appsec.fyi

Recently Added Resources

The latest 200 resources added across all topics.

Recently Added

The most recent resources added to appsec.fyi, across all topics. Subscribe to the RSS feed to stay updated.

Date Topic Link Excerpt
2026-04-23SSRFCVE-2026-33626: A critical SSRF in LMDeploy exploited in under 13 hours. Learn how attackers hijack AI nodes and how to secure your inference cloud now. #CVE202633626 #SSRF #AISecurity #LMDeploy #InfoSec #CyberAttack #CloudSecurity #LLM #PatchNow securityonline.info/cve-2026-33626 pic.x.com/09IZxf21rQCVE-2026-33626: A critical SSRF in LMDeploy exploited in under 13 hours. Learn how attackers hijack AI nodes and how to secure your inference cloud now. #CVE202633626 #SSRF #AISecurity #LMDeploy #Info...
2026-04-22SSRFCritical Spring Authorization Server Issue Exposes Systems to XSS and SSRF AttacksCritical Spring Authorization Server Issue Exposes Systems to XSS and SSRF Attacks https://ift.tt/y4laiIW
2026-04-22SSRFCritical Spring Authorization Server Flaw Enables XSS Privilege Escalation and SSRFCritical Spring Authorization Server Flaw Enables XSS, Privilege Escalation, and SSRF https://ift.tt/b2pauUc
2026-04-22SSTISSTI in Bug Bounty: Playing with Handlebars and Breaking StuffSSTI in Bug Bounty: Playing with Handlebars and Breaking Stuff
2026-04-22SSTISSTI: Explanation, Discovery, Exploitation, and PreventionSSTI: Explanation, Discovery, Exploitation, and Prevention
2026-04-22SSTISSTI: Breaking Out of TemplatesSSTI: Breaking Out of Templates
2026-04-22SSTIMetasploit Module: Tactical RMM Jinja2 SSTI RCE (CVE-2025-69516)Metasploit Module: Tactical RMM Jinja2 SSTI RCE (CVE-2025-69516)
2026-04-22SSTIGrav CMS Twig SSTI Authenticated Sandbox Bypass RCEGrav CMS Twig SSTI Authenticated Sandbox Bypass RCE
2026-04-22SSTICVE-2026-33154: Dynaconf RCE via Insecure Jinja Template EvaluationCVE-2026-33154: Dynaconf RCE via Insecure Jinja Template Evaluation
2026-04-22SSTIGrav CMS: Security Sandbox Bypass with SSTIGrav CMS: Security Sandbox Bypass with SSTI
2026-04-22SSTIGrav CMS: RCE via SSTI through Twig Sandbox BypassGrav CMS: RCE via SSTI through Twig Sandbox Bypass
2026-04-22SSTICVE-2026-27641: Flask-Reuploaded Path Traversal Enabling SSTI RCECVE-2026-27641: Flask-Reuploaded Path Traversal Enabling SSTI RCE
2026-04-22SSTIA Survey of the Overlooked Dangers of Template Engines (arXiv 2024)A Survey of the Overlooked Dangers of Template Engines (arXiv 2024)
2026-04-22JWTCVE-2026-32597: PyJWT Information Disclosure VulnerabilityCVE-2026-32597: PyJWT Information Disclosure Vulnerability
2026-04-22JWTAuthlib Critical JWT Forgery (CVE-2026-27962)Authlib Critical JWT Forgery (CVE-2026-27962)
2026-04-22JWTJSON Web Tokens in 2026: The Complete Developer GuideJSON Web Tokens in 2026: The Complete Developer Guide
2026-04-22JWTUnderstanding JSON Web Tokens: Complete Guide for DevelopersUnderstanding JSON Web Tokens: Complete Guide for Developers
2026-04-22JWTCVE-2026-34950 fast-jwt: Incomplete Fix for CVE-2023-48223CVE-2026-34950 fast-jwt: Incomplete Fix for CVE-2023-48223
2026-04-22JWTCVE-2026-22817: JWT Algorithm Confusion in HonoCVE-2026-22817: JWT Algorithm Confusion in Hono
2026-04-22JWTProof of Concept for CVE-2026-29000 (pac4j-jwt)Proof of Concept for CVE-2026-29000 (pac4j-jwt)
2026-04-22JWTCVE-2026-23993: JWT Authentication Bypass in HarbourJwt via Unknown algCVE-2026-23993: JWT Authentication Bypass in HarbourJwt via Unknown alg
2026-04-22JWTdraft-ietf-oauth-rfc8725bis: JSON Web Token Best Current Practicesdraft-ietf-oauth-rfc8725bis: JSON Web Token Best Current Practices
2026-04-22JWTWakaTime: Session Replay Attack Allows Authentication Bypass via Captured Login Responses Allowing Bypass of 429 Too many attempts for Multiple Failed LoginsProgram: WakaTime Severity: high Weakness: Improper Authentication - Generic #Summary An attacker can bypass authentication by capturing a valid login response (including session cookies/tokens) and ...
