Tag: injection
-
New ChatGPT Vulnerabilities Let Hackers Steal Data, Hijack Memory
Seven vulnerabilities in ChatGPT (including GPT-5) allow attackers to use ‘0-click’ and ‘memory injection’ to bypass safety features and persistently steal private user data and chat history. Tenable Research exposes the flaws. First seen on hackread.com Jump to article: hackread.com/chatgpt-vulnerabilities-hackers-hijack-memory/
-
New ChatGPT Vulnerabilities Let Hackers Steal Data, Hijack Memory
Seven vulnerabilities in ChatGPT (including GPT-5) allow attackers to use ‘0-click’ and ‘memory injection’ to bypass safety features and persistently steal private user data and chat history. Tenable Research exposes the flaws. First seen on hackread.com Jump to article: hackread.com/chatgpt-vulnerabilities-hackers-hijack-memory/
-
Multiple Django Flaws Could Allow SQL Injection and DenialService Attacks
The Django development team has released critical security patches addressing two significant vulnerabilities that could expose applications to denial-of-service attacks and SQL injection exploits. The security releases for Django 5.2.8, 5.1.14, and 4.2.26 were published on November 5, 2025, in accordance with Django’s standard security release policy. The two disclosed vulnerabilities pose different levels of…
-
HackedGPT: Novel AI Vulnerabilities Open the Door for Private Data Leakage
Tenable Research has discovered seven vulnerabilities and attack techniques in ChatGPT, including unique indirect prompt injections, exfiltration of personal user information, persistence, evasion, and bypass of safety mechanisms. Key takeaways: Tenable Research has discovered multiple new and persistent vulnerabilities in OpenAI’s ChatGPT that could allow an attacker to exfiltrate private information from users’ memories and…
-
HackedGPT: Novel AI Vulnerabilities Open the Door for Private Data Leakage
Tenable Research has discovered seven vulnerabilities and attack techniques in ChatGPT, including unique indirect prompt injections, exfiltration of personal user information, persistence, evasion, and bypass of safety mechanisms. Key takeaways: Tenable Research has discovered multiple new and persistent vulnerabilities in OpenAI’s ChatGPT that could allow an attacker to exfiltrate private information from users’ memories and…
-
HackedGPT: Novel AI Vulnerabilities Open the Door for Private Data Leakage
Tenable Research has discovered seven vulnerabilities and attack techniques in ChatGPT, including unique indirect prompt injections, exfiltration of personal user information, persistence, evasion, and bypass of safety mechanisms. Key takeaways: Tenable Research has discovered multiple new and persistent vulnerabilities in OpenAI’s ChatGPT that could allow an attacker to exfiltrate private information from users’ memories and…
-
Claude Desktop Extensions Vulnerable to Web-Based Prompt Injection
Three of Anthropic’s Claude Desktop extensions were vulnerable to command injection flaws that have now been fixed First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/claude-desktop-extensions-prompt/
-
CISA Alerts of Control Web Panel Command Injection Flaw Actively Exploited
Tags: cisa, control, cve, cyber, cybersecurity, exploit, flaw, infrastructure, injection, threat, vulnerabilityThe Cybersecurity and Infrastructure Security Agency has issued an urgent alert about a critical command-injection vulnerability in Control Web Panel that is currently being actively exploited in the wild. Tracked as CVE-2025-48703, this flaw poses a significant threat to organizations running the popular server management platform and demands immediate attention from system administrators worldwide. Control…
-
CISA Alerts of Control Web Panel Command Injection Flaw Actively Exploited
Tags: cisa, control, cve, cyber, cybersecurity, exploit, flaw, infrastructure, injection, threat, vulnerabilityThe Cybersecurity and Infrastructure Security Agency has issued an urgent alert about a critical command-injection vulnerability in Control Web Panel that is currently being actively exploited in the wild. Tracked as CVE-2025-48703, this flaw poses a significant threat to organizations running the popular server management platform and demands immediate attention from system administrators worldwide. Control…
-
Claude Desktop Extensions Vulnerable to Web-Based Prompt Injection
Three of Anthropic’s Claude Desktop extensions were vulnerable to command injection flaws that have now been fixed First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/claude-desktop-extensions-prompt/
-
CISA Alerts of Control Web Panel Command Injection Flaw Actively Exploited
