3427343 [...]

See full content

Malicious server forces .curlrc creation via curl -OJ leading to local file exfiltration

on 15/11/2025

curl disclosed a bug submitted by djogho: https://hackerone.com/reports/3427194 [...]

See full content

Basic Network Segmentation

on 15/11/2025

See full content

The State of Cybercrime in 2025 (with Nick Ascoli!)

on 15/11/2025

See full content

Level up your Solidity LLM tooling with Slither-MCP

on 15/11/2025

We’re releasing Slither-MCP, a new tool that augments LLMs with Slither’s unmatched static analysis engine. Slither-MCP benefits virtually every use case for LLMs by exposing Slither’s static analysis API via tools, allowing LLMs to find critical code faster, navigate codebases more efficiently, and ultimately improve smart contract authoring and auditing performance. How Slither-MCP works Slither [...]

See full content

"One Parameter to Rule Them All - How a User Flaw Unlocked an Admin Fortress" - Shinobi.security

on 15/11/2025

See full content

Friday Squid Blogging: Pilot Whales Eat a Lot of Squid

on 14/11/2025

Short-finned pilot wales (Globicephala macrorhynchus) eat at lot of squid: To figure out a short-finned pilot whale’s caloric intake, Gough says, the team had to combine data from a variety of sources, including movement data from short-lasting tags, daily feeding rates from satellite tags, body measurements collected via aerial drones, and sifting through the stomachs of unfortunate whales [...]

See full content

Responsible disclosure - public S3 bucket exposing JSON/config files

on 14/11/2025

AWS VDP disclosed a bug submitted by xtawb: https://hackerone.com/reports/3382796 [...]

See full content

Practical Help Desk - Learn IT Fundamentals in 9 Hours

on 14/11/2025

See full content

Upcoming Speaking Engagements

on 14/11/2025

This is a current list of where and when I am scheduled to speak: My coauthor Nathan E. Sanders and I are speaking at the Rayburn House Office Building in Washington, DC at noon ET on November 17, 2025. The event is hosted by the POPVOX Foundation and the topic is “AI and Congress: Practical Steps to Govern and Prepare.” I’m speaking on “Integrity and Trustworthy AI” at North Hennepin Community C [...]

See full content

Authentication Token Theft via Open Redirect in Callback URL Parameter

on 14/11/2025

lemlist disclosed a bug submitted by sle3pyhead: https://hackerone.com/reports/3419636 [...]

See full content

Hacking with Burp AI in the Chesspocalypse: API expert Corey Ball showcases how Burp AI can support pentesters.

on 14/11/2025

AI isn’t just reshaping cybersecurity - it’s challenging testers to rethink their entire playbook. In his latest article, “Hacking with Burp AI in the Chesspocalypse”, API expert Corey Ball draws less [...]

See full content

I Had Claude MCP Hack Me

on 14/11/2025

See full content

The Role of Humans in an AI-Powered World

on 14/11/2025

As AI capabilities grow, we must delineate the roles that should remain exclusively human. The line seems to be between fact-based decisions and judgment-based decisions. For example, in a medical context, if an AI was demonstrably better at reading a test result and diagnosing cancer than a human, you would take the AI in a second. You want the more accurate tool. But justice is harder because ju [...]

See full content

How we avoided side-channels in our new post-quantum Go cryptography libraries

on 14/11/2025

The Trail of Bits cryptography team is releasing our open-source pure Go implementations of ML-DSA (FIPS-204) and SLH-DSA (FIPS-205), two NIST-standardized post-quantum signature algorithms. These implementations have been engineered and reviewed by several of our cryptographers, so if you or your organization is looking to transition to post-quantum support for digital signatures, try them out! T [...]

See full content

How to make money in ethical hacking

on 13/11/2025

See full content

The $0.05 Supply Chain Hack

on 13/11/2025

See full content

Rust in Android: move fast and fix things

on 13/11/2025

Posted by Jeff Vander Stoep, Android Last year, we wrote about why a memory safety strategy that focuses on vulnerability prevention in new code quickly yields durable and compounding gains. This year we look at how this approach isn’t just fixing things, but helping us move faster. The 2025 data continues to validate the approach, with memory safety vulnerabilities falling below 20% of total [...]