2026-04-22AuthenticationOAuth2 Proxy Authentication Bypass via X-Forwarded-Uri (CVE-2026-40575)OAuth2 Proxy Authentication Bypass via X-Forwarded-Uri (CVE-2026-40575)
2026-04-22AuthenticationKeycloak SAML Disabled Client SSO Bypass (CVE-2026-3047)Keycloak SAML Disabled Client SSO Bypass (CVE-2026-3047)
2026-04-22AuthenticationCVE-2026-2092: Keycloak Auth Bypass VulnerabilityCVE-2026-2092: Keycloak Auth Bypass Vulnerability
2026-04-22AuthenticationCVE-2026-1529: Bypassing Keycloak Org SecurityCVE-2026-1529: Bypassing Keycloak Org Security
2026-04-22AuthenticationOAUTHBEARER Bypass and Sensitive Logging Leaks Hit Apache KafkaOAUTHBEARER Bypass and Sensitive Logging Leaks Hit Apache Kafka
2026-04-22AuthenticationCVE-2025-26788: Passkey Authentication Bypass in StrongKey FIDO ServerCVE-2025-26788: Passkey Authentication Bypass in StrongKey FIDO Server
2026-04-22AuthenticationAnalyzing the rise in device code phishing attacks in 2026Analyzing the rise in device code phishing attacks in 2026
2026-04-22AuthenticationSAML rough quarter: Five critical vulnerabilities in four monthsSAML rough quarter: Five critical vulnerabilities in four months
2026-04-22AuthenticationCVE-2024-9956: Critical WebAuthentication Vulnerability in Chrome on AndroidCVE-2024-9956: Critical WebAuthentication Vulnerability in Chrome on Android
2026-04-22AuthenticationCVE-2026-34457 Detail (OAuth2 Proxy) - NVDCVE-2026-34457 Detail (OAuth2 Proxy) - NVD
2026-04-22DeserializationpicoCTF Super Serial Writeup: PHP Object Injection Explained ClearlypicoCTF Super Serial Writeup: PHP Object Injection Explained Clearly
2026-04-22DeserializationDeep Dive into Fastjson Deserialization VulnerabilitiesDeep Dive into Fastjson Deserialization Vulnerabilities
2026-04-22DeserializationCVE-2025-24813 PoC: Apache Tomcat Java DeserializationCVE-2025-24813 PoC: Apache Tomcat Java Deserialization
2026-04-22DeserializationWSUS Deserialization Exploit in the Wild (CVE-2025-59287)WSUS Deserialization Exploit in the Wild (CVE-2025-59287)
2026-04-22DeserializationPrecise and Effective Gadget Chain Mining through Deserialization-Guided Call Graph Construction (USENIX Security 2025)Precise and Effective Gadget Chain Mining through Deserialization-Guided Call Graph Construction (USENIX Security 2025)
2026-04-22DeserializationGleipner: A Benchmark for Gadget Chain Detection in Java Deserialization VulnerabilitiesGleipner: A Benchmark for Gadget Chain Detection in Java Deserialization Vulnerabilities
2026-04-22SecretsUNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 HoursUNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours
2026-04-22SecretsThe State of Non-Human Identity Security (CSA Survey Report)The State of Non-Human Identity Security (CSA Survey Report)
2026-04-22SecretsSecrets Management in 2026: Vault, AWS Secrets Manager, and BeyondSecrets Management in 2026: Vault, AWS Secrets Manager, and Beyond
2026-04-22SecretsGitHub Secret Scanning 2026: New Patterns, Push ProtectionGitHub Secret Scanning 2026: New Patterns, Push Protection
2026-04-22SecretsTop 10 Non-Human Identity Security Tools and Platforms for 2026Top 10 Non-Human Identity Security Tools and Platforms for 2026
2026-04-22SecretsCVE-2026-5807: HashiCorp Vault DoS via Unauthenticated Root Token GenerationCVE-2026-5807: HashiCorp Vault DoS via Unauthenticated Root Token Generation
