med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

373
active users

#vulnerability

14 posts14 participants2 posts today
Shine My Crown<p>Beauty, Vulnerability, And Bravery: What We’re Learning From Halle Bailey’s Emotional New Anthem <a href="https://shinemycrown.com/beauty-vulnerability-and-bravery-what-were-learning-from-halle-baileys-emotional-new-anthem/?utm_source=dlvr.it&amp;utm_medium=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">shinemycrown.com/beauty-vulner</span><span class="invisible">ability-and-bravery-what-were-learning-from-halle-baileys-emotional-new-anthem/?utm_source=dlvr.it&amp;utm_medium=mastodon</span></a> <a href="https://newsie.social/tags/Beauty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Beauty</span></a> <a href="https://newsie.social/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://newsie.social/tags/Bravery" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bravery</span></a> <a href="https://newsie.social/tags/HalleBailey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HalleBailey</span></a> <a href="https://newsie.social/tags/Braveface" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Braveface</span></a></p>
Alexandre Dulaunoy<p>I’ll do an online session about GCVE in 30 minutes. If you want to join, all details are below.</p><p><a href="https://infosec.exchange/tags/gcve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gcve</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a> </p><p><a href="https://infosec.exchange/@gcve@social.circl.lu/114873102367912236" translate="no" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@gcve@social.</span><span class="invisible">circl.lu/114873102367912236</span></a></p>
BeyondMachines :verified:<p>Oracle releases July 2025 Critical Patch Update addressing 309 vulnerabilities</p><p>Oracle released its July 2025 Critical Patch Update addressing 309 security vulnerabilities across its product ecosystem, including multiple critical flaws that enable remote code execution without authentication in products like Oracle Middleware, Managed File Transfer, and Healthcare systems.</p><p>**One more massive patch release covering all products of Oracle. Make sure you review the list of products with critical vulnerabilities, then go through the full list. It's going to be a long patching process. Prioritize products with critical flaws and move onward. As usual, always make a backup before running a patch on Oracle product.**<br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/advisory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>advisory</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a><br><a href="https://beyondmachines.net/event_details/oracle-releases-july-2025-critical-patch-update-addressing-309-vulnerabilities-8-m-y-2-k/gD2P6Ple2L" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">beyondmachines.net/event_detai</span><span class="invisible">ls/oracle-releases-july-2025-critical-patch-update-addressing-309-vulnerabilities-8-m-y-2-k/gD2P6Ple2L</span></a></p>
Bill<p>If you are genuinely interested in keeping shit safe, this has to be at least of some interest. Even if LLMs on a cron job are your kryptonite.</p><p><a href="https://thehackernews.com/2025/07/google-ai-big-sleep-stops-exploitation.html?m=1" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/07/goog</span><span class="invisible">le-ai-big-sleep-stops-exploitation.html?m=1</span></a></p><p><a href="https://infosec.exchange/tags/agenticai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>agenticai</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a></p>
:verified: domenuk<p>Our Big Sleep LLM Agent found critical vulns 📈📈📈</p><p><a href="https://blog.google/technology/safety-security/cybersecurity-updates-summer-2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.google/technology/safety-</span><span class="invisible">security/cybersecurity-updates-summer-2025/</span></a> </p><p><a href="https://infosec.exchange/tags/BigSleep" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BigSleep</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a></p>
CVE Program<p>Minutes from the CVE Board teleconference meeting on June 25 are now available <br> <br><a href="https://www.mail-archive.com/cve-editorial-board-list@mitre.org/msg00277.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">mail-archive.com/cve-editorial</span><span class="invisible">-board-list@mitre.org/msg00277.html</span></a> <br> <br><a href="https://mastodon.social/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a> <a href="https://mastodon.social/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://mastodon.social/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a> <a href="https://mastodon.social/tags/hssedi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hssedi</span></a> <a href="https://mastodon.social/tags/cisa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cisa</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Pyrzout :vm:<p>Researchers Jailbreak Elon Musk’s Grok-4 AI Within 48 Hours of Launch – Source:hackread.com <a href="https://ciso2ciso.com/researchers-jailbreak-elon-musks-grok-4-ai-within-48-hours-of-launch-sourcehackread-com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/researchers-jail</span><span class="invisible">break-elon-musks-grok-4-ai-within-48-hours-of-launch-sourcehackread-com/</span></a> <a href="https://social.skynetcloud.site/tags/1CyberSecurityNewsPost" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>1CyberSecurityNewsPost</span></a> <a href="https://social.skynetcloud.site/tags/artificialintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>artificialintelligence</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://social.skynetcloud.site/tags/NeuralTrust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NeuralTrust</span></a> <a