Tags: cisa, control, cve, cyber, cybersecurity, exploit, flaw, infrastructure, injection, threat, vulnerabilityThe Cybersecurity and Infrastructure Security Agency has issued an urgent alert about a critical command-injection vulnerability in Control Web Panel that is currently being actively exploited in the wild. Tracked as CVE-2025-48703, this flaw poses a significant threat to organizations running the popular server management platform and demands immediate attention from system administrators worldwide. Control…
-
Hackers Turn Claude AI Into Data Thief With New Attack
Prompt injection allowed attackers to make Claude exfiltrate user data. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/hackers-turn-claude-ai-into-data-thief-with-new-attack/
-
New backdoor ‘SesameOp’ abuses OpenAI Assistants API for stealthy C2 operations
Lessons for defenders and platform providers: Microsoft clarified that OpenAI’s platform itself wasn’t breached or exploited; rather, its legitimate API functions were misused as a relay channel, highlighting a growing risk as generative AI becomes part of enterprise and development workflows. Attackers can now co-opt public AI endpoints to mask malicious intent, making detection significantly…
-
New backdoor ‘SesameOp’ abuses OpenAI Assistants API for stealthy C2 operations
Lessons for defenders and platform providers: Microsoft clarified that OpenAI’s platform itself wasn’t breached or exploited; rather, its legitimate API functions were misused as a relay channel, highlighting a growing risk as generative AI becomes part of enterprise and development workflows. Attackers can now co-opt public AI endpoints to mask malicious intent, making detection significantly…
-
New backdoor ‘SesameOp’ abuses OpenAI Assistants API for stealthy C2 operations
Lessons for defenders and platform providers: Microsoft clarified that OpenAI’s platform itself wasn’t breached or exploited; rather, its legitimate API functions were misused as a relay channel, highlighting a growing risk as generative AI becomes part of enterprise and development workflows. Attackers can now co-opt public AI endpoints to mask malicious intent, making detection significantly…
-
The New Frontier of Cyber Threats: Unpacking Prompt Injection, Model Poisoning and Adversarial Attacks in AI Security
Artificial Intelligence is reshaping the cybersecurity landscape”, and with it, a new generation of attack vectors is emerging. From prompt injection to model poisoning and adversarial attacks, threat actors are exploiting vulnerabilities unique to AI systems. This article explores how these threats operate, their potential impact, and what defenders must do to build resilient, trustworthy…
-
Anthropic Claude Unternehmensdaten gefährdet
Tags: ai, api, bug, bug-bounty, cyberattack, data, exploit, google, infrastructure, injection, network, risk, vulnerabilityEin aktueller Report zeigt, wie sich über Anthropic Claude sensible Daten extrahieren lassen.Eine kürzlich bekannt gewordene Schwachstelle im KI-Assistenten Claude von Anthropic könnte von Angreifern ausgenutzt werden, um heimlich Unternehmensdaten zu exfiltrieren. Dabei lassen sich auch Sicherheitskonfigurationen umgehen, die solche Attacken eigentlich verhindern sollen. Wie sich das mithilfe indirekter Prompt-Injection-Techniken und Claudes Code Interpreter bewerkstelligen…
-
The New Frontier of Cyber Threats: Unpacking Prompt Injection, Model Poisoning and Adversarial Attacks in AI Security
Artificial Intelligence is reshaping the cybersecurity landscape”, and with it, a new generation of attack vectors is emerging. From prompt injection to model poisoning and adversarial attacks, threat actors are exploiting vulnerabilities unique to AI systems. This article explores how these threats operate, their potential impact, and what defenders must do to build resilient, trustworthy…
-
Anthropic Claude Unternehmensdaten gefährdet
Tags: ai, api, bug, bug-bounty, cyberattack, data, exploit, google, infrastructure, injection, network, risk, vulnerabilityEin aktueller Report zeigt, wie sich über Anthropic Claude sensible Daten extrahieren lassen.Eine kürzlich bekannt gewordene Schwachstelle im KI-Assistenten Claude von Anthropic könnte von Angreifern ausgenutzt werden, um heimlich Unternehmensdaten zu exfiltrieren. Dabei lassen sich auch Sicherheitskonfigurationen umgehen, die solche Attacken eigentlich verhindern sollen. Wie sich das mithilfe indirekter Prompt-Injection-Techniken und Claudes Code Interpreter bewerkstelligen…
-
The New Frontier of Cyber Threats: Unpacking Prompt Injection, Model Poisoning and Adversarial Attacks in AI Security
