CVE-2026-22730: SQL Injection in Spring AI’s MariaDB Vector Store
https://ift.tt/Rs3NUZW
Submitted March 19, 2026 at 02:17PM by appsec1337
via reddit https://ift.tt/HQNewlV
https://ift.tt/Rs3NUZW
Submitted March 19, 2026 at 02:17PM by appsec1337
via reddit https://ift.tt/HQNewlV
SecureLayer7 - Offensive Security, API Scanner & Attack Surface Management
CVE-2026-22730: SQL Injection in Spring AI’s MariaDB Vector Store
Contributors: Sandeep Kamble, BugDazz Autonomous Pentest AI, Rabit0 ModelPublication Date: March 19, 2026Severity Rating: Critical (CVSS Score: 8.8)Vulnerability Status: Zero-day at...
Kanboard Authenticated SQL Injection CVE-2026-33058 Writeup
https://ift.tt/Eh6Yc1R
Submitted March 19, 2026 at 02:48PM by _cydave
via reddit https://ift.tt/4Cqwajx
https://ift.tt/Eh6Yc1R
Submitted March 19, 2026 at 02:48PM by _cydave
via reddit https://ift.tt/4Cqwajx
0dave
Kanboard CVE-2026-33058 Writeup
Walkthrough of the discovery of an authenticated SQL injection in Kanboard version <= 1.2.50 tracked as CVE-2026-33058
A timeline of MCP security breaches: Tool poisoning, RCE via mcp-remote, sandbox escapes, and 7,000+ exposed servers
https://brightbean.xyz/blog/mcp-backdoor-zero-trust-architecture-security/
Submitted March 19, 2026 at 06:25PM by Ok-Constant6488
via reddit https://ift.tt/qw5vKTG
https://brightbean.xyz/blog/mcp-backdoor-zero-trust-architecture-security/
Submitted March 19, 2026 at 06:25PM by Ok-Constant6488
via reddit https://ift.tt/qw5vKTG
brightbean.xyz
MCP Is the Backdoor Your Zero-Trust Architecture Missed
The Model Context Protocol connects AI agents to enterprise tools — but it ships without authentication, authorization, or audit trails. With 7,000+ exposed servers and a growing list of CVEs, MCP has become the blind spot in your zero-trust perimeter. Here's…
CVE-2026-22729: JSONPath Injection in Spring AI’s PgVectorStore
https://ift.tt/lRTBg74
Submitted March 19, 2026 at 06:05PM by appsec1337
via reddit https://ift.tt/BFQzqPV
https://ift.tt/lRTBg74
Submitted March 19, 2026 at 06:05PM by appsec1337
via reddit https://ift.tt/BFQzqPV
SecureLayer7 - Offensive Security, API Scanner & Attack Surface Management
CVE-2026-22729: JSONPath Injection in Spring AI’s PgVectorStore
Contributors: Sandeep Kamble, BugDazz Autonomous Pentest AI, Rabit0 ModelPublication Date: March 19, 2026Severity Rating: High (CVSS Score: 8.6)Vulnerability Status: Zero-day at time of discovery...
Deep dive into how OS-level age verification systems can be bypassed
https://ift.tt/OXDc38w
Submitted March 19, 2026 at 05:54PM by raptorhunter22
via reddit https://ift.tt/gEZQ34V
https://ift.tt/OXDc38w
Submitted March 19, 2026 at 05:54PM by raptorhunter22
via reddit https://ift.tt/gEZQ34V
The CyberSec Guru
How to Bypass OS Age Verification Laws | The CyberSec Guru
Discover how the tech community uses VPNs, Ageless Linux, and self-hosted AI to bypass invasive OS age verification laws in California and Brazil
A Copy-Paste Bug That Broke PSpice® AES-256 Encryption
https://ift.tt/Z3NagJS
Submitted March 19, 2026 at 07:28PM by jtsylve
via reddit https://ift.tt/dhpB2FY
https://ift.tt/Z3NagJS
Submitted March 19, 2026 at 07:28PM by jtsylve
via reddit https://ift.tt/dhpB2FY
jtsylve.blog
A Copy-Paste Bug That Broke PSpice® AES-256 Encryption
PSpice is a SPICE circuit simulator from Cadence Design Systems that encrypts proprietary semiconductor model files to protect vendor IP and prevent reuse in third-party SPICE simulators. The encryption scheme is proprietary and undocumented.
OpenSIPS SQL Injection to Authentication Bypass (CVE-2026-25554)
https://ift.tt/jFiHvxo
Submitted March 19, 2026 at 07:14PM by MegaManSec2
via reddit https://ift.tt/k6rIQGu
https://ift.tt/jFiHvxo
Submitted March 19, 2026 at 07:14PM by MegaManSec2
via reddit https://ift.tt/k6rIQGu
AISLE
OpenSIPS SQL Injection to Authentication Bypass (CVE-2026-25554)
The AISLE analyzer discovered a high-severity vulnerability that enables SQL injection in OpenSIPS, a pillar of global communications used by over ...