See full content

Google Sues to Disrupt Chinese SMS Phishing Triad

by BrianKrebs on 13/11/2025

Google is suing more than two dozen unnamed individuals allegedly involved in peddling a popular China-based mobile phishing service that helps scammers impersonate hundreds of trusted brands, blast out text message lures, and convert phished payment card data into mobile wallets from Apple and Google. In a lawsuit filed in the Southern District of New York on November 12, Google sued to unmask an [...]

See full content

If you miss these #bugbountytips you might as well gig up

on 13/11/2025

See full content

microsoft turned me down

on 13/11/2025

See full content

Book Review: The Business of Secrets

on 13/11/2025

The Business of Secrets: Adventures in Selling Encryption Around the World by Fred Kinch (May 24, 2024) From the vantage point of today, it’s surreal reading about the commercial cryptography business in the 1970s. Nobody knew anything. The manufacturers didn’t know whether the cryptography they sold was any good. The customers didn’t know whether the crypto they bought was any g [...]

See full content

OWASP Top 10 Business Logic Abuse: What You Need to Know

by Tim Erlin on 13/11/2025

Over the past few years, API security has gone from a relatively niche concern to a headline issue. A slew of high-profile breaches and compliance mandates like PCI DSS 4.0 have woken security teams up to the reality that APIs are the front door to their data, infrastructure, and revenue streams. OWASP recently published its first-ever Business Logic Abuse Top 10 List; a clear indication that [...]

See full content

Building checksec without boundaries with Checksec Anywhere

on 13/11/2025

Since its original release in 2009, checksec has become widely used in the software security community, proving useful in CTF challenges, security posturing, and general binary analysis. The tool inspects executables to determine which exploit mitigations (e.g., ASLR, DEP, stack canaries, etc.) are enabled, rapidly gauging a program’s defensive hardening. This success inspired numerous spinoffs: a [...]

See full content

Live: PSAP Release | TCM Security | Blue Team | AMA

on 13/11/2025

See full content

Lua Infostealer Analysis ("My Hawaii Vacation" CTF)

on 12/11/2025

See full content

On Hacking Back

on 12/11/2025

Former DoJ attorney John Carlin writes about hackback, which he defines thus: “A hack back is a type of cyber response that incorporates a counterattack designed to proactively engage with, disable, or collect evidence about an attacker. Although hack backs can take on various forms, they are—­by definition­—not passive defensive measures.” His conclusion: As the law curren [...]

See full content

Cybersecurity Fundamentals for Beginners

on 11/11/2025

See full content

libcurl FTP path normalization flaw allows decoded %2e%2e CWD .. and directory escape (Path Traversal, CWE-22)

on 11/11/2025

curl disclosed a bug submitted by ahn0x: https://hackerone.com/reports/3418861 [...]

See full content

Hash exposed in public repository

on 11/11/2025

curl disclosed a bug submitted by skymander: https://hackerone.com/reports/3419617 [...]

See full content

Prompt Injection in AI Browsers

on 11/11/2025

This is why AIs are not ready to be personal assistants: A new attack called ‘CometJacking’ exploits URL parameters to pass to Perplexity’s Comet AI browser hidden instructions that allow access to sensitive data from connected services, like email and calendar. In a realistic scenario, no credentials or user interaction are required and a threat actor can leverage the attack by [...]

See full content

Two click Account Takeover

on 11/11/2025

Basecamp disclosed a bug submitted by fr4via: https://hackerone.com/reports/3079738 [...]

See full content

Command Injection - CRITICISM

on 11/11/2025

curl disclosed a bug submitted by tomar-re: https://hackerone.com/reports/3418760 [...]

See full content

Silent TLS Trust Model Hijacking via `CURL_CA_BUNDLE` Environment Variable Leads to MITM

on 11/11/2025

curl disclosed a bug submitted by rootsecret3: https://hackerone.com/reports/3418776 [...]

See full content

Hunting for DOM-based XSS vulnerabilities: A complete guide

by Ayoub on 11/11/2025

Traditional cross-site scripting (XSS) vulnerabilities were prevalent when server-side rendering (with languages like PHP, JSP, and ASP) was the norm. However, as applications become more complex and developers continue to shift application logic to the client-side, more complex client-side vulnerabilities are expected to arise. In this article, we will cover what DOM-based cross-site scripting (X [...]