Artificial Intelligence is reshaping the cybersecurity landscape”, and with it, a new generation of attack vectors is emerging. From prompt injection to model poisoning and adversarial attacks, threat actors are exploiting vulnerabilities unique to AI systems. This article explores how these threats operate, their potential impact, and what defenders must do to build resilient, trustworthy…
-
FreePBX Endpoint mit kritischer RCE-Schwachstelle CVE-2025-57819
Es gibt eine Schwachstelle CVE-2025-57819 in FreePX Endpoint. Eine nicht authentifizierte SQL-Injection-Möglichkeit kann zur Remote Code Execution (RCE) in dieser Software, die aus Teams-Ersatz verwendet wird, führen. Hier ein Übersicht über das Problem, welche mir die Tage untergekommen ist. Was … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/11/01/freepbx-endpoint-mit-kritischer-rce-schwachstelle-cve-2025-57819/
-
FreePBX Endpoint mit kritischer RCE-Schwachstelle CVE-2025-57819
Es gibt eine Schwachstelle CVE-2025-57819 in FreePX Endpoint. Eine nicht authentifizierte SQL-Injection-Möglichkeit kann zur Remote Code Execution (RCE) in dieser Software, die aus Teams-Ersatz verwendet wird, führen. Hier ein Übersicht über das Problem, welche mir die Tage untergekommen ist. Was … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/11/01/freepbx-endpoint-mit-kritischer-rce-schwachstelle-cve-2025-57819/
-
Claude AI vulnerability exposes enterprise data through code interpreter exploit
Tags: access, ai, api, attack, control, data, exploit, google, injection, malicious, mitigation, monitoring, network, risk, vulnerabilityBypassing AI safety controls: Rehberger’s report stated that developing a reliable exploit proved challenging due to Claude’s built-in safety mechanisms. The AI initially refused requests containing plaintext API keys, recognizing them as suspicious. However, Rehberger added that mixing malicious code with benign instructions, such as simple print statements, was sufficient to bypass these safeguards.”I tried…
-
Claude AI vulnerability exposes enterprise data through code interpreter exploit
Tags: access, ai, api, attack, control, data, exploit, google, injection, malicious, mitigation, monitoring, network, risk, vulnerabilityBypassing AI safety controls: Rehberger’s report stated that developing a reliable exploit proved challenging due to Claude’s built-in safety mechanisms. The AI initially refused requests containing plaintext API keys, recognizing them as suspicious. However, Rehberger added that mixing malicious code with benign instructions, such as simple print statements, was sufficient to bypass these safeguards.”I tried…
-
CISA Issues Advisory on XWiki Flaw Allowing Remote Code Execution
Tags: advisory, authentication, cisa, cyber, cybersecurity, exploit, flaw, infrastructure, injection, kev, remote-code-execution, risk, threat, vulnerabilityThe Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability affecting XWiki Platform to its Known Exploited Vulnerabilities catalog, highlighting the urgent security threat posed by an eval injection flaw. This vulnerability could allow any guest user to execute arbitrary remote code without authentication, representing a severe risk to organizations using the popular…
-
CISA Issues Advisory on XWiki Flaw Allowing Remote Code Execution
Tags: advisory, authentication, cisa, cyber, cybersecurity, exploit, flaw, infrastructure, injection, kev, remote-code-execution, risk, threat, vulnerabilityThe Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability affecting XWiki Platform to its Known Exploited Vulnerabilities catalog, highlighting the urgent security threat posed by an eval injection flaw. This vulnerability could allow any guest user to execute arbitrary remote code without authentication, representing a severe risk to organizations using the popular…
-
AI-powered bug hunting shakes up bounty industry, for better or worse
Tags: access, ai, authentication, automation, bug-bounty, business, ciso, cloud, control, credentials, data, detection, exploit, flaw, guide, identity, infrastructure, injection, intelligence, risk, risk-management, sql, strategy, supply-chain, threat, tool, vulnerabilityFirehose of ‘false positives’: Gunter Ollmann, CTO at Cobalt.io, warns that AI is exacerbating the existing problem that comes from vendors getting swamped with often low-quality bug submissions.Security researchers turning to AI is creating a “firehose of noise, false positives, and duplicates,” according to Ollmann.”The future of security testing isn’t about managing a crowd of…

