Posted by Apple Product Security via Fulldisclosure on Apr 02 APPLE-SA-03-31-2025-2 Xcode 16.3 Xcode 16.3 addresses the following issues. Information about the security content is also available at https://support.apple.com/122380. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. IDE Assets Available for: macOS Sequoia 15.2 and later … Read More “APPLE-SA-03-31-2025-2 Xcode 16.3 – Full Disclosure” »
Category: Alert Feeds
Posted by Pierre Kim on Apr 02 ## Advisory Information Title: 10 vulnerabilities in Brocade Fibre Channel switches Advisory URL: https://pierrekim.github.io/advisories/2025-brocade-switches.txt Blog URL: https://pierrekim.github.io/blog/2025-03-31-brocade-switches-10-vulnerabilities.html Date published: 2025-03-31 Vendors contacted: Brocade Release mode: Released CVE: CVE-2021-27797, CVE-2022-33186, CVE-2023-3454, CVE-2024-5460, CVE-2024-5461, CVE-2024-7516 ## Product… – Read More – Full Disclosure
Posted by Pierre Kim on Apr 02 ## Advisory Information Title: 3 vulnerabilities in Palo Alto Deep Packet Inspection mechanism Advisory URL: https://pierrekim.github.io/advisories/2025-palo-alto-dpi.txt Blog URL: https://pierrekim.github.io/blog/2025-03-31-paloalto-dpi-3-vulnerabilities.html Date published: 2025-03-31 Vendors contacted: Palo Alto Release mode: Released CVE: None ## Product description ## Vulnerabilities Summary Vulnerable versions: all versions of Palo Alto… – Read More – … Read More “3 vulnerabilities in Palo Alto Deep Packet Inspection mechanism – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on Apr 02 APPLE-SA-03-31-2025-1 Safari 18.4 Safari 18.4 addresses the following issues. Information about the security content is also available at https://support.apple.com/122379. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Authentication Services Available for: macOS Ventura and macOS Sonoma … Read More “APPLE-SA-03-31-2025-1 Safari 18.4 – Full Disclosure” »
Posted by Qualys Security Advisory via Fulldisclosure on Mar 27 Qualys Security Advisory Three bypasses of Ubuntu’s unprivileged user namespace restrictions ======================================================================== Contents ======================================================================== Summary Bypass via aa-exec Bypass via busybox Bypass via LD_PRELOAD Acknowledgments Timeline (advisory sent to the Ubuntu Security Team on January 15, 2025)… – Read More – Full Disclosure
Posted by Andrey Stoykov on Mar 24 # Exploit Title: Stored XSS via Send Message Functionality – dolphin.prov7.4.2 # Date: 03/2025 # Exploit Author: Andrey Stoykov # Version: 7.4.2 # Date: 03/2025 # Tested on: Debian 12 # Blog: https://msecureltd.blogspot.com/2025/03/friday-fun-pentest-series-20-stored-xss.html Stored XSS via Send Message Functionality: Steps to Reproduce: 1. Login and visit “http://192.168.58.170/dolphinCMS/mail.php?mode=compose" … Read More “Stored XSS via Send Message Functionality – dolphin.prov7.4.2 – Full Disclosure” »
Posted by Andrey Stoykov on Mar 24 # Exploit Title: SQL Injection in Admin Functionality – dolphin.prov7.4.2 # Date: 03/2025 # Exploit Author: Andrey Stoykov # Version: 7.4.2 # Date: 03/2025 # Tested on: Debian 12 # Blog: https://msecureltd.blogspot.com/2025/03/friday-fun-pentest-series-21-sql.html SQL Injection in Admin Functionality: Steps to Reproduce: 1. Login as admin user and visit … Read More “SQL Injection in Admin Functionality – dolphin.prov7.4.2 – Full Disclosure” »
