- Joined
- Mar 1, 2021
Pretty big news, the MITRE foundations support for the CVE program is set to expire today:
MITRE’s Support for CVE Program Set to Expire | Archive
MITRE’s Support for CVE Program Set to Expire | Archive
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.

And at the end CISA extended for another 11 monthsPretty big news, the MITRE foundations support for the CVE program is set to expire today:
MITRE’s Support for CVE Program Set to Expire | Archive
Not surprised at all given how crucial the CVE program is. Can't wait for exactly the same thing to happen in 11 months lmao
A major security flaw in Git just dropped. Arbitrary code can be run on your machine when you clone a repo.
Minimal example illustrating it is here:
Distros are scrambling to get ahead of this, or at least not too far behind it.
ETA:
Hacker News discussion: https://news.ycombinator.com/item?id=44502330
Debian bug (severity grave): https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108983
Homebrew PR: https://github.com/Homebrew/homebrew-core/pull/229423 (merged already)
NixOS PR: https://github.com/NixOS/nixpkgs/pull/423553 (merged)
Alpine MR: https://gitlab.alpinelinux.org/alpine/aports/-/merge_requests/86835 (merged)
Should've used mercurial, pijul or Fossil, but who am I kidding, two use Rust and another uses SQL.Crosspost:
Published: 2025-07-08
Updated: 2025-07-08
Title: SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability
Description:Heap-based buffer overflow in Windows SPNEGO Extended Negotiation allows an unauthorized attacker to execute code over a network.
9.8 CRITICAL 3.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL /RC
Mitigations
The following mitigating factors might be helpful in your situation:
This vulnerability affects Windows client machines running Windows 10, version 1607 and above, due to the following GPO being enabled by default on these operating systems: "Network security: Allow PKU2U authentication requests to this computer to use online identities".
How could an attacker exploit the vulnerability?
An attacker could exploit this vulnerability by sending a malicious message to the server, potentially leading to remote code execution.
What is SPNEGO Extended Negotiation?
The SPNEGO Extended Negotiation Security Mechanism (NEGOEX) extends Simple and Protected GSS-API Negotiation Mechanism (SPNEGO) described in [RFC4178].
CVE-2024-363505.6 (Medium) AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:NA transient execution vulnerability in some AMD processors may allow an attacker to infer data from previous stores, potentially resulting in the leakage of privileged information.
CVE-2024-363575.6 (Medium) AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:NA transient execution vulnerability in some AMD processors may allow an attacker to infer data in the L1D cache, potentially resulting in the leakage of sensitive information across privileged boundaries.
CVE-2024-363483.8 (Low) AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:NA transient execution vulnerability in some AMD processors may allow a user process to infer the control registers speculatively even if UMIP[3] feature is enabled, potentially resulting in information leakage.
CVE-2024-363493.8 (Low) AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:NA transient execution vulnerability in some AMD processors may allow a user process to infer TSC_AUX even when such a read is disabled, potentially resulting in information leakage.
A vulnerability was found in Belkin F9K1009 and F9K1010 2.00.04/2.00.09 and classified as critical. Affected by this issue is some unknown functionality of the component Web Interface. The manipulation leads to hard-coded credentials. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
I've been working on testing against timing attacks using tlsfuzzer, the newest version of that code is in the upstream pregenerate branch[1].
What's special about it, is that it is much more sensitive to timing side-channels than both my previous attempts at it, from bug 1651411, and what the published research suggests. In particular, I'm able to detect the OpenSSL side-channel caused by the https://github.com/openssl/openssl/issues/6640 bug in just 10 thousand connections with 2048 bit RSA keys, over local gigabit Ethernet: the measured side channel is about 55ns while the test provides a result with a 95% confidence interval of ±36ns.
I haven't executed extensive tests against NSS, so I don't have good results with NSS just yet, but I've talked with Bob about the NSS code and how it handles multi-precision integers. The problem is similar as the one in OpenSSL.
The MPI objects internally represent large integers as a list of word-sized (64bit or 32bit) integers. The problem is, that many operations on objects perform "clamping" (if the most significant word is zero, they drop it and store the number in fewer words), in particular, the modulo multiplication performing the unblinding after the modular exponentiation in RSA private key decryption.
The problem is that when such number then needs to be converted to a byte string, so that it can be fed into a hash function, or so that the padding can be checked (be it PKCS#1v1.5 or OAEP), that operation can't take the same amount of time, since it operates on different number of words used to represent the number. In other words, that conversion then leaks if the high order bytes are zero or not: precisely the signal necessary for Bleichenbacher oracle.
I'll add detailed test results later.
Please keep this issue embargoed as other implementations are vulnerable, so we'd prefer to release information about it in a coordinated fashion.
The ICTBroadcast application unsafely passes session cookie data to shell processing, allowing an attacker to inject shell commands into a session cookie that get executed on the server. This results in unauthenticated remote code execution in the session handling.
I nominate this bug for the glownigger of the year award.
Belkin pulled the age old "whoops we forgot to remove hardcoded passwords" and may not have changed it for all these years CVE-2025-8730 (CVSS 8.9). This is a router from 2015.
We recently received a report via our bug bounty program that there was a potential security issue affecting PMS versions 1.41.7.x to 1.42.0.x. Thanks to that user, we were able to address the issue and continue to improve our security and defenses.
We strongly recommend that everyone have their PMS updated to the most recent version as soon as possible, if you have not already done so.
The new version, 1.42.1, is now available to update through the PMS management page or you can download it here:
it looks like this is the kind of thing that could only be taken advantage of by third party tools that hook into unity. while thinking of what could possibly even fit that description - i am immediately reminded of the game Sulfur that runs on unity and its small modding community is entirely reliant on a mod loader that a chinese guy made and uploaded to github that is not open source and uses a bunch of provided DLL's to hook into the game.Somewhat late, but still. Unity-related: CVE-2025-59489
"Unity Runtime before 2025-10-02 on Android, Windows, macOS, and Linux allows argument injection that can result in loading of library code from an unintended location"
That's a lot of video games and a lot of platforms.
Cat ear (power) inverter: "In the new version I...
Double Free and possible RCE vulnerability in Apache HTTP Server with the HTTP/2 protocol. This issue affects Apache HTTP Server: 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue.