RSS Parrot

BETA

🦜 Full Disclosure

@seclists.org.fulldisclosure@rss-parrot.net

I'm an automated parrot! I relay a website's RSS feed to the Fediverse. Every time a new post appears in the feed, I toot about it. Follow me to get all new posts in your Mastodon timeline! Brought to you by the RSS Parrot.

---

A public, vendor-neutral forum for detailed discussion of vulnerabilities and exploitation techniques, as well as tools, papers, news, and events of interest to the community. The relaxed atmosphere of this quirky list provides some comic relief and certain industry gossip. More importantly, fresh vulnerabilities sometimes hit this list many hours or days before they pass through the Bugtraq moderation queue.

Your feed and you don't want it here? Just e-mail the birb.

Site URL: seclists.org/#fulldisclosure

Feed URL: seclists.org/rss/fulldisclosure.rss

Posts: 12

Followers: 1

Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)

Published: January 6, 2026 07:00

Posted by Yuffie Kisaragi via Fulldisclosure on Jan 05UPDATE: Following the publication of these vulnerabilities and the subsequent CVE assignments, the CVE identifiers have now been revoked. The vendor (EQS Group) contacted the CVE Program (via a CNA)…

Panda3d v1.10.16 Uncontrolled Format String in Panda3D egg-mkfont Allows Stack Memory Disclosure

Published: January 6, 2026 06:59

Posted by Ron E on Jan 05Panda3D’s egg-mkfont utility contains an uncontrolled format string vulnerability that allows disclosure of stack-resident memory. The -gp (glyph pattern) command-line option allows users to specify a formatting pattern intended…

Panda3d v1.10.16 egg-mkfont Stack Buffer Overflow

Published: January 6, 2026 06:59

Posted by Ron E on Jan 05A stack-based buffer overflow vulnerability exists in the Panda3D egg-mkfont utility due to the use of an unbounded sprintf() call with attacker-controlled input. By supplying an excessively long glyph pattern string via the -gp…

Panda3d v1.10.16 deploy-stub Unbounded Stack Allocation Leading to Uninitialized Memory

Published: January 6, 2026 06:59

Posted by Ron E on Jan 05A memory safety vulnerability exists in the Panda3D deploy-stub executable due to unbounded stack allocation using attacker-controlled input. The issue allows a local attacker to trigger stack exhaustion and subsequent use of…

MongoDB v8.3.0 Integer Underflow in LMDB mdb_load

Published: January 6, 2026 06:59

Posted by Ron E on Jan 05This integer underflow vulnerability enables heap metadata corruption and information disclosure through carefully crafted LMDB dump files. *Impact:* - *Denial of Service*: Immediate crash (confirmed) - *Information…

Bioformats v8.3.0 Untrusted Deserialization of Bio-Formats Memoizer Cache Files

Published: January 6, 2026 06:59

Posted by Ron E on Jan 05Bio-Formats performs unsafe Java deserialization of attacker-controlled memoization cache files (.bfmemo) during image processing. The loci.formats.Memoizer class automatically loads and deserializes memo files associated with…

Bioformats v8.3.0 Improper Restriction of XML External Entity Reference in Bio-Formats Leica Microsystems XML Parser

Published: January 6, 2026 06:59

Posted by Ron E on Jan 05Bio-Formats contains an XML External Entity (XXE) vulnerability in the Leica Microsystems metadata parsing component. The vulnerability is caused by the use of an insecurely configured DocumentBuilderFactory when processing Leica…

MongoDB v8.3.0 Heap Buffer Underflow in OpenLDAP LMDB mdb_load

Published: January 6, 2026 06:59

Posted by Ron E on Jan 05A heap buffer underflow vulnerability exists in the readline() function of OpenLDAP's Lightning Memory-Mapped Database (LMDB) mdb_load utility. The vulnerability is triggered through malformed input data and results in an…

zlib v1.3.1.2 Global Buffer Overflow in TGZfname() of zlib untgz Utility via Unbounded strcpy() on User-Supplied Archive Name

Published: January 6, 2026 06:59

Posted by Ron E on Jan 05A global buffer overflow vulnerability exists in the TGZfname() function of the zlib untgz utility due to the use of an unbounded strcpy() call on attacker-controlled input. The utility copies a user-supplied archive name…

SigInt-Hombre v1 / dynamic Suricata detection rules from real-time threat feeds

Published: January 6, 2026 06:58

Posted by malvuln on Jan 05SigInt-Hombre, generates derived Suricata detection rules from live URLhaus threat indicators at runtime and deploy them to the Security Onion platform for high-coverage real-time network monitoring. …

Security Vulnerability in Koller Secret: Real Hidden App (com.koller.secret.hidemyphoto)

Published: January 6, 2026 06:57

Posted by duykham on Jan 05Hello Full Disclosure, I would like to disclose a security vulnerability identified in a smartphone application: *Koller Secret: Real Hidden App*. This report is shared in the interest of responsible disclosure and improving…

Linux Kernel Block Subsystem Vulnerabilities

Published: January 6, 2026 06:56

Posted by Agent Spooky's Fun Parade via Fulldisclosure on Jan 05================================================================================ FULL DISCLOSURE: Linux Kernel Block Subsystem Vulnerabilities Date: 2025-12-29 Affected: Linux Kernel (all…