appsec.fyi

Weekly Changelog

346 new resources added across 25 topics this week.

Apr 19 — Apr 26, 2026

Supply Chain +57

DateResourceSummary
2026-04-23Checkmarx Supply Chain Attack Exploits Docker Images and CI/CD PipelinesCheckmarx Supply Chain Attack Exploits Docker Images and CI/CD Pipelines  https://ift.tt/fPkwYx0
2026-04-23Shai-Hulud: The Third Coming Bitwarden CLI Backdoored in Latest Supply Chain CampaignShai-Hulud: The Third Coming — Bitwarden CLI Backdoored in Latest Supply Chain Campaign https://ift.tt/OsEXhPW
2026-04-23Tenable finds Microsoft GitHub flaw risking supply chainsTenable finds Microsoft GitHub flaw risking supply chains https://ift.tt/VXu8wM2
2026-04-23New Checkmarx supply-chain breach affects KICS analysis toolNew Checkmarx supply-chain breach affects KICS analysis tool https://ift.tt/p2R0T8O
2026-04-23Checkmarx Docker Hub repository compromised with malicious imagesCheckmarx Docker Hub repository compromised with malicious images https://ift.tt/Cpy7bme
2026-04-23Namastex npm packages compromised in CanisterWorm supply chain attackNamastex npm packages compromised in ‘CanisterWorm’ supply chain attack https://ift.tt/hbNKaTp
2026-04-23No Off Season: Three Supply Chain Campaigns Hit npm PyPI and Docker Hub in 48 HoursNo Off Season: Three Supply Chain Campaigns Hit npm, PyPI, and Docker Hub in 48 Hours https://ift.tt/fIX26Eo
2026-04-23No Off Season: Three Supply Chain Campaigns Hit npm PyPI and Docker Hub in 48 HoursNo Off Season: Three Supply Chain Campaigns Hit npm, PyPI, and Docker Hub in 48 Hours https://ift.tt/JDfPrIS
2026-04-23Xinference PyPI Package Compromised With Malicious Code to Steal Cloud CredentialsXinference PyPI Package Compromised With Malicious Code to Steal Cloud Credentials https://ift.tt/MALwDp9
2026-04-23Malicious Docker Images and VS Code Extensions Compromise Checkmarx Supply ChainMalicious Docker Images and VS Code Extensions Compromise Checkmarx Supply Chain https://ift.tt/xvOUGSi
2026-04-23Checkmarx KICS Docker Repo Hijacked in Malicious Code Injection AttackCheckmarx KICS Docker Repo Hijacked in Malicious Code Injection Attack https://ift.tt/ocmvb8S
2026-04-23Xinference PyPI Breach Exposes Developers to Cloud Credential TheftXinference PyPI Breach Exposes Developers to Cloud Credential Theft https://ift.tt/Tqo2NKg
2026-04-23axios npm Compromise: The Ultimate Supply Chain Scariesaxios npm Compromise: The Ultimate Supply Chain Scaries https://ift.tt/ZmiRfkp
2026-04-23Xinference allegedly hacked by TeamPCP Malicious Package In PyPiXinference allegedly hacked by TeamPCP, Malicious Package In PyPi https://ift.tt/vMwcIWt
2026-04-23AI Supply-Chain Monitor Identifies Critical Axios AttackAI Supply-Chain Monitor Identifies Critical Axios Attack https://ift.tt/jMkYqAz
2026-04-23Aikido Security Launches Endpoint Protection for Developer Devices as Software Supply Chain Attacks Hit Unprecedented ScaleAikido Security Launches Endpoint Protection for Developer Devices as Software Supply Chain Attacks Hit Unprecedented Scale https://ift.tt/sLawUZo
2026-04-22Another npm supply chain worm is tearing through dev environmentsAnother npm supply chain worm is tearing through dev environments https://ift.tt/mrPsh3p
2026-04-22Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer TokensSelf-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens https://ift.tt/ch1xmSL
2026-04-22Supply Chain Attacks Are Getting WorseHow to Shrink Your ExposureSupply Chain Attacks Are Getting Worse—How to Shrink Your Exposure https://ift.tt/A90d4Bp
2026-04-22Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply ChainMalicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain https://ift.tt/uA7BI5U
2026-04-22Hypersonic Supply Chain Attacks: One Solution That Didn't Need to Know the PayloadHypersonic Supply Chain Attacks: One Solution That Didn't Need to Know the Payload https://ift.tt/bKtc9JB
2026-04-22Flaw in Microsoft-owned GitHub repository allowed RCE via issue submissionFlaw in Microsoft-owned GitHub repository allowed RCE via issue submission https://ift.tt/gj6ZlMi
2026-04-22New npm supply-chain attack self-spreads to steal auth tokensNew npm supply-chain attack self-spreads to steal auth tokens https://ift.tt/jx1785i
2026-04-22Axios npm Supply Chain Attack: 83M Downloads HitAxios npm Supply Chain Attack: 83M Downloads Hit
2026-04-22Axios npm Hijack 2026: Everything You Need to KnowAxios npm Hijack 2026: Everything You Need to Know
2026-04-22TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV FilesTeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files
2026-04-22litellm: Credential Stealer Hidden in PyPI Wheellitellm: Credential Stealer Hidden in PyPI Wheel
2026-04-22What's Coming to Our GitHub Actions 2026 Security RoadmapWhat's Coming to Our GitHub Actions 2026 Security Roadmap
2026-04-22Shai-Hulud npm Supply Chain Attack: New Compromised Packages DetectedShai-Hulud npm Supply Chain Attack: New Compromised Packages Detected
2026-04-22LiteLLM and Telnyx Compromised on PyPI: Tracing the TeamPCP Supply Chain CampaignLiteLLM and Telnyx Compromised on PyPI: Tracing the TeamPCP Supply Chain Campaign
2026-04-22Keeping Your GitHub Actions Secure Part 1: Preventing Pwn RequestsKeeping Your GitHub Actions Secure Part 1: Preventing Pwn Requests
2026-04-22GitHub Actions Security Pt 1: Attacks & Defenses (Wiz)GitHub Actions Security Pt 1: Attacks & Defenses (Wiz)
2026-04-22Are SBOMs Failing? Supply Chain Attacks Rise as Security Teams Struggle With SBOM DataAre SBOMs Failing? Supply Chain Attacks Rise as Security Teams Struggle With SBOM Data https://ift.tt/GMVqgjU
2026-04-22Axios supply chain attack deploys multi-OS malwareAxios supply chain attack deploys multi-OS malware https://ift.tt/qVLszCa
2026-04-22AI-Driven Endpoints Highlight Expanding Software Supply Chain RiskAI-Driven Endpoints Highlight Expanding Software Supply Chain Risk https://ift.tt/Op8eSmM
2026-04-22Aikido Unveils Endpoint Security as Supply Chain Attacks Hit DevelopersAikido Unveils Endpoint Security as Supply Chain Attacks Hit Developers https://ift.tt/aDBmAct
2026-04-21Critical Microsoft GitHub Flaw Highlights Dangers to CI/CD Pipelines: TenableCritical Microsoft GitHub Flaw Highlights Dangers to CI/CD Pipelines: Tenable https://ift.tt/nvuCc9x
2026-04-21CISA urges security teams to view environments following axios compromiseCISA urges security teams to view environments following axios compromise https://ift.tt/JYRaA0z
2026-04-21CISA Warns Axios npm Package Was Compromised in Major Supply Chain AttackCISA Warns Axios npm Package Was Compromised in Major Supply Chain Attack https://ift.tt/bSQfTkG
2026-04-21Aikido Security launches Endpoint to secure AI development and mitigate supply chain attacksAikido Security launches Endpoint to secure AI development and mitigate supply chain attacks https://ift.tt/pWgtqSF
2026-04-21Introducing Endpoint Protection: Security for Developer DevicesIntroducing Endpoint Protection: Security for Developer Devices https://ift.tt/2w1NTUs
2026-04-21Aikido Security Launches Endpoint Protection for Developer Devices as Software Supply Chain Attacks Hit Unprecedented ScaleAikido Security Launches Endpoint Protection for Developer Devices as Software Supply Chain Attacks Hit Unprecedented Scale https://ift.tt/UoCFdbH
2026-04-21CISA Warns Axios npm Package Was Compromised in Major Supply Chain AttackCISA Warns Axios npm Package Was Compromised in Major Supply Chain Attack https://ift.tt/eymP7Vs
2026-04-21CISA Warns Compromised Axios npm Package Fueled Major Supply Chain AttackCISA Warns Compromised Axios npm Package Fueled Major Supply Chain Attack https://ift.tt/3Sh8QXg
2026-04-21The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment VariablesThe Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment Variables https://ift.tt/jIBeCuh
2026-04-21The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment VariablesThe Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment Variables https://ift.tt/K8Z5lwR
2026-04-21The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment VariablesThe Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment Variables https://ift.tt/D9r2QqY
2026-04-21Astrix Security Highlights Rising Risk in OAuth-Driven Supply Chain AttacksAstrix Security Highlights Rising Risk in OAuth-Driven Supply Chain Attacks https://ift.tt/pdx7G9Z
2026-04-20The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment VariablesThe Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment Variables https://ift.tt/60RoEYV
2026-04-20Vercel incident falls short of a supply chain attackVercel incident falls short of a supply chain attack https://ift.tt/mfiYhux
2026-04-20Supply Chain Attack Hits Vercel: User Data is Being Sold on BreachForums For $2MSupply Chain Attack Hits Vercel: User Data is Being Sold on BreachForums For $2M https://ift.tt/4aw2YkZ
2026-04-20Why the Axios attack proves AI is mandatory for supply chain securityWhy the Axios attack proves AI is mandatory for supply chain security https://ift.tt/AnX6trC
2026-04-20Aikido Security Launches Endpoint Protection for Developer Devices as Software Supply Chain Attacks Hit Unprecedented ScaleAikido Security Launches Endpoint Protection for Developer Devices as Software Supply Chain Attacks Hit Unprecedented Scale https://ift.tt/rNiAjU3
2026-04-20Aikido Endpoint offers developers additional protection against supply chain attacksAikido Endpoint offers developers additional protection against supply chain attacks https://ift.tt/8yt0jbA
2026-04-20Aikido Security Launches Endpoint Protection for Developer Devices as Software Supply Chain Attacks Hit Unprecedented ScaleAikido Security Launches Endpoint Protection for Developer Devices as Software Supply Chain Attacks Hit Unprecedented Scale https://ift.tt/sVFAYcE
2026-04-20New security agent helps fight software supply chain attacksNew security agent helps fight software supply chain attacks https://ift.tt/tRoy3LB
2026-04-20Aikido launches Endpoint to secure AI-native developer workflowsAikido launches Endpoint to secure AI-native developer workflows https://ift.tt/ULhxSu6