2026-04-22SecretsCVE-2026-3605: HashiCorp Vault KVv2 Metadata Policy Bypass (DoS)CVE-2026-3605: HashiCorp Vault KVv2 Metadata Policy Bypass (DoS)
2026-04-22SecretsAI Is Fueling Secrets Sprawl: GitGuardian Reports 81% Surge of AI-Service LeaksAI Is Fueling Secrets Sprawl: GitGuardian Reports 81% Surge of AI-Service Leaks
2026-04-22SecretsHCSEC-2026-08: Vault DoS via Unauthenticated Root Token GenerationHCSEC-2026-08: Vault DoS via Unauthenticated Root Token Generation
2026-04-22SecretsHCSEC-2026-05: Vault KVv2 Metadata Policy Bypass DoSHCSEC-2026-05: Vault KVv2 Metadata Policy Bypass DoS
2026-04-22Supply ChainAxios npm Supply Chain Attack: 83M Downloads HitAxios npm Supply Chain Attack: 83M Downloads Hit
2026-04-22Supply ChainAxios npm Hijack 2026: Everything You Need to KnowAxios npm Hijack 2026: Everything You Need to Know
2026-04-22Supply ChainTeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV FilesTeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files
2026-04-22Supply Chainlitellm: Credential Stealer Hidden in PyPI Wheellitellm: Credential Stealer Hidden in PyPI Wheel
2026-04-22Supply ChainWhat's Coming to Our GitHub Actions 2026 Security RoadmapWhat's Coming to Our GitHub Actions 2026 Security Roadmap
2026-04-22Supply ChainShai-Hulud npm Supply Chain Attack: New Compromised Packages DetectedShai-Hulud npm Supply Chain Attack: New Compromised Packages Detected
2026-04-22Supply ChainLiteLLM and Telnyx Compromised on PyPI: Tracing the TeamPCP Supply Chain CampaignLiteLLM and Telnyx Compromised on PyPI: Tracing the TeamPCP Supply Chain Campaign
2026-04-22Supply ChainKeeping Your GitHub Actions Secure Part 1: Preventing Pwn RequestsKeeping Your GitHub Actions Secure Part 1: Preventing Pwn Requests
2026-04-22Supply ChainGitHub Actions Security Pt 1: Attacks & Defenses (Wiz)GitHub Actions Security Pt 1: Attacks & Defenses (Wiz)
2026-04-22MobileRoot/Jailbreak Detection and SSL Pinning in KMMRoot/Jailbreak Detection and SSL Pinning in KMM
2026-04-22MobileReversing Android Apps: Bypassing Detection Like a ProReversing Android Apps: Bypassing Detection Like a Pro
2026-04-22MobileReverse engineering and modifying Android apps with JADX and FridaReverse engineering and modifying Android apps with JADX and Frida
2026-04-22MobileCommon Vulnerabilities and Exposures Examples in Mobile AppsCommon Vulnerabilities and Exposures Examples in Mobile Apps
2026-04-22MobileBypassing iOS Frida Detection with LLDB and FridaBypassing iOS Frida Detection with LLDB and Frida
2026-04-22Mobilefrida-interception-and-unpinning: Scripts to MitM all HTTPS trafficfrida-interception-and-unpinning: Scripts to MitM all HTTPS traffic
2026-04-22MobileAndroid Reports and ResourcesAndroid Reports and Resources
2026-04-22MobileiOS Security Testing - OWASP MASTGiOS Security Testing - OWASP MASTG
2026-04-22MobileAndroid Security Bulletin - March 2026Android Security Bulletin - March 2026
2026-04-22MobileAndroid Security Bulletin - April 2026Android Security Bulletin - April 2026
2026-04-22API SecurityA Deep Dive on the Most Critical API Vulnerability: BOLAA Deep Dive on the Most Critical API Vulnerability: BOLA
2026-04-22API SecurityWhat Is Broken Object Property Level Authorization?What Is Broken Object Property Level Authorization?