See full content

Arbitrary Configuration File Inclusion: via External Control of File Name or Path

on 10/11/2025

curl disclosed a bug submitted by rootsecret3: https://hackerone.com/reports/3418646 [...]

See full content

SMTP CRLF Injection in curl/libcurl via MAIL FROM/RCPT TO parameters

on 10/11/2025

curl disclosed a bug submitted by haider790h: https://hackerone.com/reports/3418616 [...]

See full content

libcurl MQTT `CURLOPT_POSTFIELDSIZE_LARGE` overflow leads to immediate DoS

on 10/11/2025

curl disclosed a bug submitted by jiyong: https://hackerone.com/reports/3417428 [...]

See full content

Unsafe use of strcpy in Curl_ldap_err2string (packages/OS400/os400sys.c) stack-buffer-overflow (PoC + ASan)

on 10/11/2025

curl disclosed a bug submitted by biswarup_das: https://hackerone.com/reports/3418528 [...]

See full content

This Is How Max Verstappen Was Hacked

on 10/11/2025

See full content

New Attacks Against Secure Enclaves

on 10/11/2025

Encryption can protect data at rest and data in transit, but does nothing for data in use. What we have are secure enclaves. I’ve written about this before: Almost all cloud services have to perform some computation on our data. Even the simplest storage provider has code to copy bytes from an internal storage system and deliver them to the user. End-to-end encryption is sufficient in such a [...]

See full content

SMTP CRLF Command Injection in CURLOPT_MAIL_FROM and CURLOPT_MAIL_RCPT

on 10/11/2025

curl disclosed a bug submitted by bau1u: https://hackerone.com/reports/3414088 [...]

See full content

A 2025 look at real-world Kubernetes version adoption

on 10/11/2025

A 2025 look at real-world Kubernetes version adoption [...]

See full content

Drilling Down on Uncle Sam’s Proposed TP-Link Ban

by BrianKrebs on 09/11/2025

The U.S. government is reportedly preparing to ban the sale of wireless routers and other networking gear from TP-Link Systems, a tech company that currently enjoys an estimated 50% market share among home users and small businesses. Experts say while the proposed ban may have more to do with TP-Link’s ties to China than any specific technical threats, much of the rest of the industry servin [...]

See full content

Windows Defender

on 08/11/2025

See full content

StandUp + Certified Networks And Pentesting proffessional

on 08/11/2025

See full content

I did not pick the rat - it was the rat that picked me - it's my destiny

on 08/11/2025

See full content

The ALL NEW OWASP top 10 - 2025 edition RC 1

on 07/11/2025

See full content

Balancer hack analysis and guidance for the DeFi ecosystem

on 07/11/2025

.content img { border: 1px solid black; } TL;DR The root cause of the hack was a rounding direction issue that had been present in the code for many years. When the bug was first introduced, the threat landscape of the blockchain ecosystem was significantly different, and arithmetic issues in particular were not widely considered likely vectors for exploitation. As low-hanging attack paths hav [...]

See full content

Friday Squid Blogging: Squid Game: The Challenge, Season Two

on 07/11/2025

The second season of the Netflix reality competition show Squid Game: The Challenge has dropped. (Too many links to pick a few—search for it.) As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy. [...]

See full content

Preparing a PCAP Investigation!

on 07/11/2025

See full content

Window Batch Malware Analysis!

on 07/11/2025

See full content

I hacked google and this is how

on 07/11/2025

See full content

Faking Receipts with AI

on 07/11/2025

Over the past few decades, it’s become easier and easier to create fake receipts. Decades ago, it required special paper and printers—I remember a company in the UK advertising its services to people trying to cover up their affairs. Then, receipts became computerized, and faking them required some artistic skills to make the page look realistic. Now, AI can do it all: Several receipts [...]

See full content

Unauthorized Password Reset Allows Account Takeover Across Tenant Boundaries

on 07/11/2025

lemlist disclosed a bug submitted by mcdave: https://hackerone.com/reports/3378635 [...]

See full content

Low-privileged user can enable or disable Lovable AI for new projects in workspace

on 07/11/2025

Lovable VDP disclosed a bug submitted by anxioussick: https://hackerone.com/reports/3369843 [...]