RCE +36

DateResourceSummary
2026-04-23Anthropic's model context protocol includes a critical remote code execution vulnerabilityAnthropic's model context protocol includes a critical remote code execution vulnerability https://ift.tt/uJoCxjU
2026-04-22Mozilla Firefox 150 Released With Fixes for Multiple Code Execution VulnerabilitiesMozilla Firefox 150 Released With Fixes for Multiple Code Execution Vulnerabilities https://ift.tt/6dEs8aC
2026-04-22Terrarium Sandbox: Critical Vulnerability Allows Root CodeTerrarium Sandbox: Critical Vulnerability Allows Root Code https://ift.tt/xt7SA8a
2026-04-22Firefox 150 Released With Fixes for Multiple Code Execution VulnerabilitiesFirefox 150 Released With Fixes for Multiple Code Execution Vulnerabilities https://ift.tt/oKqHTf5
2026-04-22Critical SGLang Flaw (CVE-2026-5760) Enables RCE via Malicious AI ModelsCritical SGLang Flaw (CVE-2026-5760) Enables RCE via Malicious AI Models
2026-04-22CVE-2025-68454: Craft CMS Twig SSTI RCE VulnerabilityCVE-2025-68454: Craft CMS Twig SSTI RCE Vulnerability
2026-04-2215,000 Jenkins Servers at Risk from RCE Vulnerability (CVE-2025-53652)15,000 Jenkins Servers at Risk from RCE Vulnerability (CVE-2025-53652)
2026-04-22React2Shell (CVE-2025-55182): RSC Flight Decoder Remote Code ExecutionReact2Shell (CVE-2025-55182): RSC Flight Decoder Remote Code Execution
2026-04-22Ivanti EPMM: Another Pre-Auth RCE (CVE-2026-1281 and CVE-2026-1340)Ivanti EPMM: Another Pre-Auth RCE (CVE-2026-1281 and CVE-2026-1340)
2026-04-22CVE-2025-57738: Apache Syncope Groovy Injection RCECVE-2025-57738: Apache Syncope Groovy Injection RCE
2026-04-22Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply ChainAnthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain
2026-04-22Critical RCE Vulnerability in Anthropic MCP Inspector (CVE-2025-49596)Critical RCE Vulnerability in Anthropic MCP Inspector (CVE-2025-49596)
2026-04-22CVE-2025-24893: XWiki SSTI Unauthenticated RCE ExploitCVE-2025-24893: XWiki SSTI Unauthenticated RCE Exploit
2026-04-22CVE-2026-34197: ActiveMQ RCE via Jolokia APICVE-2026-34197: ActiveMQ RCE via Jolokia API
2026-04-22Google Antigravity in Crosshairs of Security Researchers CybercriminalsGoogle Antigravity in Crosshairs of Security Researchers, Cybercriminals https://ift.tt/ZgkxGsP
2026-04-22Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution Container EscapeCohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape https://ift.tt/1Oulkrs
2026-04-22Fake SVG puts 750000 websites at risk: hackers can seize the web serverFake SVG puts 750,000 websites at risk: hackers can seize the web server https://ift.tt/BwtOzhU
2026-04-22Adobe Acrobat Reader: Prototype pollution vulnerability enables remote code executionAdobe Acrobat Reader: Prototype pollution vulnerability enables remote code execution https://ift.tt/6Vm9ieE
2026-04-2122 BRIDGE:BREAK Flaws Expose 20000 Lantronix and Silex Serial-to-IP Converters22 BRIDGE:BREAK Flaws Expose 20,000 Lantronix and Silex Serial-to-IP Converters https://ift.tt/DKsAtmp
2026-04-21Google Fixes Critical RCE Flaw in AI-Based Antigravity ToolGoogle Fixes Critical RCE Flaw in AI-Based Antigravity Tool https://ift.tt/1QOIZsB
2026-04-21Apache Syncope RCE Vulnerability Detailed After Public Exploit Code ReleaseApache Syncope RCE Vulnerability Detailed After Public Exploit Code Release https://ift.tt/hT4dgwi
2026-04-21Actively exploited Apache ActiveMQ flaw impacts 6400 serversActively exploited Apache ActiveMQ flaw impacts 6,400 servers https://ift.tt/TMZ4gHl
2026-04-21Tenable Research Uncovers Remote Code Execution Vulnerability in Microsoft GitHub RepositoryTenable Research Uncovers Remote Code Execution Vulnerability in Microsoft GitHub Repository, https://ift.tt/V1EDXyM
2026-04-21Hackers Could Weaponize GGUF Models to Achieve RCE on SGLang Inference ServersHackers Could Weaponize GGUF Models to Achieve RCE on SGLang Inference Servers https://ift.tt/UTpIVmw
2026-04-21Tenable Research Uncovers Remote Code Execution Vulnerability in Microsoft GitHub Repository Exposing CI/CD Pipeline to Unauthorized Code ExecutionTenable Research Uncovers Remote Code Execution Vulnerability in Microsoft GitHub Repository, Exposing CI/CD Pipeline to Unauthorized Code Execution https://ift.tt/sOHxvXg
2026-04-21Critical Anthropics MCP Vulnerability Enables Remote Code Execution AttacksCritical Anthropic’s MCP Vulnerability Enables Remote Code Execution Attacks https://ift.tt/NgPh5a6
2026-04-21Malicious GGUF Models Could Trigger Remote Code Execution on SGLang ServersMalicious GGUF Models Could Trigger Remote Code Execution on SGLang Servers https://ift.tt/tE3rbwk
2026-04-21SGLang Enables Remote Code Execution via Malicious GGUF ModelsSGLang Enables Remote Code Execution via Malicious GGUF Models https://ift.tt/IRetcHV
2026-04-20Critical RCE vulnerability in protobuf.js; Exploit code publishedCritical RCE vulnerability in protobuf.js; Exploit code published https://ift.tt/LxzVmlR
2026-04-20Google Chrome Multiple VulnerabilitiesGoogle Chrome Multiple Vulnerabilities https://ift.tt/u1NDCGr
2026-04-20iTerm2 Flaw Abuses SSH Integration Escape Sequences to Turn Text Into Code ExecutioniTerm2 Flaw Abuses SSH Integration Escape Sequences to Turn Text Into Code Execution https://ift.tt/l13PHeM
2026-04-20Vulnerability exploitation surges often precede disclosure offering possible early warningsVulnerability exploitation surges often precede disclosure, offering possible early warnings https://ift.tt/UAnQyhJ
2026-04-2052M-Download protobuf.js Library Hit by RCE in Schema Handling52M-Download protobuf.js Library Hit by RCE in Schema Handling https://ift.tt/i1QdNDX
2026-04-20Critical Vulnerability In Flowise Allows Remote Command Execution Via MCP AdaptersCritical Vulnerability In Flowise Allows Remote Command Execution Via MCP Adapters https://ift.tt/NBwdZU2
2026-04-20Cisco ISE Vulnerabilities Enable Remote Code ExecutionCisco ISE Vulnerabilities Enable Remote Code Execution https://ift.tt/I3pcsMW
2026-04-19CISA tells feds to patch 13-year-old Apache ActiveMQ bug under active attackCISA tells feds to patch 13-year-old Apache ActiveMQ bug under active attack https://ift.tt/m82B1ER