Posted by Lucas Lalumière on Mar 20 [Author]: Lucas Lalumiere [Contact]: lucas.lalum () gmail com [Date]: 2025-3-17 [Vendor]: Tripp Lite [Product]: SU750XL UPS [Firmware]: 12.04.0052 [CVE Reference]: CVE-2019-16261 ============================ Affected Products (Tested): ============================ – Tripp Lite PDU’s (e.g., PDUMH15AT) – Tripp Lite UPS’s (e.g., SU750XL) *NEW* ====================== Vulnerability Summary: ====================== CVE-2019-16261 describes… – Read More … Read More “CVE-2019-16261 (UPDATE): Unauthenticated POST requests to Tripp Lite UPS Systems – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on Mar 20 APPLE-SA-03-11-2025-1 Safari 18.3.1 Safari 18.3.1 addresses the following issues. Information about the security content is also available at https://support.apple.com/122285. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. WebKit Available for: macOS Ventura and macOS Sonoma Impact: … Read More “APPLE-SA-03-11-2025-1 Safari 18.3.1 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on Mar 20 APPLE-SA-03-11-2025-2 iOS 18.3.2 and iPadOS 18.3.2 iOS 18.3.2 and iPadOS 18.3.2 addresses the following issues. Information about the security content is also available at https://support.apple.com/122281. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. WebKit Available for: … Read More “APPLE-SA-03-11-2025-2 iOS 18.3.2 and iPadOS 18.3.2 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on Mar 20 APPLE-SA-03-11-2025-3 macOS Sequoia 15.3.2 macOS Sequoia 15.3.2 addresses the following issues. Information about the security content is also available at https://support.apple.com/122283. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. WebKit Available for: macOS Sequoia Impact: Maliciously … Read More “APPLE-SA-03-11-2025-3 macOS Sequoia 15.3.2 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on Mar 20 APPLE-SA-03-11-2025-4 visionOS 2.3.2 visionOS 2.3.2 addresses the following issues. Information about the security content is also available at https://support.apple.com/122284. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. WebKit Available for: Apple Vision Pro Impact: Maliciously crafted … Read More “APPLE-SA-03-11-2025-4 visionOS 2.3.2 – Full Disclosure” »
Posted by areca-palm via Fulldisclosure on Mar 11 [CVE pending] Sandboxing Python is notoriously difficult, the Python module “asteval” is no exception. Add to this the fact that a large set of numpy functions are exposed within the sandbox by default. Versions <=1.06 are vulnerable. This vuln has been disclosed to the maintainer, who … Read More “Multiple sandbox escapes in asteval python sandboxing module – Full Disclosure” »
Posted by Jordy Zomer on Feb 27 Hey all, First of all, cool findings! I’ve been working on the CodeQL query and have a revised version that I think improves accuracy and might offer some performance gains (though I haven’t done rigorous benchmarking). The key change is the use of `StackVariableReachability` and making sure … Read More “Re: MitM attack against OpenSSH’s VerifyHostKeyDNS-enabled client – Full Disclosure” »
Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Feb 27 SEC Consult Vulnerability Lab Security Advisory < 20250226-0 > ======================================================================= title: Multiple Vulnerabilities product: Siemens A8000 CP-8050 PLC Siemens A8000 CP-8031 PLC vulnerable version: <05.40 for Vulnerability 1, <05.30 for Vulnerability 2 fixed version: 05.40 for Vulnerability 1, 05.30 for Vulnerability 2… – Read … Read More “SEC Consult SA-20250226-0 :: Multiple vulnerabilities in Siemens A8000 CP-8050 & CP-8031 PLC – Full Disclosure” »
Posted by Georgi Guninski on Feb 20 Python’s official documentation contains textbook example of insecure code (XSS) Date: 2025-02-18 Author: Georgi Guninski === form = cgi.FieldStorage() if “name” not in form or “addr” not in form: print(“<H1>Error</H1>”) print(“Please fill in the name and addr fields.”) return print(“<p>name:”, form[“name”].value) print(“<p>addr:”,… – Read More – Full Disclosure
Posted by Andrey Stoykov on Feb 20 # Exploit Title: Self Stored XSS – acp2sev7.2.2 # Date: 02/2025 # Exploit Author: Andrey Stoykov # Version: 7.2.2 # Tested on: Ubuntu 22.04 # Blog: https://msecureltd.blogspot.com/2025/02/friday-fun-pentest-series-19-self.html Self Stored XSS #1: Steps to Reproduce: 1. Visit “http://192.168.58.168/acp2se/mul/muladmin.php" and login with “admin” / “adminpass” 2. In the field … Read More “Self Stored XSS – acp2sev7.2.2 – Full Disclosure” »