2026-04-22API SecurityWhat Is Broken Object Level Authorization?What Is Broken Object Level Authorization?
2026-04-22API SecurityThis Is How I Hacked an API Using Mass Assignment VulnerabilityThis Is How I Hacked an API Using Mass Assignment Vulnerability
2026-04-22API SecurityCVE-2026-34839: CORS Vulnerability in Glances REST APICVE-2026-34839: CORS Vulnerability in Glances REST API
2026-04-22API SecurityAPI ThreatStats Report 2026API ThreatStats Report 2026
2026-04-22API SecurityVAmPI: Vulnerable REST API with OWASP Top 10 VulnerabilitiesVAmPI: Vulnerable REST API with OWASP Top 10 Vulnerabilities
2026-04-22API SecurityAPI4:2023 Unrestricted Resource ConsumptionAPI4:2023 Unrestricted Resource Consumption
2026-04-22API Security1H 2026 State of AI and API Security Report (Salt)1H 2026 State of AI and API Security Report (Salt)
2026-04-22API SecurityPortSwigger Lab: Exploiting a Mass Assignment VulnerabilityPortSwigger Lab: Exploiting a Mass Assignment Vulnerability
2026-04-22AuthZRights Management Approaches: ACL, RBAC, ABAC, ReBACRights Management Approaches: ACL, RBAC, ABAC, ReBAC
2026-04-22AuthZOPA, Cedar, OpenFGA: Why Are Policy Languages Trending Right Now?OPA, Cedar, OpenFGA: Why Are Policy Languages Trending Right Now?
2026-04-22AuthZOPA vs OpenFGA: A Technical Comparison of Policy EnginesOPA vs OpenFGA: A Technical Comparison of Policy Engines
2026-04-22AuthZImplementing Google Zanzibar: A Demonstration of Its BasicsImplementing Google Zanzibar: A Demonstration of Its Basics
2026-04-22AuthZHow to Protect Your API with OpenFGA: ReBAC Concepts to Practical UsageHow to Protect Your API with OpenFGA: ReBAC Concepts to Practical Usage
2026-04-22AuthZHow Google Drive Models Authorization: A Look into ZanzibarHow Google Drive Models Authorization: A Look into Zanzibar
2026-04-22AuthZCommon Bug Bounty Vulnerabilities: A Technical Deep Dive for Hunters in 2026Common Bug Bounty Vulnerabilities: A Technical Deep Dive for Hunters in 2026
2026-04-22AuthZCVE-2026-32877 - Red Hat Security AdvisoryCVE-2026-32877 - Red Hat Security Advisory
2026-04-22AuthZCVE 2026: When Identity Breaks and Legacy Code Bites BackCVE 2026: When Identity Breaks and Legacy Code Bites Back
2026-04-22AuthZWhat is Google Zanzibar?What is Google Zanzibar?
2026-04-22AIYou're Simulating the Wrong Attacker: Who Matters in AI Red TeamingYou're Simulating the Wrong Attacker: Who Matters in AI Red Teaming
2026-04-22AIDeepTeam: Open-Source Framework to Red Team LLMs and LLM SystemsDeepTeam: Open-Source Framework to Red Team LLMs and LLM Systems
2026-04-22AIClaude Jailbreaking in 2026: What Repello's Red Teaming Data ShowsClaude Jailbreaking in 2026: What Repello's Red Teaming Data Shows
2026-04-22AIAI-Infra-Guard: Full-Stack AI Red Teaming PlatformAI-Infra-Guard: Full-Stack AI Red Teaming Platform
2026-04-22AIAI Red Teaming Playground Labs (Microsoft)AI Red Teaming Playground Labs (Microsoft)
2026-04-22AIHackerOne: LLM01: Invisible Prompt InjectionProgram: HackerOne Severity: medium Weakness: LLM01: Prompt Injection ## Description Hey team, Hai is vulnerable to invisible prompt injection via Unicode tag characters. ## Reproduction steps 1. ...