AI +23

DateResourceSummary
2026-04-23Six AI Vulnerabilities Three Attack Patterns One Dangerous Service GapSix AI Vulnerabilities, Three Attack Patterns, One Dangerous Service Gap https://ift.tt/STbWHA5
2026-04-23AI-powered scanner vulnerabilitiesAI-powered scanner vulnerabilities https://ift.tt/re6cDjZ
2026-04-23Anthropic's model context protocol includes a critical remote code execution vulnerabilityAnthropic's model context protocol includes a critical remote code execution vulnerability https://ift.tt/Hfb3ygq
2026-04-22Massive compromise hits LiteLLM and the whole AI developers community: how did it happen?Massive compromise hits LiteLLM and the whole AI developers community: how did it happen? https://ift.tt/kWQ0dJB
2026-04-22Three AI coding agents leaked secrets through a single prompt injection. One vendor's system card predicted itThree AI coding agents leaked secrets through a single prompt injection. One vendor's system card predicted it https://ift.tt/smH86bY
2026-04-22You're Simulating the Wrong Attacker: Who Matters in AI Red TeamingYou're Simulating the Wrong Attacker: Who Matters in AI Red Teaming
2026-04-22DeepTeam: Open-Source Framework to Red Team LLMs and LLM SystemsDeepTeam: Open-Source Framework to Red Team LLMs and LLM Systems
2026-04-22Claude Jailbreaking in 2026: What Repello's Red Teaming Data ShowsClaude Jailbreaking in 2026: What Repello's Red Teaming Data Shows
2026-04-22AI-Infra-Guard: Full-Stack AI Red Teaming PlatformAI-Infra-Guard: Full-Stack AI Red Teaming Platform
2026-04-22AI Red Teaming Playground Labs (Microsoft)AI Red Teaming Playground Labs (Microsoft)
2026-04-22HackerOne: LLM01: Invisible Prompt InjectionProgram: HackerOne Severity: medium Weakness: LLM01: Prompt Injection ## Description Hey team, Hai is vulnerable to invisible prompt injection via Unicode tag characters. ## Reproduction steps 1. ...
2026-04-22When AI Meets the Web: Prompt Injection Risks in Third-Party AI Chatbot PluginsWhen AI Meets the Web: Prompt Injection Risks in Third-Party AI Chatbot Plugins
2026-04-22Prompt Injection Attacks on Agentic Coding Assistants: A Systematic AnalysisPrompt Injection Attacks on Agentic Coding Assistants: A Systematic Analysis
2026-04-22Prompt Injection 2.0: Hybrid AI ThreatsPrompt Injection 2.0: Hybrid AI Threats
2026-04-22Architecting Secure AI Agents: System-Level Defenses Against Indirect Prompt InjectionArchitecting Secure AI Agents: System-Level Defenses Against Indirect Prompt Injection
2026-04-22Anthropic's Model Context Protocol includes a critical remote code execution vulnerability newly discovered exploit puts 200000 AI servers at riskAnthropic's Model Context Protocol includes a critical remote code execution vulnerability — newly discovered exploit puts 200,000 AI servers at risk https://ift.tt/KLVv9gP
2026-04-21The 'by design' security flaw of Model Context Protocol (MCP)The 'by design' security flaw of Model Context Protocol (MCP) https://ift.tt/kotl0Is
2026-04-21Prompt injection turned Googles Antigravity file search into RCEPrompt injection turned Google’s Antigravity file search into RCE https://ift.tt/kx2siuv
2026-04-21Claude Code Gemini CLI and GitHub Copilot Vulnerable to Prompt Injection via GitHub CommentsClaude Code, Gemini CLI, and GitHub Copilot Vulnerable to Prompt Injection via GitHub Comments https://ift.tt/FS25xif
2026-04-21Google Patches Antigravity IDE Flaw Enabling Prompt Injection Code ExecutionGoogle Patches Antigravity IDE Flaw Enabling Prompt Injection Code Execution https://ift.tt/WhCTNuU
2026-04-20Vuln in Googles Antigravity AI agent manager could escape sandbox give attackers remote code executionVuln in Google’s Antigravity AI agent manager could escape sandbox, give attackers remote code execution https://ift.tt/MnhvV7G
2026-04-20Anthropic MCP Hit by Critical Vulnerability Enabling Remote Code ExecutionAnthropic MCP Hit by Critical Vulnerability Enabling Remote Code Execution https://ift.tt/4HM1zP0
2026-04-20Critical Anthropic MCP Vulnerability Enables Remote Code Execution AttacksCritical Anthropic MCP Vulnerability Enables Remote Code Execution Attacks https://ift.tt/sjNEzGL

