Full Disclosure A public, vendor-neutral forum for detailed discussion of vulnerabilities and exploitation techniques, as well as tools, papers, news, and events of interest to the community. The relaxed atmosphere of this quirky list provides some comic relief and certain industry gossip. More importantly, fresh vulnerabilities sometimes hit this list many hours or days before they pass through the Bugtraq moderation queue.
- Remote DoS in httpx 1.7.0 – Out-of-Bounds Read via Malformed
Tag on June 26, 2025 at 4:37 amPosted by Brian Carpenter via Fulldisclosure on Jun 25Hey list, You can remotely crash httpx v1.7.0 (by ProjectDiscovery) by serving a malformed <title> tag on your website. The bug is a classic out-of-bounds read in trimTitleTags() due to a missing bounds check when slicing the title string. It panics with: panic: runtime error: slice bounds out of range [9:6] Affects anyone using httpx in their automated scanning pipeline. One malformed HTML response = scanner down. Unit testing or…
- CVE-2025-32978 – Quest KACE SMA Unauthenticated License Replacementon June 24, 2025 at 3:13 am
Posted by Seralys Research Team via Fulldisclosure on Jun 23 Seralys Security Advisory | https://www.seralys.com/research ====================================================================== Title: Unauthenticated License Replacement Product: Quest KACE Systems Management Appliance (SMA) Affected: Confirmed on 14.1 (older versions likely affected) Fixed in: 13.0.385, 13.1.81, 13.2.183, 14.0.341(Patch 5), 14.1.101(Patch 4) Vendor: Quest Software Discovered: April…
- CVE-2025-32977 – Quest KACE Unauthenticated Backup Uploadon June 24, 2025 at 3:13 am
Posted by Seralys Research Team via Fulldisclosure on Jun 23 Seralys Security Advisory | https://www.seralys.com/research ====================================================================== Title: Unauthenticated Backup Upload Product: Quest KACE Systems Management Appliance (SMA) Affected: Confirmed on 14.1 (older versions likely affected) Fixed in: 13.0.385, 13.1.81, 13.2.183, 14.0.341(Patch 5), 14.1.101(Patch 4) Vendor: Quest Software Discovered: April 2025…
- CVE-2025-32976 – Quest KACE SMA 2FA Bypasson June 24, 2025 at 3:13 am
Posted by Seralys Research Team via Fulldisclosure on Jun 23 Seralys Security Advisory | https://www.seralys.com/research ====================================================================== Title: 2FA Bypass Product: Quest KACE Systems Management Appliance (SMA) Affected: Confirmed on 14.1 (older versions likely affected) Fixed in: 13.0.385, 13.1.81, 13.2.183, 14.0.341(Patch 5), 14.1.101(Patch 4) Vendor: Quest Software Discovered: April 2025 Severity: HIGH…
- CVE-2025-32975 – Quest KACE SMA Authentication Bypasson June 24, 2025 at 3:13 am
Posted by Seralys Research Team via Fulldisclosure on Jun 23 Seralys Security Advisory | https://www.seralys.com/research ====================================================================== Title: Authentication Bypass Product: Quest KACE Systems Management Appliance (SMA) Affected: Confirmed on 14.1 (older versions likely affected) Fixed in: 13.0.385, 13.1.81, 13.2.183, 14.0.341(Patch 5), 14.1.101(Patch 4) Vendor: Quest Software Discovered: April 2025 Severity:…
- RansomLord (NG v1.0) anti-ransomware exploit toolon June 24, 2025 at 3:12 am
Posted by malvuln on Jun 23First official NG versioned release with significant updates, fixes and new features https://github.com/malvuln/RansomLord/releases/tag/v1.0 RansomLord (NG) v1.0 Anti-Ransomware exploit tool. Proof-of-concept tool that automates the creation of PE files, used to exploit ransomware pre-encryption. Lang: C SHA256: ACB0C4EEAB421761B6C6E70B0FA1D20CE08247525641A7CD03B33A6EE3D35D8A Deweaponize feature PoC video:…
- Disclosure Yealink Cloud vulnerabilitieson June 24, 2025 at 3:11 am
Posted by Jeroen Hermans via Fulldisclosure on Jun 23Dear all, —Abstract— Yealink RPS contains several vulnerabilities that can lead to leaking of PII and/or MITM attacks. Some vulnerabilities are unpatched even after disclosure to the manufacturer. —/Abstract— We are Stefan Gloor and Jeroen Hermans. We are independent computer security researchers working on a disclosure process for critical vulnerabilities we found in Yealink telecommunication devices and infrastructure. In the…
- : “Glass Cage” – Zero-Click iMessage → Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)on June 18, 2025 at 3:07 am