Posted by Qualys Security Advisory via Fulldisclosure on Feb 20 Qualys Security Advisory CVE-2025-26465: MitM attack against OpenSSH’s VerifyHostKeyDNS-enabled client CVE-2025-26466: DoS attack against OpenSSH’s client and server ======================================================================== Contents ======================================================================== Summary Background Experiments Results MitM attack against OpenSSH’s VerifyHostKeyDNS-enabled client DoS… – Read More – Full Disclosure
Posted by Gynvael Coldwind on Feb 17 Hi, This isn’t really a problem a vendor can solve in firmware (apart from offering configuration via cloud, which has its own issues). Even if they would enable TLS/SSL by default, it would just give one a false sense of security, since: – the certificates would be … Read More “Re: Netgear Router Administrative Web Interface Lacks Transport Encryption By Default – Full Disclosure” »
Re: Text injection on https://www.google.com/sorry/index via ?q parameter (no XSS) – Full Disclosure
Posted by David Fifield on Feb 15 Today at about 2025-02-13 19:00 I noticed the “≠” is back, but now the type 0x12 payload of the ?q query parameter gets formatted into the string representation of an IP address, rather than being copied almost verbatim into the page. If the payload length is 4 … Read More “Re: Text injection on https://www.google.com/sorry/index via ?q parameter (no XSS) – Full Disclosure” »
Posted by Gabriel Valachi via Fulldisclosure on Feb 15 In GZDoom 4.13.1 and below, there is a vulnerability involving array sizes in ZScript, the game engine’s primary scripting language. It is possible to dynamically allocate an array of 1073741823 dwords, permitting access to the rest of the heap from the start of the array … Read More “[CVE-2024-54756] GZDoom <= 4.13.1 Arbitrary Code Execution via Malicious ZScript – Full Disclosure” »
Posted by Ryan Delaney via Fulldisclosure on Feb 16 <!– # Exploit Title: Netgear Router Administrative Web Interface Lacks Transport Encryption By Default # Date: 02-13-2025 # Exploit Author: Ryan Delaney # Author Contact: ryan.delaney () owasp org # Vendor Homepage: https://www.netgear.com # Version: Netgear C7800 Router, F/W 6.01.07, possibly others # Tested on: … Read More “Netgear Router Administrative Web Interface Lacks Transport Encryption By Default – Full Disclosure” »
Posted by upper.underflow via Fulldisclosure on Feb 16 Hello, About an hour ago, a group appearing to be named WyRCV2 posted a note on the nostr social network, which can be found at the following link: https://primal.net/e/note1vzh0mj9rcxax9cgcdapupyxeehjprd68gd9kk9wrv939m8knulrs4780x7 Save, share, use. The paste link includes a list of nodes that the attacker has instructed to … Read More “Monero 18.3.4 zero-day DoS vulnerability has been dropped publicly on social network. – Full Disclosure” »
Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Feb 12 SEC Consult Vulnerability Lab Security Advisory < 20250211-0 > ======================================================================= title: Multiple vulnerabilities product: Wattsense – Wattsense Bridge vulnerable version: Wattsense Bridge * Hardware Revision: WSG-EU-SC-14-00, 20230801 * Firmware Revision: Wattsense (Wattsense minimal)… – Read More – Full Disclosure
Posted by Georgi Guninski on Feb 10 Summary: On 2025-02-09 ChatGPT AI found “security concern” (XSS) in DeepSeek’s AI python code. Background: Consider the simple coding question (Q): Write Python CGI which takes as an argument NAME and outputs: “Hello NAME”. First page and results on google for “python CGI” return for me tutorials, … Read More “ChatGPT AI finds “security concern” (XSS) in DeepSeek’s code – Full Disclosure” »