2026-04-22AIWhen AI Meets the Web: Prompt Injection Risks in Third-Party AI Chatbot PluginsWhen AI Meets the Web: Prompt Injection Risks in Third-Party AI Chatbot Plugins
2026-04-22AIPrompt Injection Attacks on Agentic Coding Assistants: A Systematic AnalysisPrompt Injection Attacks on Agentic Coding Assistants: A Systematic Analysis
2026-04-22AIPrompt Injection 2.0: Hybrid AI ThreatsPrompt Injection 2.0: Hybrid AI Threats
2026-04-22AIArchitecting Secure AI Agents: System-Level Defenses Against Indirect Prompt InjectionArchitecting Secure AI Agents: System-Level Defenses Against Indirect Prompt Injection
2026-04-22FuzzingJazzer: Coverage-guided, in-process fuzzing for the JVMJazzer: Coverage-guided, in-process fuzzing for the JVM
2026-04-22FuzzingFuzzing 100+ open source projects with OSS-Fuzz - lessons learnedFuzzing 100+ open source projects with OSS-Fuzz - lessons learned
2026-04-22FuzzingLarge Language Model guided Protocol Fuzzing (NDSS)Large Language Model guided Protocol Fuzzing (NDSS)
2026-04-22FuzzingDetect Go's silent arithmetic bugs with go-panikintDetect Go's silent arithmetic bugs with go-panikint
2026-04-22FuzzingDenial of Fuzzing: Rust in the Windows kernelDenial of Fuzzing: Rust in the Windows kernel
2026-04-22FuzzingBringing Fuzz Testing to Kotlin with kotlinx.fuzzBringing Fuzz Testing to Kotlin with kotlinx.fuzz
2026-04-22FuzzingAdvanced binary fuzzing using AFL++-QEMU and libprotobufAdvanced binary fuzzing using AFL++-QEMU and libprotobuf
2026-04-22FuzzingdeepSURF: Detecting Memory Safety Vulnerabilities in Rust Through Fuzzing LLM-Augmented HarnessesdeepSURF: Detecting Memory Safety Vulnerabilities in Rust Through Fuzzing LLM-Augmented Harnesses
2026-04-22FuzzingFixing Security Vulnerabilities with AI in OSS-FuzzFixing Security Vulnerabilities with AI in OSS-Fuzz
2026-04-22FuzzingA Survey of Network Protocol Fuzzing: Model, Techniques and DirectionsA Survey of Network Protocol Fuzzing: Model, Techniques and Directions
2026-04-22Reconars0n-framework-v2: Bug Bounty Hunting Frameworkars0n-framework-v2: Bug Bounty Hunting Framework
2026-04-22ReconUncover Hidden Assets with Bug Bounty Recon: Fuzzing and JS AnalysisUncover Hidden Assets with Bug Bounty Recon: Fuzzing and JS Analysis
2026-04-22ReconSubdomain Takeover: Proof Creation for Bug BountiesSubdomain Takeover: Proof Creation for Bug Bounties
2026-04-22ReconShodan and Censys for beginners: How to find more vulnerabilitiesShodan and Censys for beginners: How to find more vulnerabilities
2026-04-22ReconHunting down subdomain takeover vulnerabilitiesHunting down subdomain takeover vulnerabilities
2026-04-22ReconFFuF Fuzzer Guide: Fuzz Faster u Fool for Bug Bounty HuntersFFuF Fuzzer Guide: Fuzz Faster u Fool for Bug Bounty Hunters
2026-04-22ReconOpen Source Intelligence Gathering: Techniques, Automation, and VisualizationOpen Source Intelligence Gathering: Techniques, Automation, and Visualization
2026-04-22ReconOWASP Test for Subdomain TakeoverOWASP Test for Subdomain Takeover
2026-04-22ReconMaximizing Security Outcomes: The Role of ASM in Bug Bounty ProgramsMaximizing Security Outcomes: The Role of ASM in Bug Bounty Programs
2026-04-22ReconBuilding a Fast One-Shot Recon Script for Bug BountyBuilding a Fast One-Shot Recon Script for Bug Bounty
2026-04-22TalksDEF CON 33 Talks - YouTube PlaylistDEF CON 33 Talks - YouTube Playlist