Posted by josephgoyd via Fulldisclosure on Jun 17″Glass Cage” – Sophisticated Zero-Click iMessage Exploit ChainEnabling Persistent iOS Compromise and Device Bricking CVE-2025-24085, CVE-2025-24201(CNVD-2025-07885) Author: Joseph Goydish II Date: 06/10/2025 Release Type: Full Disclosure Platform Affected: iOS 18.2 (confirmed zero-day at time of discovery) Delivery Vector: iMessage (default configuration) Impact: Remote Code Execution, Privilege Escalation, Keychain Exfiltration,…
- SEC Consult SA-20250612-0 :: Reflected Cross-Site Scripting in ONLYOFFICE Docs (DocumentServer)on June 18, 2025 at 3:07 am
Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Jun 17SEC Consult Vulnerability Lab Security Advisory < 20250612-0 > ======================================================================= title: Reflected Cross-Site Scripting product: ONLYOFFICE Docs (DocumentServer) vulnerable version: <=8.3.1 fixed version: 8.3.2 or higher CVE number: CVE-2025-5301 impact: Medium homepage: https://www.onlyoffice.com/…
- SEC Consult SA-20250611-0 :: Undocumented Root Shell Access on SIMCom SIM7600G Modemon June 18, 2025 at 3:07 am
Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Jun 17SEC Consult Vulnerability Lab Security Advisory < 20250611-0 > ======================================================================= title: Undocumented Root Shell Access product: SIMCom – SIM7600G Modem vulnerable version: Firmware Revision: LE20B03SIM7600M21-A fixed version: – CVE number: CVE-2025-26412 impact: Medium homepage: https://www.simcom.com…
- Call for Applications: ERCIM STM WG 2025 Award for the Best Ph.D. Thesis on Security and Trust Management (July 31, 2025)on June 18, 2025 at 3:03 am
Posted by 0610648533 on Jun 17======================================================================== CALL FOR APPLICATIONS ERCIM STM WG 2025 Award for the Best Ph.D. Thesis on Security and Trust Management ======================================================================== The European Research Consortium in Informatics and Mathematics (ERCIM) has a technical WG on Security and Trust Management (STM) for performing a series of activities, as research projects,…
- SEC Consult SA-20250604-0 :: Local Privilege Escalation and Default Credentials in INDAMED – MEDICAL OFFICE (Medical practice management) Demo versionon June 10, 2025 at 2:44 am
Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Jun 09SEC Consult Vulnerability Lab Security Advisory < 20250604-0 > ======================================================================= title: Local Privilege Escalation and Default Credentials product: INDAMED – MEDICAL OFFICE (Medical practice management) Demo version vulnerable version: Revision 18544 (II/2024) fixed version: Q2/2025 (Privilege Escalation, Default Password)…
- Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain → Secure Enclave Key Theft, Wormable RCE, Crypto Thefton June 10, 2025 at 2:43 am
Posted by josephgoyd via Fulldisclosure on Jun 09Hello Full Disclosure, This is a strategic public disclosure of a zero-click iMessage exploit chain that was discovered live on iOS 18.2 and remained unpatched through iOS 18.4. It enabled Secure Enclave key theft, wormable remote code execution, and undetectable crypto wallet exfiltration. Despite responsible disclosure, the research was suppressed by the vendor. Apple issued a silent fix in iOS 18.4.1 (April 2025) without public…
- Defense in depth — the Microsoft way (part 89): user group policies don’t deserve tamper protectionon June 3, 2025 at 1:03 pm
Posted by Stefan Kanthak on Jun 03Hi @ll, user group policies are stored in DACL-protected registry keys [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies] respectively [HKEY_CURRENT_USER\Software\Policies] and below, where only the SYSTEM account and members of the “Administrators” user group are granted write access. At logon the user’s registry hive “%USERPROFILE%\ntuser.dat” is loaded with exclusive (read, write and…
- CVE-2025-45542: Time-Based Blind SQL Injection in CloudClassroom PHP Project v1.0on June 3, 2025 at 1:03 pm
Posted by Sanjay Singh on Jun 03Hello Full Disclosure list, I am sharing details of a newly assigned CVE affecting an open-source educational software project: ———————————————————————— CVE-2025-45542: Time-Based Blind SQL Injection in CloudClassroom PHP Project v1.0 ———————————————————————— Product: CloudClassroom PHP Project Vendor:…