href="https://social.skynetcloud.site/tags/Jailbreak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Jailbreak</span></a> <a href="https://social.skynetcloud.site/tags/ElonMusk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ElonMusk</span></a> <a href="https://social.skynetcloud.site/tags/Hackread" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hackread</span></a> <a href="https://social.skynetcloud.site/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://social.skynetcloud.site/tags/twitter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>twitter</span></a> <a href="https://social.skynetcloud.site/tags/Grok4" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Grok4</span></a> <a href="https://social.skynetcloud.site/tags/xAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xAI</span></a> <a href="https://social.skynetcloud.site/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://social.skynetcloud.site/tags/X" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>X</span></a></p>
Bill<p>eSIM vulnerability discovered. That's gonna be a rough one to fix if it is genuinely exploitable.</p><p><a href="https://security-explorations.com/esim-security.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">security-explorations.com/esim</span><span class="invisible">-security.html</span></a></p><p><a href="https://infosec.exchange/tags/iot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iot</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a></p>
Who Let The Dogs Out 🐾<p>FortiWeb взломан изнутри: SQL-инъекция 9.6/10 позволяет писать код в БД</p><p><a href="https://mastodon.ml/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://mastodon.ml/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://mastodon.ml/tags/FortiWeb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FortiWeb</span></a> </p><p>В компоненте Fabric Connector (интеграция продуктов Fortinet) обнаружена (<a href="https://fortiguard.fortinet.com/psirt/FG-IR-25-151" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">fortiguard.fortinet.com/psirt/</span><span class="invisible">FG-IR-25-151</span></a>) критическая уязвимость CVE-2025-25257 (9.6/10 CVSS). Атакующий без авторизации мог:<br>→ Выполнять произвольные SQL-запросы через поддельный Bearer-токен в заголовке Authorization;<br>→ Использовать SELECT... INTO OUTFILE для записи вредоносного кода на диск;<br>→ Запускать код через Python, получая полный контроль над системой (от имени пользователя mysql).</p><p>Уязвимые версии:<br>FortiWeb 7.6.0–7.6.3, 7.4.0–7.4.7, 7.2.0–7.2.10, 7.0.0–7.0.10.<br>Решение: Срочно обновиться до 7.6.4, 7.4.8, 7.2.11 или 7.0.11. До патча — отключить веб-интерфейсы HTTP/HTTPS.</p><p>Как починили?<br>Fortinet заменила небезопасные форматные строки на подготовленные выражения (prepared statements), блокирующие SQL-инъекции. Уязвимость нашёл Кентаро Кавана (GMO Cybersecurity) — эксперт по взлому Cisco.</p>
Alexandre Dulaunoy<p>Wrapped up an energising Vulnerability Lookup workshop during <span class="h-card" translate="no"><a href="https://social.circl.lu/@circl" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>circl</span></a></span>’s Virtual Summer School 2025.</p><p>Video and slides are now available. </p><p>Big thanks to everyone who joined the discussions.</p><p>:youtube: Video <a href="https://youtu.be/imkPqA-1mVE" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/imkPqA-1mVE</span><span class="invisible"></span></a> <br>📜 Slides <a href="https://www.vulnerability-lookup.org/files/events/2025/VSS-2025-VulnerabilityLookup.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">vulnerability-lookup.org/files</span><span class="invisible">/events/2025/VSS-2025-VulnerabilityLookup.pdf</span></a></p><p><a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/gcve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gcve</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a> </p><p><span class="h-card" translate="no"><a href="https://social.circl.lu/@gcve" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>gcve</span></a></span> <br><span class="h-card" translate="no"><a href="https://fosstodon.org/@cedric" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>cedric</span></a></span> <br><span class="h-card" translate="no"><a href="https://social.yoyodyne-it.eu/@rafi0t" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>rafi0t</span></a></span></p>
Fossery Tech :debian: :gnome:<p>(more Linux news in original post)</p><p>Initramfs vulnerability lets attackers with physical access compromise encrypted systems by entering incorrect password several times and accessing the debug shell on Ubuntu 25.04 and Fedora 42 systems:<br><a href="https://www.omgubuntu.co.uk/2025/07/ubuntu-security-initramfs-bypass-encryption" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">omgubuntu.co.uk/2025/07/ubuntu</span><span class="invisible">-security-initramfs-bypass-encryption</span></a></p><p>Linux kernel 6.15.6 and 6.12.37 LTS deliver TSA (Transient Scheduler Attacks) mitigations:<br><a href="https://www.phoronix.com/news/Linux-6.15.6-Linux-6.12.37-LTS" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">phoronix.com/news/Linux-6.15.6</span><span class="invisible">-Linux-6.12.37-LTS</span></a></p><p>Wayback is now hosted on FreeDesktop.org:<br><a href="https://www.phoronix.com/news/Wayback-FreeDesktop.org" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">phoronix.com/news/Wayback-Free</span><span class="invisible">Desktop.org</span></a></p><p>System76 Adder WS laptop available with Intel Core Ultra i9 and NVIDIA 50 series:<br><a