API Security +21

DateResourceSummary
2026-04-23New LMDeploy Vulnerability Exploited in the Wild Just 12 Hours After Public AdvisoryNew LMDeploy Vulnerability Exploited in the Wild Just 12 Hours After Public Advisory https://ift.tt/txmoBfy
2026-04-23Microsoft issues out-of-band patch for critical security flaw in update to ASP.NET CoreMicrosoft issues out-of-band patch for critical security flaw in update to ASP.NET Core https://ift.tt/ACNkfaG
2026-04-22Microsoft releases emergency patches for critical ASP.NET flawMicrosoft releases emergency patches for critical ASP.NET flaw https://ift.tt/C9a1UoS
2026-04-22A Deep Dive on the Most Critical API Vulnerability: BOLAA Deep Dive on the Most Critical API Vulnerability: BOLA
2026-04-22What Is Broken Object Property Level Authorization?What Is Broken Object Property Level Authorization?
2026-04-22What Is Broken Object Level Authorization?What Is Broken Object Level Authorization?
2026-04-22This Is How I Hacked an API Using Mass Assignment VulnerabilityThis Is How I Hacked an API Using Mass Assignment Vulnerability
2026-04-22CVE-2026-34839: CORS Vulnerability in Glances REST APICVE-2026-34839: CORS Vulnerability in Glances REST API
2026-04-22API ThreatStats Report 2026API ThreatStats Report 2026
2026-04-22VAmPI: Vulnerable REST API with OWASP Top 10 VulnerabilitiesVAmPI: Vulnerable REST API with OWASP Top 10 Vulnerabilities
2026-04-22API4:2023 Unrestricted Resource ConsumptionAPI4:2023 Unrestricted Resource Consumption
2026-04-221H 2026 State of AI and API Security Report (Salt)1H 2026 State of AI and API Security Report (Salt)
2026-04-22PortSwigger Lab: Exploiting a Mass Assignment VulnerabilityPortSwigger Lab: Exploiting a Mass Assignment Vulnerability
2026-04-21Lovable left thousands of projects exposed for 48 days and the vibe coding security crisis is only getting worseLovable left thousands of projects exposed for 48 days, and the vibe coding security crisis is only getting worse https://ift.tt/LVCAuWM
2026-04-21Lovable AI App Builder Reportedly Exposes Thousands of Project Data via API FlawLovable AI App Builder Reportedly Exposes Thousands of Project Data via API Flaw https://ift.tt/rUbhJN8
2026-04-21Vibe coding upstart Lovable denies data leak cites 'intentional behavior' then throws HackerOne under the busVibe coding upstart Lovable denies data leak, cites 'intentional behavior,' then throws HackerOne under the bus https://ift.tt/oy8L9Ec
2026-04-21Lovables API flaw exposed private project data from the $6.6 billion AI app builder used by Nvidia and Microsoft teamsLovable’s API flaw exposed private project data from the $6.6 billion AI app builder used by Nvidia and Microsoft teams https://ift.tt/E5xzyKD
2026-04-21Lovable AI App Builder Hit by Reported API Flaw Exposing Thousands of ProjectsLovable AI App Builder Hit by Reported API Flaw Exposing Thousands of Projects https://ift.tt/asxTLXh
2026-04-21Lovable Left Thousands of Projects Exposed for 48 Days And Still Hasn't Fixed ItLovable Left Thousands of Projects Exposed for 48 Days — And Still Hasn't Fixed It https://ift.tt/jFxufgQ
2026-04-21API Security Risks Rise as AI Adoption AcceleratesAPI Security Risks Rise as AI Adoption Accelerates https://ift.tt/oL4A7vV
2026-04-20Lovable AI App Builder Reportedly Exposes Customer Data From Projects via Unpatched API FlawLovable AI App Builder Reportedly Exposes Customer Data From Projects via Unpatched API Flaw https://ift.tt/U5uy4dg

SSRF +17

DateResourceSummary
2026-04-24LMDeploy SSRF alert CVE-2026-33626 exploited within hours Attackers can access internal services & cloud metadata. Update now & restrict outbound requests.vulert.com/blog/lmdeploy-p #CyberSecurity #SSRF #AIsecurity #Vulert🚨 LMDeploy SSRF alert CVE-2026-33626 exploited within hours ⚠️ Attackers can access internal services & cloud metadata. Update now & restrict outbound requests.vulert.com/blog/lmdeploy-…p #CyberSecuri...
2026-04-24LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of DisclosureLMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure https://ift.tt/8wBTJAc
2026-04-23Attackers Exploit LMDeploy Flaw in the Wild Within 12 Hours of AdvisoryAttackers Exploit LMDeploy Flaw in the Wild Within 12 Hours of Advisory https://ift.tt/xWknlfA
2026-04-23CVE-2026-33626 exposes an SSRF in LMDeploys vision-language image loader. Attackers accessed AWS IMDS scanned local services and confirmed egress within 12 hours. Update to v0.12.3 and enforce IMDSv2. #LMDeploy #SSRF #USA ift.tt/PVn3XMkCVE-2026-33626 exposes an SSRF in LMDeploy’s vision-language image loader. Attackers accessed AWS IMDS, scanned local services, and confirmed egress within 12 hours. Update to v0.12.3 and enforce IMDS...
2026-04-23CVE-2026-33626: A critical SSRF in LMDeploy exploited in under 13 hours. Learn how attackers hijack AI nodes and how to secure your inference cloud now. #CVE202633626 #SSRF #AISecurity #LMDeploy #InfoSec #CyberAttack #CloudSecurity #LLM #PatchNow securityonline.info/cve-2026-33626 pic.x.com/09IZxf21rQCVE-2026-33626: A critical SSRF in LMDeploy exploited in under 13 hours. Learn how attackers hijack AI nodes and how to secure your inference cloud now. #CVE202633626 #SSRF #AISecurity #LMDeploy #Info...
2026-04-22Critical Spring Authorization Server Issue Exposes Systems to XSS and SSRF AttacksCritical Spring Authorization Server Issue Exposes Systems to XSS and SSRF Attacks https://ift.tt/y4laiIW
2026-04-22Critical Spring Authorization Server Flaw Enables XSS Privilege Escalation and SSRFCritical Spring Authorization Server Flaw Enables XSS, Privilege Escalation, and SSRF https://ift.tt/b2pauUc
2026-04-22LibreChat SSRF Bypass via IPv6 Mapped Address ConfusionLibreChat SSRF Bypass via IPv6 Mapped Address Confusion
2026-04-22SSRF Vulnerability: Bypassing Protection with DNS Rebinding AttackSSRF Vulnerability: Bypassing Protection with DNS Rebinding Attack
2026-04-22is-localhost-ip 2.0.0 SSRF via Restrictions Bypass (CVE-2025-9960)is-localhost-ip 2.0.0 SSRF via Restrictions Bypass (CVE-2025-9960)
2026-04-22See-SURF: Tool to Find Potential Vulnerable SSRF ParametersSee-SURF: Tool to Find Potential Vulnerable SSRF Parameters
2026-04-22Hacking Next.js Targets: Advanced SSRF Exploitation GuideHacking Next.js Targets: Advanced SSRF Exploitation Guide
2026-04-22Catflix CTF: Exploiting SSRFs in Next.js MiddlewareCatflix CTF: Exploiting SSRFs in Next.js Middleware
2026-04-22SSRF Guard Bypass via Full-Form IPv4-Mapped IPv6 LiteralSSRF Guard Bypass via Full-Form IPv4-Mapped IPv6 Literal
2026-04-22Next.js Improper Middleware Redirect Handling Leads to SSRF (CVE-2025-57822)Next.js Improper Middleware Redirect Handling Leads to SSRF (CVE-2025-57822)
2026-04-22Craft CMS Cloud Metadata SSRF Protection Bypass via IPv6 ResolutionCraft CMS Cloud Metadata SSRF Protection Bypass via IPv6 Resolution
2026-04-22Axios Unrestricted Cloud Metadata Exfiltration via Header Injection Chain (CVE-2026-40175)Axios Unrestricted Cloud Metadata Exfiltration via Header Injection Chain (CVE-2026-40175)

