shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

269
active users

#vulnerability

10 posts10 participants0 posts today

SureForms WordPress Plugin flaw enables unauthenticated file deletion, potential site takeover

A vulnerabilityin the SureForms WordPress plugin (CVE-2025-6691) allows unauthenticated attackers to delete arbitrary files, including the wp-config.php file, which can force sites into setup mode and enable complete website takeover. Patches are available in multiple updated versions.

**If you have the SureForms WordPress plugin installed, immediately check your version and update to the latest patched release (1.7.4 or appropriate version for your branch). Don't delay this one, because you can't really hide the form, and updating the plugin is nearly trivial.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

BeyondMachinesSureForms WordPress Plugin flaw enables unauthenticated file deletion, potential site takeoverA vulnerabilityin the SureForms WordPress plugin (CVE-2025-6691) allows unauthenticated attackers to delete arbitrary files, including the wp-config.php file, which can force sites into setup mode and enable complete website takeover. Patches are available in multiple updated versions.

I received an email earlier this week from EA asking if I wanted to be added to a public acknowledgement page they were creating for individuals who responsibly disclosed vulnerabilities to them.

For all the shit people give EA, of the 100+ companies I contacted in the last two years, they were the only company I would say had a decent incident response.

They fixed the issue within 12 hours after validating it as critical, and proactively provided me multiple updates over time.

When the IR was done on their side, they reached out again with some more information about the potential impact if the issue hadn't been solved quickly, and also offered me a reward.

I did not have to keep chasing anyone for updates, I wasn't asked for non-disclosure, or offered money in exchange for it, and people replied instead of ignoring me.

I wasn't blamed for their mistake, either, or reported to the authorities.

Unfortunately, at least one or multiple of the things mentioned above are present in most of my other incidents reported; it's a real shit show out there.

This seems Very Bad(tm)
"... the downloaded profile can be potentially modified in such a way, so that the operator loses control over the profile (no ability for remote control / no ability to disable / invalidate it, etc.), the operator can be provided with a completely false view of the profile state (the result of its remote management ops in particular) or all of its activity can be subject to monitoring (vide rogue apps mimicking / proxying behavior of real ones)"
#infosec #vulnerability #esim #android #iphone
security-explorations.com/esim

security-explorations.comSecurity Explorations - eSIM security

Bluetooth vulnerabilities called PerfektBlue enable remote hacking of vehicles from major automakers

Security researchers discovered a vulnerability chain called "PerfektBlue" affecting OpenSynergy's BlueSDK Bluetooth stack used in millions of vehicles from major manufacturers including Mercedes-Benz, Volkswagen, and Skoda, with the most critical flaw. OpenSynergy released patches in September 2024 but many automakers have yet to deploy the firmware updates.

**This is another weird one. If you drive car from an affected manufacturer, that doesn't mean the manufacturer will make a patch. Definitely reach out to your service for update, but you may also have to accept that there may not be a patch issued. Make sure to limit pairing of devices to the car to only devices you know, and don't accept new bluetooth pairings unless you are sure which device it is.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

BeyondMachinesBluetooth vulnerabilities called PerfektBlue enable remote hacking of vehicles from major automakersSecurity researchers discovered a vulnerability chain called "PerfektBlue" affecting OpenSynergy's BlueSDK Bluetooth stack used in millions of vehicles from major manufacturers including Mercedes-Benz, Volkswagen, and Skoda, with the most critical flaw. OpenSynergy released patches in September 2024 but many automakers have yet to deploy the firmware updates.

VLAI: A RoBERTa-Based Model for Automated Vulnerability Severity Classification.

This paper presents VLAI, a transformer-based model that predicts software vulnerability severity levels directly from text descriptions. Built on RoBERTa, VLAI is fine-tuned on over 600,000 real-world vulnerabilities and achieves over 82% accuracy in predicting severity categories, enabling faster and more consistent triage ahead of manual CVSS scoring. The model and dataset are open-source and integrated into the Vulnerability-Lookup service.

We ( @cedric and I) decided to make a paper to better document how VLAI is implemented. We hope it will give other ideas and improvements in such model.