See full content

Exploiting JWT vulnerabilities: A complete guide

by Ayoub on 07/11/2025

Before JSON Web Tokens (JWTs) became popular in today's app development landscape, web applications predominantly used server-side sessions, which presented horizontal scalability issues. JWTs solved this by moving authentication data from the server to the token itself. They are self-contained, stateless and cryptographically signed, checking all the boxes for any use case in application developm [...]

See full content

SQL Injection in Django ORM via Unvalidated `_connector` in Q Objects

on 06/11/2025

Django disclosed a bug submitted by cyberstan: https://hackerone.com/reports/3335709 [...]

See full content

Fake DMCA MALWARE Scam

on 06/11/2025

See full content

Rigged Poker Games

on 06/11/2025

The Department of Justice has indicted thirty-one people over the high-tech rigging of high-stakes poker games. In a typical legitimate poker game, a dealer uses a shuffling machine to shuffle the cards randomly before dealing them to all the players in a particular order. As set forth in the indictment, the rigged games used altered shuffling machines that contained hidden technology allowing th [...]

See full content

This is why most bug bounty hunters fail

on 06/11/2025

See full content

Do you want to hack web applications

on 06/11/2025

See full content

Live IoT Hacking | Chip Off Firmware Extraction | Hardware Hacking | AMA

on 06/11/2025

See full content

Cloudflare Scrubs Aisuru Botnet from Top Domains List

by BrianKrebs on 06/11/2025

For the past week, domains associated with the massive Aisuru botnet have repeatedly usurped Amazon, Apple, Google and Microsoft in Cloudflare’s public ranking of the most frequently requested websites. Cloudflare responded by redacting Aisuru domain names from their top websites list. The chief executive at Cloudflare says Aisuru’s overlords are using the botnet to boost their malicio [...]

See full content

MUT-4831: Trojanized npm packages deliver Vidar infostealer malware

on 06/11/2025

Analysis of a threat actor campaign targeting Windows users with Vidar infostealer malware via malicious npm packages [...]

See full content

CVE-2025-10966: missing SFTP host verification with wolfSSH

on 05/11/2025

curl disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3355218 [...]

See full content

A runtime security approach to detecting supply chain attacks

on 05/11/2025

Detecting software supply chain attacks through runtime security. [...]

See full content

Improper Authorization Leads to Editor can toggle admin-only workspace features (Lovable AI)

on 04/11/2025

Lovable VDP disclosed a bug submitted by d0maxploit: https://hackerone.com/reports/3371448 [...]

See full content

Improper Authorization Leads to Editor can toggle admin-only workspace features (Lovable Cloud)

on 04/11/2025

Lovable VDP disclosed a bug submitted by d0maxploit: https://hackerone.com/reports/3371414 [...]

See full content

3 Awesome AI Security Resources!

on 04/11/2025

See full content

Bugcrowd Acquires Mayhem Security to Bring Human-Augmented AI Automation to Security Testing

on 04/11/2025

See full content

This Hacker Made Over $10,000 Hacking AI

on 03/11/2025

See full content

Microsoft `x-apikey` Exposed in Mozilla CI Public Logs

on 03/11/2025

Mozilla disclosed a bug submitted by xhacking_z: https://hackerone.com/reports/3243860 - Bounty: $200 [...]

See full content

HackerOne

on 03/11/2025

curl disclosed a bug submitted by hackerpllim: https://hackerone.com/reports/3409193 [...]

See full content

Hi Hacker

on 03/11/2025

curl disclosed a bug submitted by hackerpllim: https://hackerone.com/reports/3409186 [...]

See full content

At the forefront of ethical hacking: What’s Intigriti’s impact and position?

by Eleanor Barlow on 03/11/2025

You asked, and we answered.   At Intigriti, we’ve been paying close attention to the questions most frequently asked by those with a bug bounty program in place. That’s why we’ve launched this blog series dedicated to answering the most frequently asked questions, diving into hot topics, and sharing practical and expert-backed strategies to help you maximize your bug bounty success.  So far in thi [...]