2026-04-22TalksDEF CON 33 Call IndexDEF CON 33 Call Index
2026-04-22TalksBlack Hat USA 2025 Briefings ScheduleBlack Hat USA 2025 Briefings Schedule
2026-04-22TalksBlack Hat USA 2025 - YouTube PlaylistBlack Hat USA 2025 - YouTube Playlist
2026-04-22TalksBlack Hat Official YouTube ChannelBlack Hat Official YouTube Channel
2026-04-22TalksDEF CON 33 AppSec VillageDEF CON 33 AppSec Village
2026-04-22TalksDEF CON 33 Aerospace Village Talk ScheduleDEF CON 33 Aerospace Village Talk Schedule
2026-04-22TalksAbout NDC Security 2026About NDC Security 2026
2026-04-22TalksUSENIX Security '26 Call for PapersUSENIX Security '26 Call for Papers
2026-04-22TalksUSENIX Security '26 SymposiumUSENIX Security '26 Symposium
2026-04-22Bug BountyThe Unofficial HackerOne Disclosure TimelineThe Unofficial HackerOne Disclosure Timeline
2026-04-22Bug BountyPublicly Disclosed HackerOne Bug Bounty FindingsPublicly Disclosed HackerOne Bug Bounty Findings
2026-04-22Bug BountyGraphQL - PortSwigger Lab WriteupGraphQL - PortSwigger Lab Writeup
2026-04-22Bug BountyBugBoard: Searchable Bug Bounty WriteupsBugBoard: Searchable Bug Bounty Writeups
2026-04-22Bug BountyAI Vulnerability Deep Dive: Prompt Injection (Bugcrowd)AI Vulnerability Deep Dive: Prompt Injection (Bugcrowd)
2026-04-22Bug BountyA Guide to the Hidden Threat of Prompt Injection (Bugcrowd)A Guide to the Hidden Threat of Prompt Injection (Bugcrowd)
2026-04-22Bug BountyWriteups for Hack The Box Bug Bounty CTF 2025Writeups for Hack The Box Bug Bounty CTF 2025
2026-04-22Bug BountyBug-Bounty-Methodology: JWT and Other Vulnerability ClassesBug-Bounty-Methodology: JWT and Other Vulnerability Classes
2026-04-22Bug BountyBug Bounty Writeups: Available Programs and WriteupsBug Bounty Writeups: Available Programs and Writeups
2026-04-22Bug BountyAwesome Google VRP WriteupsAwesome Google VRP Writeups
2026-04-22RCECritical SGLang Flaw (CVE-2026-5760) Enables RCE via Malicious AI ModelsCritical SGLang Flaw (CVE-2026-5760) Enables RCE via Malicious AI Models
2026-04-22RCECVE-2025-68454: Craft CMS Twig SSTI RCE VulnerabilityCVE-2025-68454: Craft CMS Twig SSTI RCE Vulnerability
2026-04-22RCE15,000 Jenkins Servers at Risk from RCE Vulnerability (CVE-2025-53652)15,000 Jenkins Servers at Risk from RCE Vulnerability (CVE-2025-53652)
2026-04-22RCEReact2Shell (CVE-2025-55182): RSC Flight Decoder Remote Code ExecutionReact2Shell (CVE-2025-55182): RSC Flight Decoder Remote Code Execution
2026-04-22RCEIvanti EPMM: Another Pre-Auth RCE (CVE-2026-1281 and CVE-2026-1340)Ivanti EPMM: Another Pre-Auth RCE (CVE-2026-1281 and CVE-2026-1340)
2026-04-22RCECVE-2025-57738: Apache Syncope Groovy Injection RCECVE-2025-57738: Apache Syncope Groovy Injection RCE
2026-04-22RCEAnthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply ChainAnthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain
2026-04-22RCECritical RCE Vulnerability in Anthropic MCP Inspector (CVE-2025-49596)Critical RCE Vulnerability in Anthropic MCP Inspector (CVE-2025-49596)
2026-04-22RCECVE-2025-24893: XWiki SSTI Unauthenticated RCE ExploitCVE-2025-24893: XWiki SSTI Unauthenticated RCE Exploit
2026-04-22RCECVE-2026-34197: ActiveMQ RCE via Jolokia APICVE-2026-34197: ActiveMQ RCE via Jolokia API