href="https://9to5linux.com/system76s-adder-ws-linux-laptop-gets-intel-core-ultra-i9-and-nvidia-50-series" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">9to5linux.com/system76s-adder-</span><span class="invisible">ws-linux-laptop-gets-intel-core-ultra-i9-and-nvidia-50-series</span></a></p><p>(FOSS news in comments)</p><p><a href="https://social.linux.pizza/tags/WeeklyNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WeeklyNews</span></a> <a href="https://social.linux.pizza/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://social.linux.pizza/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://social.linux.pizza/tags/LinuxNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinuxNews</span></a> <a href="https://social.linux.pizza/tags/Initramfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Initramfs</span></a> <a href="https://social.linux.pizza/tags/LinuxKernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinuxKernel</span></a> <a href="https://social.linux.pizza/tags/Wayback" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wayback</span></a> <a href="https://social.linux.pizza/tags/System76" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>System76</span></a> <a href="https://social.linux.pizza/tags/LinuxDesktop" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinuxDesktop</span></a> <a href="https://social.linux.pizza/tags/DesktopLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DesktopLinux</span></a> <a href="https://social.linux.pizza/tags/LinuxLaptop" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinuxLaptop</span></a> <a href="https://social.linux.pizza/tags/XWayland" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XWayland</span></a> <a href="https://social.linux.pizza/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.linux.pizza/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://social.linux.pizza/tags/FosseryTech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FosseryTech</span></a></p>
JayeLTee<p>I received an email earlier this week from EA asking if I wanted to be added to a public acknowledgement page they were creating for individuals who responsibly disclosed vulnerabilities to them.</p><p>For all the shit people give EA, of the 100+ companies I contacted in the last two years, they were the only company I would say had a decent incident response.</p><p>They fixed the issue within 12 hours after validating it as critical, and proactively provided me multiple updates over time.</p><p>When the IR was done on their side, they reached out again with some more information about the potential impact if the issue hadn't been solved quickly, and also offered me a reward.</p><p>I did not have to keep chasing anyone for updates, I wasn't asked for non-disclosure, or offered money in exchange for it, and people replied instead of ignoring me.</p><p>I wasn't blamed for their mistake, either, or reported to the authorities.</p><p>Unfortunately, at least one or multiple of the things mentioned above are present in most of my other incidents reported; it's a real shit show out there.</p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/responsibledisclosure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>responsibledisclosure</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/ea" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ea</span></a> <a href="https://infosec.exchange/tags/electronicarts" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>electronicarts</span></a></p>
Pyrzout :vm:<p>McDonald’s AI Hiring Tool McHire Leaked Data of 64 Million Job Seekers <a href="https://hackread.com/mcdonalds-ai-hiring-tool-mchire-leaked-job-seekers-data/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/mcdonalds-ai-hiri</span><span class="invisible">ng-tool-mchire-leaked-job-seekers-data/</span></a> <a href="https://social.skynetcloud.site/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://social.skynetcloud.site/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.skynetcloud.site/tags/McDonald" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>McDonald</span></a> <a href="https://social.skynetcloud.site/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://social.skynetcloud.site/tags/Paradox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Paradox</span></a> <a href="https://social.skynetcloud.site/tags/Leaks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Leaks</span></a> <a href="https://social.skynetcloud.site/tags/IDOR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IDOR</span></a> <a href="https://social.skynetcloud.site/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a></p>
PrivacyDigest<p>Critical <a href="https://mas.to/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> 2 <a href="https://mas.to/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> has been under active <a href="https://mas.to/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a> for weeks</p><p>A critical vulnerability allowing <a href="https://mas.to/tags/hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackers</span></a> to bypass <a href="https://mas.to/tags/multifactor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>multifactor</span></a> <a href="https://mas.to/tags/authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authentication</span></a> in network management devices made by <a href="https://mas.to/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> has been actively <a href="https://mas.to/tags/exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploited</span></a> for more than a month, researchers said. The finding is at odds with advisories from the vendor saying there is no evidence of in-the-wild <a href="https://mas.to/tags/exploitation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploitation</span></a>.<br><a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a></p><p><a href="https://arstechnica.com/security/2025/07/critical-citrixbleed-2-vulnerability-has-been-under-active-exploit-for-weeks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">07/critical-citrixbleed-2-vulnerability-has-been-under-active-exploit-for-weeks/</span></a></p>
