Seclog - #135

RosecurifyRosecurify
3 min read

"In cyber warfare, deception is the strongest firewall." - The Art of Cyber War

๐Ÿ“š SecMisc

  • HTTP/1.1 Insecure, New Desync Attacks โ€“ HTTP/1.1 is described as inherently insecure. James Kettle will reveal new classes of desync attack that compromised multiple CDNs. Read More

  • Django Celebrates 20th Birthday โ€“ The popular web framework, Django, celebrates its 20th birthday. The project began with its first public commit on July 13th, 2005, and has since seen over 400 releases. djangoproject.com

  • MITRE AADAPTโ„ข for Digital Assets โ€“ MITRE AADAPTโ„ข is a knowledge base outlining adversary tactics and techniques for digital asset management systems. Modeled after MITRE ATT&CKยฎ, it complements existing frameworks with real-world attack data. mitre.org

  • XSS Persists in Frameworks Era โ€“ Despite robust defensive mechanisms in frameworks, XSS still persists. New developments like React v19 disabling javascript: scheme URLs aim to neutralize more attack vectors. Read More

  • Next.js Race-Condition Exploitation Research โ€“ A new research piece details the conditioned exploitation of an intended race-condition in the Next.js framework, aiming to bypass previous patches. Read More

  • Cloudflare 1.1.1.1 Outage Post-Mortem โ€“ Cloudflare explains the 1.1.1.1 incident on July 14, 2025, attributing the outage to a misconfiguration of legacy systems used for advertising its IP addresses. Read More

  • Homebrew Misused in macOS Malware Campaign โ€“ A recent incident reveals that Homebrew, a popular macOS package manager, was misused to deliver macOS malware, adding to cases where this trusted tool has been exploited. Read More

  • Weaponizing Windows Drivers for Exploitation โ€“ This guide explains how to analyze and exploit vulnerable drivers in Windows, detailing their role in interfacing with the kernel. Read More

  • Git Clone Recursive RCE Vulnerability โ€“ A new critical vulnerability, CVE-2025-48384, allows remote code execution on Unix-like platforms via git clone --recursive on untrusted repositories. Read More

  • XBOW: AI-Powered Security Pentester โ€“ XBOW is introduced as an AI-powered security pentester designed to automate and enhance web application security efforts. Read More

  • Phishing with Gemini Prompt Injection โ€“ A prompt-injection vulnerability in Google Gemini for Workspace allows attackers to hide malicious instructions in emails, which, when summarized, appends a fake phishing warning. Read More

  • Passkey Encryption with Typage (Age) โ€“ Typage is a TypeScript implementation of the age file encryption format, supporting native age recipients, passphrase encryption, and ASCII armoring. It runs across various JavaScript runtimes and browsers. filippo.io

  • OpenAI Bio Bug Bounty Program โ€“ OpenAI has launched a bio bug bounty to strengthen safeguards for advanced AI in biology, inviting researchers to find a "universal jailbreak" for its models. Read More

  • Critical RCE in MCP-Remote Project โ€“ JFrog Security discovered CVE-2025-6514, a critical (CVSS 9.6) RCE vulnerability in the mcp-remote project, posing a full system compromise risk. Read More

  • Understanding CodeQL for Vulnerability Analysis โ€“ This summary provides a flow chart detailing how CodeQL does its magic to unearth vulnerabilities. Read More

๐Ÿ’ป SecGit

  • Android RE Workbench for VS Code โ€“ APKLab integrates Android reverse-engineering tools directly into VS Code. Explore on GitHub

  • Chrome X-Browser-Validation Reversing โ€“ A toolkit for reverse-engineering Chrome's private x-browser-validation header used for integrity checks. Explore on GitHub

  • Docker Layer Exploration Tool โ€“ Dive inspects each layer in a Docker image for optimization and security analysis. Explore on GitHub

  • Playwright Captcha Automation Solution โ€“ Solves Cloudflare Turnstile/Interstitial and reCAPTCHA v2/v3 challenges via click or API. Explore on GitHub

  • BotBrowser Bypasses Anti-Bot Protections โ€“ A modified Chromium core designed to evade Cloudflare, Akamai, hCaptcha, and reCAPTCHA. Explore on GitHub

  • Zip Smuggling via LNK Files โ€“ Embeds hidden data in zip files that can be extracted via PowerShell using Windows shortcuts. Explore on GitHub

  • Detecting Copied Code Across Repos โ€“ Vendetect identifies vendored or copy-pasted code, with or without attribution. Explore on GitHub

  • Open-Source CVE Monitoring Platform โ€“ OpenCVE is a platform to track and receive alerts on new vulnerabilities. Explore on GitHub

For suggestions and any feedback, please contact: securify@rosecurify.com

0
Subscribe to my newsletter

Read articles from Rosecurify directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Rosecurify
Rosecurify