The Network · 2026-03-06 17:13:36 · ai
Security researchers have identified a high-severity vulnerability in Google Chrome that enabled malicious browser extensions to hijack the browser's embedded Gemini Live AI panel. This flaw allowed rogue add-ons to inherit elevated system privileges they were never authorized to possess. The exploit effectively transf...
The Lab · 2026-03-27 19:27:27 · GitHub Issues
A critical security vulnerability has been identified in a system's authorization mechanism, where the core logic for checking user permissions is fundamentally inverted. This flaw does not merely create a minor bug but a direct pathway for privilege escalation, allowing unauthorized users to bypass security controls a...
The Lab · 2026-03-29 14:27:01 · GitHub Issues
A critical security flaw has been identified in the Tailscale macOS application, exposing an internal XPC service to any local program. The service, named "Downloader," lacks the mandatory `SMAuthorizedClients` validation, effectively removing the authentication barrier. This omission allows any application running on ...
The Lab · 2026-04-01 08:26:58 · GitHub Issues
A critical security flaw in Magix CMS 4 leaves the software's installation workflow fully accessible after deployment, enabling any unauthenticated attacker to completely hijack the website. The vulnerability stems from the installer entry point failing to properly block access once the CMS is configured, allowing remo...
The Lab · 2026-04-02 21:56:50 · Ars Technica
Two new attacks demonstrate a critical escalation in hardware-level threats, showing how a malicious user can gain complete root control of a host machine by performing novel Rowhammer attacks on high-performance Nvidia GPU cards. This is particularly dangerous given the economics of cloud computing, where these expens...
The Lab · 2026-04-03 15:27:02 · GitHub Issues
A critical access control vulnerability has been identified in the Athena platform's machine-to-machine (M2M) client registration system. The flaw allows any authenticated administrator to bypass the intended security controls and assign arbitrary, potentially dangerous OAuth2 scopes to new M2M clients. This server-sid...
The Lab · 2026-04-04 01:26:54 · Hacker News
A critical privilege escalation vulnerability in OpenClaw is being actively exploited, with system administrators warning that any unpatched instance has likely already been compromised. The flaw, which allows attackers to gain root-level access, was discovered after widespread reports of breaches across multiple envir...
The Lab · 2026-04-04 06:26:53 · GitHub Issues
A critical security vulnerability in Keycloak, the widely-used open-source identity and access management solution, has been disclosed. The flaw, tracked as CVE-2026-4282, resides in the SingleUseObjectProvider—a global key-value store that lacks proper type and namespace isolation. This architectural weakness creates ...
The Lab · 2026-04-04 09:26:59 · GitHub Issues
A critical security vulnerability has been flagged in a production codebase: the Docker images for the backend service are configured to run as the root user. Both the `Dockerfile.backend` and `backend/Dockerfile` lack a `USER` directive, meaning all container processes execute with full administrative privileges. This...
The Lab · 2026-04-05 22:26:50 · GitHub Issues
A critical privilege escalation vulnerability has been identified within GitHub's administrative infrastructure. The platform's feature flag management endpoints, which control system-wide functionality, are missing the mandatory admin role checks required to restrict access. This oversight means any authenticated user...
The Lab · 2026-04-06 08:27:04 · GitHub Issues
A critical security vulnerability has been identified in crun, a widely used open-source OCI container runtime. The flaw, designated CVE-2026-30892, stems from an incorrect parsing logic for the `--user` option within the `crun exec` command. Specifically, when a local user specifies the value `1`, the runtime incorrec...
The Lab · 2026-04-06 08:27:05 · GitHub Issues
A critical security flaw in the open-source crun container runtime enables local privilege escalation, allowing a user to gain root-level access. The vulnerability, tracked as CVE-2026-30892, stems from a parsing error in the `crun exec` command. When a user specifies the `--user` option with the value `1`, the system ...
The Lab · 2026-04-06 08:27:08 · GitHub Issues
A critical security flaw in the open-source crun container runtime enables local privilege escalation, posing a direct threat to containerized environments. The vulnerability, tracked as CVE-2026-30892, stems from a parsing error in the `--user` option during `crun exec` commands. Specifically, the runtime incorrectly ...
The Lab · 2026-04-06 19:27:07 · GitHub Issues
A GitHub issue has flagged a critical security vulnerability in a Laravel application's codebase, where directly passing unfiltered user input to model objects creates a direct path for privilege escalation. The current practice of using `$request->all()` without a mediating data transfer object (DTO) layer allows mali...
The Lab · 2026-04-07 13:27:17 · GitHub Issues
A critical authentication vulnerability has been identified in two core API models, allowing attackers to potentially impersonate any user. The flaw stems from a dangerous design pattern where the API accepts both a cryptographically verified JWT token and a separate, client-submitted user ID parameter (`asf_uid`). Thi...
The Lab · 2026-04-08 15:27:25 · GitHub Issues
A critical privilege escalation vulnerability in Slurm's accounting system, tracked as CVE-2025-43904, exposes AWS ParallelCluster users to significant security risks. The flaw, present in Slurm versions 23.11 and 24.05, allows a user with 'Coordinator' privileges to arbitrarily promote another user to the powerful 'Ad...
The Lab · 2026-04-10 08:39:46 · GitHub Issues
A critical Time-of-Check-Time-of-Use (TOCTOU) vulnerability has been discovered in the SUID binary `/usr/bin/mount` from the util-linux package, tracked as CVE-2026-27456. This flaw allows a local, unprivileged user to potentially escalate privileges to root by exploiting a race condition during the setup of loop devic...
The Lab · 2026-04-12 22:22:35 · GitHub Issues
A critical security vulnerability in the Gardener Kubernetes management platform could allow project administrators to seize control of the underlying seed clusters that manage their workloads. The flaw, tracked as CVE-2025-47283, represents a severe privilege escalation risk within the core `gardener/gardener` compone...
The Lab · 2026-04-14 02:22:43 · GitHub Issues
A moderate-severity vulnerability in the Apache Tomcat installer for Windows exposes systems to potential local privilege escalation. The flaw, tracked as CVE-2025-49124 (GHSA-42wg-hm62-jcwg), is an untrusted search path issue. During installation, the installer calls the system utility `icacls.exe` without specifying ...
The Lab · 2026-04-15 00:22:43 · GitHub Issues
A critical security misconfiguration has been identified in a Docker container setup, where the nginx process runs with full root privileges. This common oversight in the `Dockerfile`—the absence of a `USER` directive—creates a direct path for attackers. If a vulnerability in nginx is exploited or shell access is gaine...