BYOUD - Bring Your Own Unwind Data - By KlezVirus
https://klezvirus.github.io/posts/Byoud/
Submitted March 19, 2026 at 06:58PM by R3dCr0wn
via reddit https://ift.tt/BsZV7fM
https://klezvirus.github.io/posts/Byoud/
Submitted March 19, 2026 at 06:58PM by R3dCr0wn
via reddit https://ift.tt/BsZV7fM
klezVirus
Fantastic unwind information and where to find them
Foreword
I built a zero-knowledge CLI password manager from scratch. AES-256-GCM, Argon2id, 22 secret types, MCP support....
https://aaravmaloo.github.io/apm
Submitted March 19, 2026 at 06:46PM by aaravmaloo
via reddit https://ift.tt/l3DFnu6
https://aaravmaloo.github.io/apm
Submitted March 19, 2026 at 06:46PM by aaravmaloo
via reddit https://ift.tt/l3DFnu6
aaravmaloo.github.io
APM Documentation
Documentation for APM — a professional-grade, zero-knowledge CLI password manager.
Exploiting a PHP Object Injection in Profile Builder Pro in the era of AI
https://ift.tt/9UPyCfX
Submitted March 19, 2026 at 09:02PM by theMiddleBlue
via reddit https://ift.tt/qXNCHPT
https://ift.tt/9UPyCfX
Submitted March 19, 2026 at 09:02PM by theMiddleBlue
via reddit https://ift.tt/qXNCHPT
Sicuranext Blog
Exploiting a PHP Object Injection in Profile Builder Pro in the era of AI
WordPress plugin "Profile Builder Pro" (versions before 3.14.5) is susceptible to Unauthenticated PHP Object Injection. In this blog post, we discuss how we discovered and exploited the vulnerability using a novel POP chain, how AI helped in the process,…
Roundcube Webmail: three more sanitizer bypasses enable email tracking and phishing
https://ift.tt/bmZEs7U
Submitted March 19, 2026 at 02:08AM by [deleted]
via reddit https://ift.tt/O34fKgo
https://ift.tt/bmZEs7U
Submitted March 19, 2026 at 02:08AM by [deleted]
via reddit https://ift.tt/O34fKgo
NULL CATHEDRAL
Roundcube round two: three more sanitizer bypasses
Three more bypasses in Roundcube's HTML sanitizer: SMIL animation attributes load remote resources, unquoted body backgrounds enable CSS injection, and position:fixed !important enables phishing overlays.
we found a memory exhaustion CVE in a library downloaded 29 million times a month. AWS, DataHub, and Lightning AI are in the blast radius.
https://ift.tt/uCdXMEG
Submitted March 19, 2026 at 11:16PM by tobywilmox
via reddit https://ift.tt/pnLA0iX
https://ift.tt/uCdXMEG
Submitted March 19, 2026 at 11:16PM by tobywilmox
via reddit https://ift.tt/pnLA0iX
www.periphery.security
CVE-2026-33155 - 40 Bytes to Chaos - Periphery
CVE-2026-33155 - 40 Bytes to Chaos - Read the latest insights from Periphery on securing AI hardware, embedded systems, and critical infrastructure.
Sandboxing AI coding agents with kernel-level enforcement: built-in profiles for Claude Code, Codex, and OpenCode
https://ift.tt/TGNVnte
Submitted March 19, 2026 at 10:34PM by Remote_Parsnip_5827
via reddit https://ift.tt/3ApdLiV
https://ift.tt/TGNVnte
Submitted March 19, 2026 at 10:34PM by Remote_Parsnip_5827
via reddit https://ift.tt/3ApdLiV
nono.sh
How to Build nono Sandbox Profiles for AI Agents
Learn how to use nono learn, policy, and profile commands to build production-ready sandbox profiles for AI agents like Claude Code.
22 security advisories covering AI/ML infrastructure: 40 CVEs, 94 Sigma detection rules (MLflow, vLLM, PyTorch, Flowise, MCP servers, LangGraph, HuggingFace tooling)
https://ift.tt/KpRWndA
Submitted March 20, 2026 at 01:07AM by cyberamyntas
via reddit https://ift.tt/CapgrWA
https://ift.tt/KpRWndA
Submitted March 20, 2026 at 01:07AM by cyberamyntas
via reddit https://ift.tt/CapgrWA
raxe.ai
RAXE — Runtime AI Security Platform
Runtime AI security across network, host, and application layers. 1,000+ threat signatures with 100% local processing — zero data leaves your environment.