Xavier Ashe :donor:<p>This seems Very Bad(tm)<br>"... the downloaded profile can be potentially modified in such a way, so that the operator loses control over the profile (no ability for remote control / no ability to disable / invalidate it, etc.), the operator can be provided with a completely false view of the profile state (the result of its remote management ops in particular) or all of its activity can be subject to monitoring (vide rogue apps mimicking / proxying behavior of real ones)"<br><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/esim" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>esim</span></a> <a href="https://infosec.exchange/tags/android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>android</span></a> <a href="https://infosec.exchange/tags/iphone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iphone</span></a><br><a href="https://security-explorations.com/esim-security.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">security-explorations.com/esim</span><span class="invisible">-security.html</span></a></p>
Offensive Sequence<p>🚨 CVE-2025-34102: CRITICAL RCE in discontinued CryptoLog PHP! Unauthenticated attackers can chain SQLi (login.php) ➡️ command injection (logshares_ajax.php) for shell access. No patch—migrate or isolate now. <a href="https://radar.offseq.com/threat/cve-2025-34102-cwe-89-improper-neutralization-of-s-7d380c2e" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">radar.offseq.com/threat/cve-20</span><span class="invisible">25-34102-cwe-89-improper-neutralization-of-s-7d380c2e</span></a> <a href="https://infosec.exchange/tags/OffSeq" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OffSeq</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a> <a href="https://infosec.exchange/tags/PHP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PHP</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a></p>
Bill<p>I mean, I know all hardware is software and software has bugs and errors occur under the best circumstances but Christ on a motorbike. How does a company fuck up this badly? And they are clearly going after big customers with 10,000 access points. This shit will be the end of us.</p><p><a href="https://www.securityweek.com/unpatched-ruckus-vulnerabilities-allow-wireless-environment-hacking/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/unpatched-ruc</span><span class="invisible">kus-vulnerabilities-allow-wireless-environment-hacking/</span></a></p><p><a href="https://infosec.exchange/tags/network" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>network</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a></p>
RAZ13L<p>For almost all <a href="https://ciberlandia.pt/tags/android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>android</span></a> users except for <a href="https://ciberlandia.pt/tags/GrapheneOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GrapheneOS</span></a> , you need to disable animations on the hidden developer option menu, and wait until <a href="https://ciberlandia.pt/tags/google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>google</span></a> decides to patch this <a href="https://ciberlandia.pt/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a>, that allows an app to silently access your location/mic/camera, etc and do a lot of nasty things on your device without your consent.</p><p>Paper : <a href="https://taptrap.click/usenix25_taptrap_paper.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">taptrap.click/usenix25_taptrap</span><span class="invisible">_paper.pdf</span></a><br>Website: <br><a href="https://taptrap.click/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">taptrap.click/</span><span class="invisible"></span></a></p>
Kyiv Independent Daily Headlines<p><strong>Wednesday, July 9, 2025</strong></p> <p>Seeing war through the lens of Putin’s narcissism — ‘Torture was not just cruel, it was inhuman’ — Ukrainian soldier dies weeks after release from Russian captivity — Ukraine sanctions 5 Chinese firms for supplying components used in Russian drones — Russia’s Black Sea Fleet shrinks presence in key Crimean bay — Russia’s crude exports fall to lowest level since February … and more</p> <p><a href="https://activitypub.writeworks.uk/2025/07/wednesday-july-9-2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">activitypub.writeworks.uk/2025</span><span class="invisible">/07/wednesday-july-9-2025/</span></a></p>
erAck<p>Belgium is unsafe for CVD (coordinated vulnerability disclosure)<br><a href="https://floort.net/posts/belgium-unsafe-for-cvd/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">floort.net/posts/belgium-unsaf</span><span class="invisible">e-for-cvd/</span></a></p><p><a href="https://social.tchncs.de/tags/CVD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVD</span></a> <a href="https://social.tchncs.de/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://social.tchncs.de/tags/coordinated" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>coordinated</span></a> <a href="https://social.tchncs.de/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://social.tchncs.de/tags/disclosure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>disclosure</span></a> <a href="https://social.tchncs.de/tags/Belgium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Belgium</span></a></p>