#vulnerability #cybersecurity #vulnerabilitymanagement #ai #nlp #opensource

@circl

🔗 arxiv.org/abs/2507.03607

arXiv logo
arXiv.orgVLAI: A RoBERTa-Based Model for Automated Vulnerability Severity ClassificationThis paper presents VLAI, a transformer-based model that predicts software vulnerability severity levels directly from text descriptions. Built on RoBERTa, VLAI is fine-tuned on over 600,000 real-world vulnerabilities and achieves over 82% accuracy in predicting severity categories, enabling faster and more consistent triage ahead of manual CVSS scoring. The model and dataset are open-source and integrated into the Vulnerability-Lookup service.

A critical Linux vulnerability (CVE-2025-32463) in Sudo lets any local unprivileged user gain root via the --chroot (-R) option

🔒 Affects default configs on Ubuntu, Fedora & others — no Sudo rules needed
🛠️ Fix: Update to Sudo 1.9.17p1+ (no workarounds)
👀 CVSS: 9.8 (Critical)

Highlights persistent risks in open-source privilege handling 🧩

cybersecuritynews.com/linux-su

#Linux #Sudo #FOSS #CyberSecurity #InfoSec #OpenSource #Vulnerability #Root #Exploit #SysAdmin #DevSecOps #Tech @TechNews

Cyber Security News · Linux Sudo chroot Vulnerability Enables Hackers to Elevate Privileges to RootA security vulnerability in the widely used Linux Sudo utility has been disclosed, allowing any local unprivileged user to escalate privileges. 
Continued thread

PLUS... I reveal that an AI is now the most successful bug bounty hunter in the USA, and Mark Stockley discovers an AI that can retrain itself.

Find "The AI Fix" in all good podcast apps:

🟢 Spotify: theaifix.show/spotify

🟣 Apple Podcasts: podcasts.apple.com/gb/podcast/

🛑 Pocket Casts: pca.st/itunes/1753381111

Everywhere else: theaifix.show/follow/

Critical Sudo vulnerabilities enable local privilege escalation to root

The Stratascale Cyber Research Unit are reporting two vulnerabilities in the Sudo utility, including a critical flaw (CVE-2025-32463) that allows unprivileged users to escalate to root privileges through the chroot option by exploiting NSS library loading mechanisms.

**This is a nasty flaw. If you have multiple user roles on your linux systems or are running services as non-root, make sure to update your Linux systems' Sudo utility to version 1.9.17p1 or later. The exploit vector is possible if someone already has local access to the system, which can either be through direct credentials or through breaching a vulnerable service that's running as non-root.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

BeyondMachinesCritical Sudo vulnerabilities enable local privilege escalation to rootThe Stratascale Cyber Research Unit are reporting two vulnerabilities in the Sudo utility, including a critical flaw (CVE-2025-32463) that allows unprivileged users to escalate to root privileges through the chroot option by exploiting NSS library loading mechanisms.

Researchers report Bluetooth flaws that enable remote eavesdropping, device hijacking

German cybersecurity researchers report critical vulnerabilities in Airoha Bluetooth system-on-chip technology affecting millions of headphones, earbuds, and speakers from major brands like Sony, Marshall, JBL, and Bose, allowing attackers within 10-meter range to remotely eavesdrop on conversations, hijack device connections, and access sensitive data without authentication.

**Be aware that your Bluetooth headphones and speakers from Sony, Marshall, JBL, Bose or other vendors, may be critically vulnerable to remote eavesdropping attacks. There is no immediate patch, so check regularly for firmware updates become available and in the meantime avoid using them (or even bringing them into) in sensitive environments. If you are journalist, diplomat, or work in sensitive businesses, consider not using at all or regularly unpairing bluetooth devices from your phone when not needed.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

BeyondMachinesResearchers report Bluetooth flaws that enable remote eavesdropping, device hijackingGerman cybersecurity researchers report critical vulnerabilities in Airoha Bluetooth system-on-chip technology affecting millions of headphones, earbuds, and speakers from major brands like Sony, Marshall, JBL, and Bose, allowing attackers within 10-meter range to remotely eavesdrop on conversations, hijack device connections, and access sensitive data without authentication.