Seclog - #138


"A wise warrior knows that every click is a potential weapon in the digital battlefield." - The Art of Cyber War
๐ SecMisc
Attacker File Extensions Database for Threat Intel โ Filesec.io provides a database of file extensions used by attackers, helping you stay up-to-date with threat intelligence. You can contribute to expand this valuable resource. Filesec.io
Red-Teaming AI Models for Vulnerabilities โ A Kaggle competition challenges participants to find previously undiscovered flaws and vulnerabilities in the gpt-oss-20b model. This aims to improve AI security through community red-teaming efforts. Kaggle
Vulnerability Vibes: Network, Learn, Connect โ Vulnerability Vibes offers an opportunity to network and make new connections within the security industry. Attendees can learn from the hackers themselves, understanding both industry trends and attacker tactics. Vulnerabilityvibes.com
๐ฐ SecLinks
HTTP/1.1 Desynchronization Endgame โ Protocol deemed inherently insecure. Read More
AWS SAR IAM Action Nuances โ AWS Service Authorization References (SAR) and IAM action risks. Read More
AWS Account Termination Without Warning โ 10-year-old AWS account deleted without recovery. Read More
ORM Injection Crypto Theft Exploit โ Cryptocurrency theft via ORM injection in online game. Read More
CVE-2025-29891 Apache Camel RCE โ Header injection RCE via misconfiguration. Read More
Squid Proxy Critical RCE Vulnerability โ SQUID-2025:1 flaw enables remote code execution. Read More
Adobe Experience Manager Pre-Auth Flaws โ Critical vulnerabilities in AEM Forms via Struts DevMode. Read More
Jenkins RCE via Git Parameter Plugin โ CVE-2025-53652 allows unauthenticated RCE. Read More
Fastly HTTP/1.1 Attack Resilience โ Parser robustness protects against desync. Read More
1Panel Agent Certificate Bypass โ GHSA-8j63-96wh-wh3j allows arbitrary code execution. Read More
Buttercup Open-Source Release โ AI Cyber Challenge runner-up CRS open-sourced. Read More
Blind SSRF to File Reading Oracle โ Turning SSRF into a file oracle. Read More
Copilot Studio AIjacking Data Theft โ Prompt injection leads to full data exfiltration. Read More
Security Products and Human Psychology โ Security tools linked to 7 deadly sins. Read More
HashiCorp Vault Auth Flaws Exposed โ Zero-day in authentication & authorization. Read More
Safari PermissionJacking Privacy Risk โ Permission hijacking in Safari. Read More
Zscaler SAML Auth Bypass Advisory โ CVE-2025-54982 missing signature verification. Read More
Confluence Auth Bypass via XSS โ iOS-specific XSS leads to auth bypass. Read More
FileJacking Initial Access with File System API โ Experimental API allows direct file editing. Read More
Introducing AI-powered Exploit Verification and Triage โ AI to triage vulnerabilities. Read More
Cursor IDE's MCP Vulnerability Discovery โ MCP flaw in AI IDE allows local command execution. Read More
๐ฆ SecX
- Brave HTML Serialization Vulnerability โ Demo shows broken serialization. Watch Here
๐ป SecGit
Quack PHP Deserialization Protector โ Runtime validation against PHP deserialization attacks. Explore on GitHub
Finch TLS Fingerprint-Aware Proxy โ Reverse proxy blocks/reroutes traffic using JA3/JA4 fingerprints. Explore on GitHub
Kwcmd Hidden Linux Backdoor โ Persistent access via disguised commands. Explore on GitHub
Beelzebub AI Honeypot Framework โ AI for virtualization deception environments. Explore on GitHub
Signal Key Transparency Auditor โ Audits Signal's Merkle^2-style logs. Explore on GitHub
Claude-Powered Security Code Review โ Uses Claude AI to analyze commits for vulnerabilities. Explore on GitHub
ECSpace AWS ECS Credential Theft โ IAM credential theft in EC2 launch mode. Explore on GitHub
Viper AI Red Teaming Platform โ AI-powered adversary simulation. Explore on GitHub
For suggestions and any feedback, please contact: securify@rosecurify.com
Subscribe to my newsletter
Read articles from Rosecurify directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