Bug Bounty +16

DateResourceSummary
2026-04-23AI Sparks Bug-Bounty Surge in Crypto but Low-Quality Reports GrowAI Sparks Bug-Bounty Surge in Crypto, but Low-Quality Reports Grow https://ift.tt/ImqYgUJ
2026-04-22Whos Really to Blame When a White Hat Goes Gray?Who’s Really to Blame When a White Hat Goes Gray? https://ift.tt/GRys4eB
2026-04-22Nextcloud ends bug bounty program due to too many low-quality reportsNextcloud ends bug bounty program due to too many low-quality reports https://ift.tt/Qpl1nJ2
2026-04-22The Unofficial HackerOne Disclosure TimelineThe Unofficial HackerOne Disclosure Timeline
2026-04-22Publicly Disclosed HackerOne Bug Bounty FindingsPublicly Disclosed HackerOne Bug Bounty Findings
2026-04-22GraphQL - PortSwigger Lab WriteupGraphQL - PortSwigger Lab Writeup
2026-04-22BugBoard: Searchable Bug Bounty WriteupsBugBoard: Searchable Bug Bounty Writeups
2026-04-22AI Vulnerability Deep Dive: Prompt Injection (Bugcrowd)AI Vulnerability Deep Dive: Prompt Injection (Bugcrowd)
2026-04-22A Guide to the Hidden Threat of Prompt Injection (Bugcrowd)A Guide to the Hidden Threat of Prompt Injection (Bugcrowd)
2026-04-22Writeups for Hack The Box Bug Bounty CTF 2025Writeups for Hack The Box Bug Bounty CTF 2025
2026-04-22Bug-Bounty-Methodology: JWT and Other Vulnerability ClassesBug-Bounty-Methodology: JWT and Other Vulnerability Classes
2026-04-22Bug Bounty Writeups: Available Programs and WriteupsBug Bounty Writeups: Available Programs and Writeups
2026-04-22Awesome Google VRP WriteupsAwesome Google VRP Writeups
2026-04-22AI Sparks Bug-Bounty Surge in Crypto but Low-Quality Reports GrowAI Sparks Bug-Bounty Surge in Crypto, but Low-Quality Reports Grow https://ift.tt/huVd7WD
2026-04-20Meta and PortSwigger drive offensive security further to find what others missMeta and PortSwigger drive offensive security further to find what others miss https://ift.tt/gc5osvx
2026-04-20Dark web forum hosts $10000 article contest on vulnerability exploitationDark web forum hosts $10,000 article contest on vulnerability exploitation https://ift.tt/Mc8sEPr

XSS +12

DateResourceSummary
2026-04-24Over 10000 Zimbra Servers Vulnerable to XSS AttacksOver 10,000 Zimbra Servers Vulnerable to XSS Attacks https://ift.tt/UNZfrVk
2026-04-24Over 10000 Zimbra servers vulnerable to ongoing XSS attacksOver 10,000 Zimbra servers vulnerable to ongoing XSS attacks https://ift.tt/Ay2mKgb
2026-04-22Mass-Assignment to Stored XSS and CSP Bypass in a Chatbot PlatformMass-Assignment to Stored XSS and CSP Bypass in a Chatbot Platform
2026-04-22Full Disclosure: DOM-Based XSS And Failures In Bug Bounty HuntingFull Disclosure: DOM-Based XSS And Failures In Bug Bounty Hunting
2026-04-22Cross-Site Scripting (XSS) Is Surging: 4 New CVEs This WeekCross-Site Scripting (XSS) Is Surging: 4 New CVEs This Week
2026-04-22CVE-2025-26244: Stored XSS in DeimosC2 Leading to Privilege EscalationCVE-2025-26244: Stored XSS in DeimosC2 Leading to Privilege Escalation
2026-04-22CVE-2025-25461: SeedDMS Stored XSSCVE-2025-25461: SeedDMS Stored XSS
2026-04-22Finding DOM Polyglot XSS in PayPal the Easy WayFinding DOM Polyglot XSS in PayPal the Easy Way
2026-04-22Cisco IOS XE Web Authentication Reflected XSS AdvisoryCisco IOS XE Web Authentication Reflected XSS Advisory
2026-04-22CVE-2025-66412: Angular Stored XSS via SVG Animation and MathML AttributesCVE-2025-66412: Angular Stored XSS via SVG Animation and MathML Attributes
2026-04-22CVE-2025-0133: PAN-OS Reflected XSS in GlobalProtect GatewayCVE-2025-0133: PAN-OS Reflected XSS in GlobalProtect Gateway
2026-04-22Synthesizing XSS Polyglots with Monte Carlo Tree Search (arXiv 2025)Synthesizing XSS Polyglots with Monte Carlo Tree Search (arXiv 2025)

Python +11

DateResourceSummary
2026-04-23wapiti-scanner/wapiti: Web vulnerability scanner written in Python3Web vulnerability scanner written in Python3
2026-04-22CVE-2025-68664: Critical LangChain Flaw Enables Secret ExtractionCVE-2025-68664: Critical LangChain Flaw Enables Secret Extraction
2026-04-22Bandit Python: Free SAST in 10 Seconds (2026 Review)Bandit Python: Free SAST in 10 Seconds (2026 Review)
2026-04-22CVE-2026-22607: Fickling Python RCE VulnerabilityCVE-2026-22607: Fickling Python RCE Vulnerability
2026-04-22CVE-2026-21226: Azure Core Python Library RCE VulnerabilityCVE-2026-21226: Azure Core Python Library RCE Vulnerability
2026-04-22SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model FilesSGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files
2026-04-22Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of DisclosureMarimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure
2026-04-22Critical SQL Injection Vulnerability in Django (CVE-2025-64459)Critical SQL Injection Vulnerability in Django (CVE-2025-64459)
2026-04-22CERT-FR Warns of Python/CPython RCE Vulnerabilities (CVE-2026-4786, CVE-2026-6100)CERT-FR Warns of Python/CPython RCE Vulnerabilities (CVE-2026-4786, CVE-2026-6100)
2026-04-22Malicious PyPI Packages Deliver SilentSync RATMalicious PyPI Packages Deliver SilentSync RAT
2026-04-22Bearer: SAST Tool to Discover, Filter, and Prioritize Security and Privacy RisksBearer: SAST Tool to Discover, Filter, and Prioritize Security and Privacy Risks

Fuzzing +11

DateResourceSummary
2026-04-22Jazzer: Coverage-guided, in-process fuzzing for the JVMJazzer: Coverage-guided, in-process fuzzing for the JVM
2026-04-22Fuzzing 100+ open source projects with OSS-Fuzz - lessons learnedFuzzing 100+ open source projects with OSS-Fuzz - lessons learned
2026-04-22Large Language Model guided Protocol Fuzzing (NDSS)Large Language Model guided Protocol Fuzzing (NDSS)
2026-04-22Detect Go's silent arithmetic bugs with go-panikintDetect Go's silent arithmetic bugs with go-panikint
2026-04-22Denial of Fuzzing: Rust in the Windows kernelDenial of Fuzzing: Rust in the Windows kernel
2026-04-22Bringing Fuzz Testing to Kotlin with kotlinx.fuzzBringing Fuzz Testing to Kotlin with kotlinx.fuzz
2026-04-22Advanced binary fuzzing using AFL++-QEMU and libprotobufAdvanced binary fuzzing using AFL++-QEMU and libprotobuf
2026-04-22deepSURF: Detecting Memory Safety Vulnerabilities in Rust Through Fuzzing LLM-Augmented HarnessesdeepSURF: Detecting Memory Safety Vulnerabilities in Rust Through Fuzzing LLM-Augmented Harnesses
2026-04-22Fixing Security Vulnerabilities with AI in OSS-FuzzFixing Security Vulnerabilities with AI in OSS-Fuzz
2026-04-22A Survey of Network Protocol Fuzzing: Model, Techniques and DirectionsA Survey of Network Protocol Fuzzing: Model, Techniques and Directions
2026-04-22Anthropic AI Finds 271 Vulnerabilities in FirefoxAnthropic AI Finds 271 Vulnerabilities in Firefox https://ift.tt/61geSjc