A 32-Year-Old Bug Walks Into A Telnet Server (GNU inetutils Telnetd CVE-2026-32746) - watchTowr Labs
https://ift.tt/HrkBAY6
Submitted March 20, 2026 at 01:53AM by dx7r__
via reddit https://ift.tt/Hs0QhSo
https://ift.tt/HrkBAY6
Submitted March 20, 2026 at 01:53AM by dx7r__
via reddit https://ift.tt/Hs0QhSo
watchTowr Labs
A 32-Year-Old Bug Walks Into A Telnet Server (GNU inetutils Telnetd CVE-2026-32746 Pre-Auth RCE)
A long, long time ago, in a land free of binary exploit mitigations, when Unix still roamed the Earth, there lived a pre-authentication Telnetd vulnerability.
In fact, this vulnerability was born so long ago (way back in 1994) that it may even be older than…
In fact, this vulnerability was born so long ago (way back in 1994) that it may even be older than…
Building a simple GRC tool for startups — what I learned so far
https://ift.tt/qzsZvp6
Submitted March 20, 2026 at 09:47AM by thehgtech
via reddit https://ift.tt/p2OAISi
https://ift.tt/qzsZvp6
Submitted March 20, 2026 at 09:47AM by thehgtech
via reddit https://ift.tt/p2OAISi
Thehgtech
Enterprise GRC Gap Analysis | ISO 27001 & NIST CSF 2.0 Readiness
Free, offline-first GRC engine. Generate gap analysis for ISO 27001, NIST CSF 2.0, and CIS v8 instantly.
I built a time-based encryption algorithm where the key changes every second — try it live
https://piyush-mishra-00.github.io/Kaalka-Encryption-Algorithm/
Submitted March 20, 2026 at 02:27PM by Consistent-Ruin1868
via reddit https://ift.tt/fiJPX5j
https://piyush-mishra-00.github.io/Kaalka-Encryption-Algorithm/
Submitted March 20, 2026 at 02:27PM by Consistent-Ruin1868
via reddit https://ift.tt/fiJPX5j
Reddit
From the netsec community on Reddit: I built a time-based encryption algorithm where the key changes every second — try it live
Posted by Consistent-Ruin1868 - 0 votes and 1 comment
Lookout's LLM-assistance findings in DarkSword iOS exploit kit: a source-by-source breakdown of what each research team actually said
https://ift.tt/xpkCfNw
Submitted March 20, 2026 at 08:11PM by LostPrune2143
via reddit https://ift.tt/yVexO0n
https://ift.tt/xpkCfNw
Submitted March 20, 2026 at 08:11PM by LostPrune2143
via reddit https://ift.tt/yVexO0n
blog.barrack.ai
DarkSword and the LLM Question: What Every Outlet Mentioned but Nobody Wrote About | Barrack AI
Eight outlets reported signs of LLM-assisted code in the DarkSword iOS exploit kit. None wrote the standalone analysis. This is that piece. A deep dive into Lookout's findings, prior art, and what it means for mobile threat landscape.
Claude Code workspace trust dialog bypass via repository settings loading order [CVE-2026-33068, CVSS 7.7]. Settings resolved before trust dialog shown.
https://ift.tt/r8YQjKI
Submitted March 20, 2026 at 11:10PM by cyberamyntas
via reddit https://ift.tt/xNzMqUG
https://ift.tt/r8YQjKI
Submitted March 20, 2026 at 11:10PM by cyberamyntas
via reddit https://ift.tt/xNzMqUG
RAXE
RAXE-2026-040: Claude Code Workspace Trust Dialog Bypass via Repository Settings (CVE-2026-33068) | RAXE Labs
A high-severity configuration loading order defect (`CVE-2026-33068`, CVSS v4.0 7.7 HIGH) in Anthropic's Claude Code CLI tool allows a malicious repository to bypass the workspace trust confirmation dialog.
Attack surface analysis of 5,121 MCP servers: 555 have toxic data flows where safe tools combine into dangerous paths
https://ift.tt/U2qwPsM
Submitted March 21, 2026 at 02:03AM by Kind-Release-3817
via reddit https://ift.tt/N0qGv3M
https://ift.tt/U2qwPsM
Submitted March 21, 2026 at 02:03AM by Kind-Release-3817
via reddit https://ift.tt/N0qGv3M
agentseal.org
AgentSeal - AI Agent Security Scanner
Break your AI agents before someone else does. Security scanning for system prompts, MCP servers, and AI coding agents.
Trivy Under Attack Again: Widespread GitHub Actions Tag Compromise Exposes CI/CD Secrets Attackers
https://ift.tt/hYKBoPI
Submitted March 21, 2026 at 10:31AM by ScottContini
via reddit https://ift.tt/xkBfM4w
https://ift.tt/hYKBoPI
Submitted March 21, 2026 at 10:31AM by ScottContini
via reddit https://ift.tt/xkBfM4w
Socket
Trivy Under Attack Again: Widespread GitHub Actions Tag Comp...
Attackers compromised Trivy GitHub Actions by force-updating tags to deliver malware, exposing CI/CD secrets across affected pipelines.