Details: buff.ly/xexR3dP
Details: buff.ly/xexR3dP
Details and mitigation: buff.ly/x6gPiPf 🧵 1/4
Details and mitigation: buff.ly/x6gPiPf 🧵 1/4
#ElysiaJS #CVE202566456 #RCE #AppSec #NodeSecurity #TypeScript 🧵1/5
#ElysiaJS #CVE202566456 #RCE #AppSec #NodeSecurity #TypeScript 🧵1/5
#SupplyChainSecrity #Vulnerability #ProductSecurity #InformationSecurity #CyberSecurity #Patch #Zitadel
#SupplyChainSecrity #Vulnerability #ProductSecurity #InformationSecurity #CyberSecurity #Patch #Zitadel
Read "Inside Shai-Hulud's Maw": buff.ly/N5Men7d
Read "Inside Shai-Hulud's Maw": buff.ly/N5Men7d
Malicious SVG/HTML in Markdown notes can execute JavaScript when downloaded as PDF, enabling session token theft. All users are at risk. Affects versions < 0.6.37.
buff.ly/EVaSAOB
buff.ly/RFK4ZIl
Malicious SVG/HTML in Markdown notes can execute JavaScript when downloaded as PDF, enabling session token theft. All users are at risk. Affects versions < 0.6.37.
buff.ly/EVaSAOB
buff.ly/RFK4ZIl
If you run React Server Components, Next.js, or dependent frameworks, patch immediately.
More details: buff.ly/PPd3QsF
#AppSec
If you run React Server Components, Next.js, or dependent frameworks, patch immediately.
More details: buff.ly/PPd3QsF
#AppSec
List of extensions and additional info: buff.ly/wxviY9d
#SupplyChainSecurity #DeveloperSecurity #ExtensionSecurity #VisualStudioCode
List of extensions and additional info: buff.ly/wxviY9d
#SupplyChainSecurity #DeveloperSecurity #ExtensionSecurity #VisualStudioCode
Get details and analysis here: buff.ly/T63yQWd
Get details and analysis here: buff.ly/T63yQWd
#Vulnerable versions with #SCIM provisioning enabled can let a malicious SCIM client use a numeric “externalId" to override user IDs, risking impersonation or privilege escalation.
#Vulnerable versions with #SCIM provisioning enabled can let a malicious SCIM client use a numeric “externalId" to override user IDs, risking impersonation or privilege escalation.
A new SSRF vulnerability in New API allows bypassing a previous fix using HTTP 302 redirects, enabling malicious requests to access internal resources by only validating the first URL.
Patch: Update to v0.9.6
buff.ly/iPMLSlT
A new SSRF vulnerability in New API allows bypassing a previous fix using HTTP 302 redirects, enabling malicious requests to access internal resources by only validating the first URL.
Patch: Update to v0.9.6
buff.ly/iPMLSlT
buff.ly/TRAMPpN
#VSCode #Malware #SupplyChainSecurity #AppSec 🧵1/5
buff.ly/TRAMPpN
#VSCode #Malware #SupplyChainSecurity #AppSec 🧵1/5
Details ➜ buff.ly/a5dVfj5
#vLLM #AIVulnerability #LLMSecurity #PyTorch #AppSec #DevSecOps
🧵1/4
Details ➜ buff.ly/a5dVfj5
#vLLM #AIVulnerability #LLMSecurity #PyTorch #AppSec #DevSecOps
🧵1/4
Read more: buff.ly/LSA5qfq
#AppSec #SupplyChainSecurity #DoS #HAProxy 🧵1/6
Read more: buff.ly/LSA5qfq
#AppSec #SupplyChainSecurity #DoS #HAProxy 🧵1/6
Admins and CI/CD owners should review immediately.
#7zip #RCE #DirectoryTraversal #AppSec #SoftwareSecurity
buff.ly/k6Tv0YL
🧵1/4
Admins and CI/CD owners should review immediately.
#7zip #RCE #DirectoryTraversal #AppSec #SoftwareSecurity
buff.ly/k6Tv0YL
🧵1/4
CVE-2025-64756 (CVSS 7.5) details + fixes: buff.ly/Nwqkdfz
#NPM #JavaScript #OpenSourceSecurity #AppSec #SupplyChainSecurity
🧵1/4
CVE-2025-64756 (CVSS 7.5) details + fixes: buff.ly/Nwqkdfz
#NPM #JavaScript #OpenSourceSecurity #AppSec #SupplyChainSecurity
🧵1/4
Full roundup:
buff.ly/YrPW8GN
🧵1/4
Full roundup:
buff.ly/YrPW8GN
🧵1/4
buff.ly/VnHjSrH
buff.ly/VnHjSrH
#SupplyChainSecurity #NPM #CyberThreat #ContagiousInterview 🧵1/6
#SupplyChainSecurity #NPM #CyberThreat #ContagiousInterview 🧵1/6
🔗 buff.ly/wN1crc3
🧵1/4
🔗 buff.ly/wN1crc3
🧵1/4
CVE-2025-64459 (CVSSv3 9.1) → buff.ly/kfcbY7e
A newly disclosed flaw affects:
• 5.1 (< 5.1.14)
• 4.2 (< 4.2.26)
• 5.2 (< 5.2.8)
#AppSec #Python #WebSecurity 🧵1/5
CVE-2025-64459 (CVSSv3 9.1) → buff.ly/kfcbY7e
A newly disclosed flaw affects:
• 5.1 (< 5.1.14)
• 4.2 (< 4.2.26)
• 5.2 (< 5.2.8)
#AppSec #Python #WebSecurity 🧵1/5
buff.ly/4ay9Kvz
#AIsecurity #CyberSecurity #AppSec #ThreatIntel 🧵1/3
buff.ly/4ay9Kvz
#AIsecurity #CyberSecurity #AppSec #ThreatIntel 🧵1/3
What actually happened: www.pcgamer.com/software/sec...
What actually happened: www.pcgamer.com/software/sec...