ox.security
Resources curated from this publisher and indexed across appsec.fyi topic pages. Last item added: 2026-04-23.
| Date Added | Resource | Excerpt |
|---|---|---|
| 2026-04-23 2026 | Shai-Hulud: The Third Coming Bitwarden CLI Backdoored in Latest Supply Chain CampaignSupply Chain | Shai-Hulud: The Third Coming — Bitwarden CLI Backdoored in Latest Supply Chain Campaign https://ift.tt/OsEXhPW |
| 2026-04-23 2026 | Xinference allegedly hacked by TeamPCP Malicious Package In PyPiSupply Chain | Xinference allegedly hacked by TeamPCP, Malicious Package In PyPi https://ift.tt/vMwcIWt |
| 2026-04-20 2026 | Supply Chain Attack Hits Vercel: User Data is Being Sold on BreachForums For $2MSupply Chain | Supply Chain Attack Hits Vercel: User Data is Being Sold on BreachForums For $2M https://ift.tt/4aw2YkZ |
| 2026-04-16 2026 | The Mother of All AI Supply Chains: Critical Systemic Vulnerability at the Core of Anthropics MCPAI | The Mother of All AI Supply Chains: Critical, Systemic Vulnerability at the Core of Anthropic’s MCP https://ift.tt/Yf8v473 |
| 2026-04-16 2026 | MCP Supply Chain Advisory: RCE Vulnerabilities Across the AI EcosystemAI | MCP Supply Chain Advisory: RCE Vulnerabilities Across the AI Ecosystem https://ift.tt/dn3MWOq |
| 2026-04-05 2026 | Known Unpatched Exploitable: Redashs Python Sandbox Escape Gives Attackers Full Server AccessPython | Known, Unpatched, Exploitable: Redash’s Python Sandbox Escape Gives Attackers Full Server Access https://ift.tt/ESYHCpg |
| 2026-04-03 2026 | Axios Compromised With A Malicious DependencySupply Chain | Axios Compromised With A Malicious Dependency https://ift.tt/UGiNTD9 |
| 2026-01-27 2026 | XSS in Live Preview Microsoft VS Code Extension with 11M DownloadsXSS | The content discusses a Cross-Site Scripting (XSS) vulnerability found in the Live Preview feature of a popular Microsoft VS Code Extension with 11 million downloads. The vulnerability could potentially allow attackers to execute malicious scripts on users' systems. It highlights the importance of addressing security flaws in widely used software to prevent exploitation by malicious actors. |