2026-04-22CSRFCVE-2025-12821: WordPress NewsBlogger CSRF Allowing RCECVE-2025-12821: WordPress NewsBlogger CSRF Allowing RCE
2026-04-22CSRFManipulating User Email: A CSRF PoC From TCM AcademyManipulating User Email: A CSRF PoC From TCM Academy
2026-04-22CSRFBypassing CSRF Token Validation TechniquesBypassing CSRF Token Validation Techniques
2026-04-22CSRFTZCERT Advisory: Critical WordPress Account Takeover (CVE-2025-3746)TZCERT Advisory: Critical WordPress Account Takeover (CVE-2025-3746)
2026-04-22CSRFCVE-2026-40925: CSRF in WWBN AVideo Configuration EndpointCVE-2026-40925: CSRF in WWBN AVideo Configuration Endpoint
2026-04-22CSRFCSRF in 2025: Not Dead, Just DifferentCSRF in 2025: Not Dead, Just Different
2026-04-22CSRFLab: SameSite Strict Bypass via Client-Side RedirectLab: SameSite Strict Bypass via Client-Side Redirect
2026-04-22CSRFInternet Bug Bounty: Argo CD CSRF leads to Kubernetes cluster compromiseProgram: Internet Bug Bounty Severity: high Weakness: Cross-Site Request Forgery (CSRF) GHSA: https://github.com/argoproj/argo-cd/security/advisories/GHSA-92mw-q256-5vwg It's been publicly known for...
2026-04-22Burp SuiteSulphurAPI: Burp Suite extension for automating OWASP API Top 10 detectionSulphurAPI: Burp Suite extension for automating OWASP API Top 10 detection
2026-04-22Burp SuiteAwesome Burp Extensions 2025Awesome Burp Extensions 2025
2026-04-22Burp SuiteTop 10 Web Hacking Techniques of 2025: Call for NominationsTop 10 Web Hacking Techniques of 2025: Call for Nominations
2026-04-22Burp SuiteThe future of BambdasThe future of Bambdas
2026-04-22Burp SuiteThe Future of Security Testing: AI-Powered Extensibility in BurpThe Future of Security Testing: AI-Powered Extensibility in Burp
2026-04-22Burp SuiteFiltering the WebSockets history with scriptsFiltering the WebSockets history with scripts
2026-04-22Burp SuiteFiltering the HTTP history with scripts (Bambdas)Filtering the HTTP history with scripts (Bambdas)
2026-04-22Burp SuiteDeveloping AI features in Burp extensionsDeveloping AI features in Burp extensions
2026-04-22Burp SuiteBurp AI - PortSwigger DocumentationBurp AI - PortSwigger Documentation
2026-04-22Burp SuiteBambdas - PortSwigger DocumentationBambdas - PortSwigger Documentation
2026-04-22PythonCVE-2025-68664: Critical LangChain Flaw Enables Secret ExtractionCVE-2025-68664: Critical LangChain Flaw Enables Secret Extraction
2026-04-22PythonBandit Python: Free SAST in 10 Seconds (2026 Review)Bandit Python: Free SAST in 10 Seconds (2026 Review)
2026-04-22PythonCVE-2026-22607: Fickling Python RCE VulnerabilityCVE-2026-22607: Fickling Python RCE Vulnerability
2026-04-22PythonCVE-2026-21226: Azure Core Python Library RCE VulnerabilityCVE-2026-21226: Azure Core Python Library RCE Vulnerability
2026-04-22PythonSGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model FilesSGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files
2026-04-22PythonMarimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of DisclosureMarimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure
2026-04-22PythonCritical SQL Injection Vulnerability in Django (CVE-2025-64459)Critical SQL Injection Vulnerability in Django (CVE-2025-64459)
2026-04-22PythonCERT-FR Warns of Python/CPython RCE Vulnerabilities (CVE-2026-4786, CVE-2026-6100)CERT-FR Warns of Python/CPython RCE Vulnerabilities (CVE-2026-4786, CVE-2026-6100)