SQLi +10

DateResourceSummary
2026-04-23LangChain framework hit by several worrying security issues here's what we knowLangChain framework hit by several worrying security issues — here's what we know https://ift.tt/XaO0IvB
2026-04-22CVE-2025-1094: PostgreSQL SQL Injection VulnerabilityCVE-2025-1094: PostgreSQL SQL Injection Vulnerability
2026-04-22SQLMap Tamper Collection: Modern WAF Bypass Scripts (Cloudflare, AWS, Azure)SQLMap Tamper Collection: Modern WAF Bypass Scripts (Cloudflare, AWS, Azure)
2026-04-22SQL Injection and Postgres: An Adventure to Eventual RCESQL Injection and Postgres: An Adventure to Eventual RCE
2026-04-22Pentesting PostgreSQL with SQL InjectionsPentesting PostgreSQL with SQL Injections
2026-04-22NoSQL Injection: Advanced Exploitation GuideNoSQL Injection: Advanced Exploitation Guide
2026-04-22Exploits Explained: NoSQL Injection Returns Private InformationExploits Explained: NoSQL Injection Returns Private Information
2026-04-22CVE-2025-52694 PoC: Critical SQL Injection in Advantech IoTSuite/SaaS-ComposerCVE-2025-52694 PoC: Critical SQL Injection in Advantech IoTSuite/SaaS-Composer
2026-04-22MCP Vulnerability Case Study: SQL Injection in the Postgres MCP ServerMCP Vulnerability Case Study: SQL Injection in the Postgres MCP Server
2026-04-22BWAFSQLi: Bypassing Web Application Firewall with Adversarial SQL InjectionsBWAFSQLi: Bypassing Web Application Firewall with Adversarial SQL Injections

SSTI +10

DateResourceSummary
2026-04-22SSTI in Bug Bounty: Playing with Handlebars and Breaking StuffSSTI in Bug Bounty: Playing with Handlebars and Breaking Stuff
2026-04-22SSTI: Explanation, Discovery, Exploitation, and PreventionSSTI: Explanation, Discovery, Exploitation, and Prevention
2026-04-22SSTI: Breaking Out of TemplatesSSTI: Breaking Out of Templates
2026-04-22Metasploit Module: Tactical RMM Jinja2 SSTI RCE (CVE-2025-69516)Metasploit Module: Tactical RMM Jinja2 SSTI RCE (CVE-2025-69516)
2026-04-22Grav CMS Twig SSTI Authenticated Sandbox Bypass RCEGrav CMS Twig SSTI Authenticated Sandbox Bypass RCE
2026-04-22CVE-2026-33154: Dynaconf RCE via Insecure Jinja Template EvaluationCVE-2026-33154: Dynaconf RCE via Insecure Jinja Template Evaluation
2026-04-22Grav CMS: Security Sandbox Bypass with SSTIGrav CMS: Security Sandbox Bypass with SSTI
2026-04-22Grav CMS: RCE via SSTI through Twig Sandbox BypassGrav CMS: RCE via SSTI through Twig Sandbox Bypass
2026-04-22CVE-2026-27641: Flask-Reuploaded Path Traversal Enabling SSTI RCECVE-2026-27641: Flask-Reuploaded Path Traversal Enabling SSTI RCE
2026-04-22A Survey of the Overlooked Dangers of Template Engines (arXiv 2024)A Survey of the Overlooked Dangers of Template Engines (arXiv 2024)

Authentication +10

DateResourceSummary
2026-04-22OAuth2 Proxy Authentication Bypass via X-Forwarded-Uri (CVE-2026-40575)OAuth2 Proxy Authentication Bypass via X-Forwarded-Uri (CVE-2026-40575)
2026-04-22Keycloak SAML Disabled Client SSO Bypass (CVE-2026-3047)Keycloak SAML Disabled Client SSO Bypass (CVE-2026-3047)
2026-04-22CVE-2026-2092: Keycloak Auth Bypass VulnerabilityCVE-2026-2092: Keycloak Auth Bypass Vulnerability
2026-04-22CVE-2026-1529: Bypassing Keycloak Org SecurityCVE-2026-1529: Bypassing Keycloak Org Security
2026-04-22OAUTHBEARER Bypass and Sensitive Logging Leaks Hit Apache KafkaOAUTHBEARER Bypass and Sensitive Logging Leaks Hit Apache Kafka
2026-04-22CVE-2025-26788: Passkey Authentication Bypass in StrongKey FIDO ServerCVE-2025-26788: Passkey Authentication Bypass in StrongKey FIDO Server
2026-04-22Analyzing the rise in device code phishing attacks in 2026Analyzing the rise in device code phishing attacks in 2026
2026-04-22SAML rough quarter: Five critical vulnerabilities in four monthsSAML rough quarter: Five critical vulnerabilities in four months
2026-04-22CVE-2024-9956: Critical WebAuthentication Vulnerability in Chrome on AndroidCVE-2024-9956: Critical WebAuthentication Vulnerability in Chrome on Android
2026-04-22CVE-2026-34457 Detail (OAuth2 Proxy) - NVDCVE-2026-34457 Detail (OAuth2 Proxy) - NVD

Secrets +10

DateResourceSummary
2026-04-22UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 HoursUNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours
2026-04-22The State of Non-Human Identity Security (CSA Survey Report)The State of Non-Human Identity Security (CSA Survey Report)
2026-04-22Secrets Management in 2026: Vault, AWS Secrets Manager, and BeyondSecrets Management in 2026: Vault, AWS Secrets Manager, and Beyond
2026-04-22GitHub Secret Scanning 2026: New Patterns, Push ProtectionGitHub Secret Scanning 2026: New Patterns, Push Protection
2026-04-22Top 10 Non-Human Identity Security Tools and Platforms for 2026Top 10 Non-Human Identity Security Tools and Platforms for 2026
2026-04-22CVE-2026-5807: HashiCorp Vault DoS via Unauthenticated Root Token GenerationCVE-2026-5807: HashiCorp Vault DoS via Unauthenticated Root Token Generation
2026-04-22CVE-2026-3605: HashiCorp Vault KVv2 Metadata Policy Bypass (DoS)CVE-2026-3605: HashiCorp Vault KVv2 Metadata Policy Bypass (DoS)
2026-04-22AI Is Fueling Secrets Sprawl: GitGuardian Reports 81% Surge of AI-Service LeaksAI Is Fueling Secrets Sprawl: GitGuardian Reports 81% Surge of AI-Service Leaks
2026-04-22HCSEC-2026-08: Vault DoS via Unauthenticated Root Token GenerationHCSEC-2026-08: Vault DoS via Unauthenticated Root Token Generation
2026-04-22HCSEC-2026-05: Vault KVv2 Metadata Policy Bypass DoSHCSEC-2026-05: Vault KVv2 Metadata Policy Bypass DoS