See full content

Alleged Jabber Zeus Coder ‘MrICQ’ in U.S. Custody

by BrianKrebs on 02/11/2025

A Ukrainian man indicted in 2012 for conspiring with a prolific hacking group to steal tens of millions of dollars from U.S. businesses was arrested in Italy and is now in custody in the United States, KrebsOnSecurity has learned. Sources close to the investigation say Yuriy Igorevich Rybtsov, a 41-year-old from the Russia-controlled city of Donetsk, Ukraine, was previously referenced in U.S. fede [...]

See full content

Directory Traversal Vulnerability in cURL via Content-Disposition Header Processing

on 01/11/2025

curl disclosed a bug submitted by oliverkremer: https://hackerone.com/reports/3408126 [...]

See full content

Multi-Factor Authentication?

on 01/11/2025

See full content

Spooky sales

on 01/11/2025

See full content

My sales are scary but 😱😱

on 01/11/2025

See full content

No Confirmation Email For Email Change

on 31/10/2025

Hiro disclosed a bug submitted by craxermgr: https://hackerone.com/reports/268221 [...]

See full content

Information Disclosure

on 31/10/2025

Hiro disclosed a bug submitted by craxermgr: https://hackerone.com/reports/268224 [...]

See full content

REDIRECTION VULNERABILITY/HOST HEADER INJECTION VULNERABILITY

on 31/10/2025

Hiro disclosed a bug submitted by vyshnav_nk: https://hackerone.com/reports/300164 [...]

See full content

Missing restriction on string size of Full Name at browser.blockstack.org

on 31/10/2025

Hiro disclosed a bug submitted by myskar: https://hackerone.com/reports/304073 [...]

See full content

Can view all username leaked in https://core.blockstack.org

on 31/10/2025

Hiro disclosed a bug submitted by myskar: https://hackerone.com/reports/377565 [...]

See full content

Invalidate active sessions after password change

on 31/10/2025

Hiro disclosed a bug submitted by droop3r: https://hackerone.com/reports/716647 [...]

See full content

blockstack.org - is vulnerable to (CVE-2016-2183, CVE-2016-6329)

on 31/10/2025

Hiro disclosed a bug submitted by 0x1_aulia: https://hackerone.com/reports/910732 [...]

See full content

Blockstack Browser For Mac leaks "Core API Password" to 3rd parties

on 31/10/2025

Hiro disclosed a bug submitted by frozensolid: https://hackerone.com/reports/541760 [...]

See full content

Logout Bypass Vulnerability in Hiro.so

on 31/10/2025

Hiro disclosed a bug submitted by anonymous--1000: https://hackerone.com/reports/3062299 - Bounty: $150 [...]

See full content

FULL 10 DAY!! Pentesting Boot Camp - Part 1 [NEARLY 4H!]

on 31/10/2025

See full content

Intro to PowerShell: Hunting Network Activity.

on 31/10/2025

See full content

happy halloween!

on 31/10/2025

See full content

How Hackers Become Admin (they just ask)

on 31/10/2025

See full content

Buffer over-read,, Missing NUL termination in addvariable() causes undefined behavior

on 31/10/2025

curl disclosed a bug submitted by sagorhawlader: https://hackerone.com/reports/3406123 [...]

See full content

Sources

The content of this page is fetched from the following sources:

  1. Datadog Security Labs
  2. The Trail of Bits Blog
  3. Phylum Research | Software Supply Chain Security
  4. Schneier on Security
  5. Krebs on Security
  6. Google Online Security Blog
  7. $BLOG_TITLE
  8. Agarri : Sécurité informatique offensive
  9. Alex Chapman's Blog
  10. www.alphabot.com
  11. ziot
  12. Bug Bounty Reports Explained
  13. Bugcrowd
  14. cat ~/footstep.ninja/blog.txt
  15. Ezequiel Pereira
  16. HackerOne
  17. surajdisoja.me
  18. InsiderPhD
  19. Intigriti
  20. John Hammond
  21. LiveOverflow
  22. NahamSec
  23. PortSwigger Blog
  24. Rana Khalil
  25. Richard’s Infosec blog
  26. Ron Chan
  27. ropnop blog
  28. STÖK
  29. Sun Knudsen
  30. The Cyber Mentor
  31. The unofficial HackerOne disclosure timeline
  32. The XSS Rat
  33. TomNomNom
  34. Wallarm