2026-04-22PythonMalicious PyPI Packages Deliver SilentSync RATMalicious PyPI Packages Deliver SilentSync RAT
2026-04-22PythonBearer: SAST Tool to Discover, Filter, and Prioritize Security and Privacy RisksBearer: SAST Tool to Discover, Filter, and Prioritize Security and Privacy Risks
2026-04-22OSINTMaster Google Dorking: Advanced Techniques for OSINT and Ethical HackingMaster Google Dorking: Advanced Techniques for OSINT and Ethical Hacking
2026-04-22OSINTLessons from Building an Online Toolkit to Aid Open-Source InvestigationsLessons from Building an Online Toolkit to Aid Open-Source Investigations
2026-04-22OSINTIntelTechniques Books (Michael Bazzell)IntelTechniques Books (Michael Bazzell)
2026-04-22OSINTEpieos: The Ultimate OSINT ToolEpieos: The Ultimate OSINT Tool
2026-04-22OSINTBellingcat's Online Investigation ToolkitBellingcat's Online Investigation Toolkit
2026-04-22OSINTAutomating Google Dorking: From Manual OSINT Technique to Continuous MonitoringAutomating Google Dorking: From Manual OSINT Technique to Continuous Monitoring
2026-04-22OSINTmosint: An automated e-mail OSINT toolmosint: An automated e-mail OSINT tool
2026-04-22OSINTTelegram-OSINT: In-depth repository of Telegram OSINT resourcesTelegram-OSINT: In-depth repository of Telegram OSINT resources
2026-04-22OSINTEmail-Username-OSINT ToolboxEmail-Username-OSINT Toolbox
2026-04-22OSINTAwesome OSINT for EverythingAwesome OSINT for Everything
2026-04-22SQLiCVE-2025-1094: PostgreSQL SQL Injection VulnerabilityCVE-2025-1094: PostgreSQL SQL Injection Vulnerability
2026-04-22SQLiA Pentester's Guide to NoSQL InjectionA Pentester's Guide to NoSQL Injection
2026-04-22SQLiSQLMap Tamper Collection: Modern WAF Bypass Scripts (Cloudflare, AWS, Azure)SQLMap Tamper Collection: Modern WAF Bypass Scripts (Cloudflare, AWS, Azure)
2026-04-22SQLiSQL Injection and Postgres: An Adventure to Eventual RCESQL Injection and Postgres: An Adventure to Eventual RCE
2026-04-22SQLiPentesting PostgreSQL with SQL InjectionsPentesting PostgreSQL with SQL Injections
2026-04-22SQLiNoSQL Injection: Advanced Exploitation GuideNoSQL Injection: Advanced Exploitation Guide
2026-04-22SQLiExploits Explained: NoSQL Injection Returns Private InformationExploits Explained: NoSQL Injection Returns Private Information
2026-04-22SQLiCVE-2025-52694 PoC: Critical SQL Injection in Advantech IoTSuite/SaaS-ComposerCVE-2025-52694 PoC: Critical SQL Injection in Advantech IoTSuite/SaaS-Composer
2026-04-22SQLiMCP Vulnerability Case Study: SQL Injection in the Postgres MCP ServerMCP Vulnerability Case Study: SQL Injection in the Postgres MCP Server
2026-04-22SQLiBWAFSQLi: Bypassing Web Application Firewall with Adversarial SQL InjectionsBWAFSQLi: Bypassing Web Application Firewall with Adversarial SQL Injections
2026-04-22SSRFLibreChat SSRF Bypass via IPv6 Mapped Address ConfusionLibreChat SSRF Bypass via IPv6 Mapped Address Confusion
2026-04-22SSRFSSRF Vulnerability: Bypassing Protection with DNS Rebinding AttackSSRF Vulnerability: Bypassing Protection with DNS Rebinding Attack
2026-04-22SSRFis-localhost-ip 2.0.0 SSRF via Restrictions Bypass (CVE-2025-9960)is-localhost-ip 2.0.0 SSRF via Restrictions Bypass (CVE-2025-9960)
2026-04-22SSRFSee-SURF: Tool to Find Potential Vulnerable SSRF ParametersSee-SURF: Tool to Find Potential Vulnerable SSRF Parameters