Posted by Jeroen Hermans via Fulldisclosure on Feb 10 CloudAware Security Advisory CVE-2024-55447: Potential PII leak and incorrect access control in Paxton Net2 software ======================================================================== Summary ======================================================================== Insecure backend database in the Paxton Net2 software. Possible leaking of PII incorrect access control. Access cards can be cloned without physical access to the original… – Read … Read More “CVE-2024-55447: Access Control in Paxton Net2 software (update) – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on Feb 10 APPLE-SA-02-10-2025-1 iOS 18.3.1 and iPadOS 18.3.1 iOS 18.3.1 and iPadOS 18.3.1 addresses the following issues. Information about the security content is also available at https://support.apple.com/122174. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Accessibility Available for: … Read More “APPLE-SA-02-10-2025-1 iOS 18.3.1 and iPadOS 18.3.1 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on Feb 10 APPLE-SA-02-10-2025-2 iPadOS 17.7.5 iPadOS 17.7.5 addresses the following issues. Information about the security content is also available at https://support.apple.com/122173. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Accessibility Available for: iPad Pro 12.9-inch 2nd generation, iPad … Read More “APPLE-SA-02-10-2025-2 iPadOS 17.7.5 – Full Disclosure” »
Posted by KoreLogic Disclosures via Fulldisclosure on Feb 04 KL-001-2025-001: Checkmk NagVis Reflected Cross-site Scripting Title: Checkmk NagVis Reflected Cross-site Scripting Advisory ID: KL-001-2025-001 Publication Date: 2025-02-04 Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2025-001.txt 1. Vulnerability Details Affected Vendor: Checkmk Affected Product: Checkmk/NagVis Affected Version: Checkmk 2.3.0p2, NagVis 1.9.40 Platform: GNU/Linux… – Read More – … Read More “KL-001-2025-001: Checkmk NagVis Reflected Cross-site Scripting – Full Disclosure” »
Posted by KoreLogic Disclosures via Fulldisclosure on Feb 04 KL-001-2025-002: Checkmk NagVis Remote Code Execution Title: Checkmk NagVis Remote Code Execution Advisory ID: KL-001-2025-002 Publication Date: 2025-02-04 Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2025-002.txt 1. Vulnerability Details Affected Vendor: Checkmk Affected Product: Checkmk/NagVis Affected Version: Checkmk 2.3.0p2, NagVis 1.9.40 Platform: GNU/Linux CWE… – Read … Read More “KL-001-2025-002: Checkmk NagVis Remote Code Execution – Full Disclosure” »
Posted by hyp3rlinx on Feb 01 Updated SQL Injection CVE-2019-19245 exploit for Python3. import requests,time,re,sys,argparse #NAPC Xinet Elegant 6 Asset Library v6.1.655 #Pre-Auth SQL Injection 0day Exploit #By hyp3rlinx #ApparitionSec #UPDATED: Jan 2024 for python3 #TODO: add SSL support #=============================== #This will dump tables, usernames and passwords in vulnerable versions #REQUIRE PARAMS:… – Read More … Read More “Xinet Elegant 6 Asset Lib Web UI 6.1.655 / SQL Injection / Exploit Update Python3 – Full Disclosure” »
Re: Text injection on https://www.google.com/sorry/index via ?q parameter (no XSS) – Full Disclosure
Posted by David Fifield on Feb 01 I tested a few more times, and it appears the text injection has disappeared. These are timestamps when I tested, with offsets relative to the initial discovery. +0h 2025-01-28 03:00 initial discovery +5h 2025-01-28 08:19 ?q=EgtoZWxsbyB3b3JsZA works (https://archive.is/DD9xB) +14h 2025-01-28 17:31 ?q=EgtoZWxsbyB3b3JsZA works (no archive) +45h… – Read … Read More “Re: Text injection on https://www.google.com/sorry/index via ?q parameter (no XSS) – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on Feb 01 APPLE-SA-01-30-2025-1 GarageBand 10.4.12 GarageBand 10.4.12 addresses the following issues. Information about the security content is also available at https://support.apple.com/121866. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. GarageBand Available for: macOS Sonoma 14.4 and later Impact: … Read More “APPLE-SA-01-30-2025-1 GarageBand 10.4.12 – Full Disclosure” »