Posted by icudar via Fulldisclosure on Sep 04
The following is my 0day. This code, when executed on any website, disconnects the AtlasVPN linux client and leaks the
users IP address. I am not yet aware of it being used in the wild. However, it shows that AtlasVPN does not take their
users safety serious, because their software security decisions suck so massively that its hard to believe this is a
bug rather than a backdoor. Nobody can be this incompetent. I tried to contact their support…
More Stories
cacti-1.2.30-1.el8 cacti-spine-1.2.30-1.el8
FEDORA-EPEL-2025-ba03a05138 Packages in this update: cacti-1.2.30-1.el8 cacti-spine-1.2.30-1.el8 Update description: Update cacti and cacti-spine to version 1.2.30. This includes the upstream...
cacti-1.2.30-1.el9 cacti-spine-1.2.30-1.el9
FEDORA-EPEL-2025-19d7286f00 Packages in this update: cacti-1.2.30-1.el9 cacti-spine-1.2.30-1.el9 Update description: Update cacti and cacti-spine to version 1.2.30. This includes the upstream...
USN-7437-1: CImg library vulnerabilities
It was discovered that the CImg library did not properly check the size of images before loading them. An attacker...
mujs-1.0.9-2.el8
FEDORA-EPEL-2025-141926b526 Packages in this update: mujs-1.0.9-2.el8 Update description: Backport upstream fix for CVE-2021-33796. https://nvd.nist.gov/vuln/detail/CVE-2021-33796 Read More
USN-7436-1: WebKitGTK vulnerabilities
Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a...
USN-7435-1: Protocol Buffers vulnerability
It was discovered that Protocol Buffers incorrectly handled memory when receiving malicious input using the Java bindings. An attacker could...