Mobile +10

DateResourceSummary
2026-04-22Root/Jailbreak Detection and SSL Pinning in KMMRoot/Jailbreak Detection and SSL Pinning in KMM
2026-04-22Reversing Android Apps: Bypassing Detection Like a ProReversing Android Apps: Bypassing Detection Like a Pro
2026-04-22Reverse engineering and modifying Android apps with JADX and FridaReverse engineering and modifying Android apps with JADX and Frida
2026-04-22Common Vulnerabilities and Exposures Examples in Mobile AppsCommon Vulnerabilities and Exposures Examples in Mobile Apps
2026-04-22Bypassing iOS Frida Detection with LLDB and FridaBypassing iOS Frida Detection with LLDB and Frida
2026-04-22frida-interception-and-unpinning: Scripts to MitM all HTTPS trafficfrida-interception-and-unpinning: Scripts to MitM all HTTPS traffic
2026-04-22Android Reports and ResourcesAndroid Reports and Resources
2026-04-22iOS Security Testing - OWASP MASTGiOS Security Testing - OWASP MASTG
2026-04-22Android Security Bulletin - March 2026Android Security Bulletin - March 2026
2026-04-22Android Security Bulletin - April 2026Android Security Bulletin - April 2026

AuthZ +10

DateResourceSummary
2026-04-22Rights Management Approaches: ACL, RBAC, ABAC, ReBACRights Management Approaches: ACL, RBAC, ABAC, ReBAC
2026-04-22OPA, Cedar, OpenFGA: Why Are Policy Languages Trending Right Now?OPA, Cedar, OpenFGA: Why Are Policy Languages Trending Right Now?
2026-04-22OPA vs OpenFGA: A Technical Comparison of Policy EnginesOPA vs OpenFGA: A Technical Comparison of Policy Engines
2026-04-22Implementing Google Zanzibar: A Demonstration of Its BasicsImplementing Google Zanzibar: A Demonstration of Its Basics
2026-04-22How to Protect Your API with OpenFGA: ReBAC Concepts to Practical UsageHow to Protect Your API with OpenFGA: ReBAC Concepts to Practical Usage
2026-04-22How Google Drive Models Authorization: A Look into ZanzibarHow Google Drive Models Authorization: A Look into Zanzibar
2026-04-22Common Bug Bounty Vulnerabilities: A Technical Deep Dive for Hunters in 2026Common Bug Bounty Vulnerabilities: A Technical Deep Dive for Hunters in 2026
2026-04-22CVE-2026-32877 - Red Hat Security AdvisoryCVE-2026-32877 - Red Hat Security Advisory
2026-04-22CVE 2026: When Identity Breaks and Legacy Code Bites BackCVE 2026: When Identity Breaks and Legacy Code Bites Back
2026-04-22What is Google Zanzibar?What is Google Zanzibar?

Recon +10

DateResourceSummary
2026-04-22ars0n-framework-v2: Bug Bounty Hunting Frameworkars0n-framework-v2: Bug Bounty Hunting Framework
2026-04-22Uncover Hidden Assets with Bug Bounty Recon: Fuzzing and JS AnalysisUncover Hidden Assets with Bug Bounty Recon: Fuzzing and JS Analysis
2026-04-22Subdomain Takeover: Proof Creation for Bug BountiesSubdomain Takeover: Proof Creation for Bug Bounties
2026-04-22Shodan and Censys for beginners: How to find more vulnerabilitiesShodan and Censys for beginners: How to find more vulnerabilities
2026-04-22Hunting down subdomain takeover vulnerabilitiesHunting down subdomain takeover vulnerabilities
2026-04-22FFuF Fuzzer Guide: Fuzz Faster u Fool for Bug Bounty HuntersFFuF Fuzzer Guide: Fuzz Faster u Fool for Bug Bounty Hunters
2026-04-22Open Source Intelligence Gathering: Techniques, Automation, and VisualizationOpen Source Intelligence Gathering: Techniques, Automation, and Visualization
2026-04-22OWASP Test for Subdomain TakeoverOWASP Test for Subdomain Takeover
2026-04-22Maximizing Security Outcomes: The Role of ASM in Bug Bounty ProgramsMaximizing Security Outcomes: The Role of ASM in Bug Bounty Programs
2026-04-22Building a Fast One-Shot Recon Script for Bug BountyBuilding a Fast One-Shot Recon Script for Bug Bounty

OSINT +10

DateResourceSummary
2026-04-22Master Google Dorking: Advanced Techniques for OSINT and Ethical HackingMaster Google Dorking: Advanced Techniques for OSINT and Ethical Hacking
2026-04-22Lessons from Building an Online Toolkit to Aid Open-Source InvestigationsLessons from Building an Online Toolkit to Aid Open-Source Investigations
2026-04-22IntelTechniques Books (Michael Bazzell)IntelTechniques Books (Michael Bazzell)
2026-04-22Epieos: The Ultimate OSINT ToolEpieos: The Ultimate OSINT Tool
2026-04-22Bellingcat's Online Investigation ToolkitBellingcat's Online Investigation Toolkit
2026-04-22Automating Google Dorking: From Manual OSINT Technique to Continuous MonitoringAutomating Google Dorking: From Manual OSINT Technique to Continuous Monitoring
2026-04-22mosint: An automated e-mail OSINT toolmosint: An automated e-mail OSINT tool
2026-04-22Telegram-OSINT: In-depth repository of Telegram OSINT resourcesTelegram-OSINT: In-depth repository of Telegram OSINT resources
2026-04-22Email-Username-OSINT ToolboxEmail-Username-OSINT Toolbox
2026-04-22Awesome OSINT for EverythingAwesome OSINT for Everything

GraphQL +10

DateResourceSummary
2026-04-22CVE-2025-59845: CSRF Vulnerability in Apollo Studio Embeddable Explorer and SandboxCVE-2025-59845: CSRF Vulnerability in Apollo Studio Embeddable Explorer and Sandbox
2026-04-22CVE-2025-31496: GraphQL Query Vulnerability in Apollo Compiler Leading to DoSCVE-2025-31496: GraphQL Query Vulnerability in Apollo Compiler Leading to DoS
2026-04-22The 16-Hour Window: Catching a GraphQL Authorization FlawThe 16-Hour Window: Catching a GraphQL Authorization Flaw
2026-04-22GraphQLer: Context-Aware GraphQL API Fuzzing ToolGraphQLer: Context-Aware GraphQL API Fuzzing Tool
2026-04-22Exploiting GraphQL Query DepthExploiting GraphQL Query Depth
2026-04-22Exploiting Broken Authentication Control in GraphQLExploiting Broken Authentication Control in GraphQL
2026-04-22Didn't Notice Your Rate Limiting: GraphQL Batching AttackDidn't Notice Your Rate Limiting: GraphQL Batching Attack
2026-04-22Avoid GraphQL Denial-of-Service Attacks through Batching and AliasingAvoid GraphQL Denial-of-Service Attacks through Batching and Aliasing
2026-04-22API Threat Research: GraphQL Authorization Flaws in a FinTech PlatformAPI Threat Research: GraphQL Authorization Flaws in a FinTech Platform
2026-04-22Apollo Router Query Planner Excessive Resource Consumption via Named Fragment Expansion (CVE-2025-32034)Apollo Router Query Planner Excessive Resource Consumption via Named Fragment Expansion (CVE-2025-32034)

IDOR +10

DateResourceSummary
2026-04-22New Types of Hacking: IDOR Attacks EvolvedNew Types of Hacking: IDOR Attacks Evolved
2026-04-22Hunting for IDOR and BAC in B2B Apps with Burp AuthorizeHunting for IDOR and BAC in B2B Apps with Burp Authorize
2026-04-22IDOR in the Wild: What CVE-2025-13526 Teaches Security EngineersIDOR in the Wild: What CVE-2025-13526 Teaches Security Engineers
2026-04-22CVE-2025-14371: TaxoPress IDOR / Object-Level Authorization BypassCVE-2025-14371: TaxoPress IDOR / Object-Level Authorization Bypass
2026-04-22IDOR-Scanner: Burp Suite Extension for Automated IDOR DetectionIDOR-Scanner: Burp Suite Extension for Automated IDOR Detection
2026-04-22GraphQL IDOR Vulnerabilities: What They Are and How to FixGraphQL IDOR Vulnerabilities: What They Are and How to Fix
2026-04-22CVE-2025-64431: IDOR in ZITADEL Organization API Allows Cross-Tenant TamperingCVE-2025-64431: IDOR in ZITADEL Organization API Allows Cross-Tenant Tampering
2026-04-22OpenCTI GraphQL IDOR Allows Workspace Content DeletionOpenCTI GraphQL IDOR Allows Workspace Content Deletion
2026-04-22CVE-2025-2271: IDOR Vulnerability DetailCVE-2025-2271: IDOR Vulnerability Detail
2026-04-22CVE-2025-1270: IDOR in h6web by Anapi GroupCVE-2025-1270: IDOR in h6web by Anapi Group

Burp Suite +9

DateResourceSummary
2026-04-22SulphurAPI: Burp Suite extension for automating OWASP API Top 10 detectionSulphurAPI: Burp Suite extension for automating OWASP API Top 10 detection
2026-04-22Awesome Burp Extensions 2025Awesome Burp Extensions 2025
2026-04-22Top 10 Web Hacking Techniques of 2025: Call for NominationsTop 10 Web Hacking Techniques of 2025: Call for Nominations
2026-04-22The Future of Security Testing: AI-Powered Extensibility in BurpThe Future of Security Testing: AI-Powered Extensibility in Burp
2026-04-22Filtering the WebSockets history with scriptsFiltering the WebSockets history with scripts
2026-04-22Filtering the HTTP history with scripts (Bambdas)Filtering the HTTP history with scripts (Bambdas)
2026-04-22Developing AI features in Burp extensionsDeveloping AI features in Burp extensions
2026-04-22Burp AI - PortSwigger DocumentationBurp AI - PortSwigger Documentation
2026-04-22Bambdas - PortSwigger DocumentationBambdas - PortSwigger Documentation

Talks +8

DateResourceSummary
2026-04-22DEF CON 33 Talks - YouTube PlaylistDEF CON 33 Talks - YouTube Playlist
2026-04-22DEF CON 33 Call IndexDEF CON 33 Call Index
2026-04-22Black Hat USA 2025 Briefings ScheduleBlack Hat USA 2025 Briefings Schedule
2026-04-22Black Hat USA 2025 - YouTube PlaylistBlack Hat USA 2025 - YouTube Playlist
2026-04-22Black Hat Official YouTube ChannelBlack Hat Official YouTube Channel
2026-04-22DEF CON 33 AppSec VillageDEF CON 33 AppSec Village
2026-04-22DEF CON 33 Aerospace Village Talk ScheduleDEF CON 33 Aerospace Village Talk Schedule
2026-04-22About NDC Security 2026About NDC Security 2026

JWT +7

DateResourceSummary
2026-04-22CVE-2026-32597: PyJWT Information Disclosure VulnerabilityCVE-2026-32597: PyJWT Information Disclosure Vulnerability
2026-04-22Authlib Critical JWT Forgery (CVE-2026-27962)Authlib Critical JWT Forgery (CVE-2026-27962)
2026-04-22CVE-2026-34950 fast-jwt: Incomplete Fix for CVE-2023-48223CVE-2026-34950 fast-jwt: Incomplete Fix for CVE-2023-48223
2026-04-22CVE-2026-22817: JWT Algorithm Confusion in HonoCVE-2026-22817: JWT Algorithm Confusion in Hono
2026-04-22Proof of Concept for CVE-2026-29000 (pac4j-jwt)Proof of Concept for CVE-2026-29000 (pac4j-jwt)
2026-04-22CVE-2026-23993: JWT Authentication Bypass in HarbourJwt via Unknown algCVE-2026-23993: JWT Authentication Bypass in HarbourJwt via Unknown alg
2026-04-22draft-ietf-oauth-rfc8725bis: JSON Web Token Best Current Practicesdraft-ietf-oauth-rfc8725bis: JSON Web Token Best Current Practices

Deserialization +6

DateResourceSummary
2026-04-22picoCTF Super Serial Writeup: PHP Object Injection Explained ClearlypicoCTF Super Serial Writeup: PHP Object Injection Explained Clearly
2026-04-22Deep Dive into Fastjson Deserialization VulnerabilitiesDeep Dive into Fastjson Deserialization Vulnerabilities
2026-04-22CVE-2025-24813 PoC: Apache Tomcat Java DeserializationCVE-2025-24813 PoC: Apache Tomcat Java Deserialization
2026-04-22WSUS Deserialization Exploit in the Wild (CVE-2025-59287)WSUS Deserialization Exploit in the Wild (CVE-2025-59287)
2026-04-22Precise and Effective Gadget Chain Mining through Deserialization-Guided Call Graph Construction (USENIX Security 2025)Precise and Effective Gadget Chain Mining through Deserialization-Guided Call Graph Construction (USENIX Security 2025)
2026-04-22Gleipner: A Benchmark for Gadget Chain Detection in Java Deserialization VulnerabilitiesGleipner: A Benchmark for Gadget Chain Detection in Java Deserialization Vulnerabilities

CSRF +6

DateResourceSummary
2026-04-22CVE-2025-12821: WordPress NewsBlogger CSRF Allowing RCECVE-2025-12821: WordPress NewsBlogger CSRF Allowing RCE
2026-04-22Manipulating User Email: A CSRF PoC From TCM AcademyManipulating User Email: A CSRF PoC From TCM Academy
2026-04-22Bypassing CSRF Token Validation TechniquesBypassing CSRF Token Validation Techniques
2026-04-22CVE-2026-40925: CSRF in WWBN AVideo Configuration EndpointCVE-2026-40925: CSRF in WWBN AVideo Configuration Endpoint
2026-04-22CSRF in 2025: Not Dead, Just DifferentCSRF in 2025: Not Dead, Just Different
2026-04-22Internet Bug Bounty: Argo CD CSRF leads to Kubernetes cluster compromiseProgram: Internet Bug Bounty Severity: high Weakness: Cross-Site Request Forgery (CSRF) GHSA: https://github.com/argoproj/argo-cd/security/advisories/GHSA-92mw-q256-5vwg It's been publicly known for...

XXE +6

DateResourceSummary
2026-04-22GeoServer 2025 XXE Vulnerability (CVE-2025-58360) ExplainedGeoServer 2025 XXE Vulnerability (CVE-2025-58360) Explained
2026-04-22Critical Apache Tika Vulnerability Leads to XXE InjectionCritical Apache Tika Vulnerability Leads to XXE Injection
2026-04-22CVE-2025-30220: GeoServer WFS Service XML External EntityCVE-2025-30220: GeoServer WFS Service XML External Entity
2026-04-22CVE-2025-27136: LocalS3 CreateBucketConfiguration XXE InjectionCVE-2025-27136: LocalS3 CreateBucketConfiguration XXE Injection
2026-04-22CVE-2024-30043: Exploiting XXE on SharePoint via Confused URL Parsing (PoC)CVE-2024-30043: Exploiting XXE on SharePoint via Confused URL Parsing (PoC)
2026-04-22CVE-2025-66516: Detecting and Defending Against Apache Tika XXECVE-2025-66516: Detecting and Defending Against Apache Tika XXE