#remote-code-execution

[ follow ]
fromThe Hacker News
9 hours ago

CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks

Details of the six-year-old flaw were publicly shared by Cisco Talos in April 2019, describing it as an exploitable remote code execution vulnerability in the ACEManager "upload.cgi" function of Sierra Wireless AirLink ES450 firmware version 4.9.3. Talos reported the flaw to the Canadian company in December 2018. "This vulnerability exists in the file upload capability of templates within the AirLink 450," the company said. "When uploading template files, you can specify the name of the file that you are uploading."
Information security
#react2shell
#gogs
Information security
fromThe Hacker News
2 days ago

Active Attacks Exploit Gladinet's Hard-Coded Keys for Unauthorized Access and Code Execution

Hard-coded cryptographic keys in Gladinet CentreStack/Triofox allow decryption or forging of access tickets, enabling access to web.config and potential ViewState deserialization leading to remote code execution.
Information security
fromThe Hacker News
3 days ago

.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL

A .NET Framework SOAP handling flaw (SOAPwn) enables attackers to abuse WSDL-created HTTP client proxies to perform arbitrary file writes and achieve remote code execution.
fromTheregister
3 days ago

Microsoft won't fix .NET RCE bug affecting enterprise apps

Its name and the official documentation both paint a simple picture: it should handle SOAP messages transported over HTTP. Straightforward. Predictable. Safe. Reality is less cooperative.
Information security
#react-server-components
fromInfoQ
3 days ago
Information security

Patch Urgently - Critical Vulnerability CVE-2025-55182 in React Server Functions Actively Exploited

fromTechzine Global
1 week ago
Information security

Meta warns of critical vulnerability in React Server Components

A critical unauthenticated RCE in React Server Components (CVE-2025-55182) requires immediate updates to patched versions to prevent remote code execution.
fromThe Hacker News
1 week ago
React

Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution

Maximum-severity RSC vulnerability CVE-2025-55182 enables unauthenticated remote code execution; update affected React, RSC plugin, and Next.js packages immediately.
fromInfoQ
3 days ago
Information security

Patch Urgently - Critical Vulnerability CVE-2025-55182 in React Server Functions Actively Exploited

Information security
fromComputerWeekly.com
4 days ago

Microsoft patched over 1,100 CVEs in 2025 | Computer Weekly

A Windows Cloud Files Mini Filter Driver use-after-free vulnerability (CVE-2025-62221) is being actively exploited and can enable SYSTEM privilege escalation.
Information security
fromThe Hacker News
5 days ago

Sneeit WordPress RCE Exploited in the Wild While ICTBroadcast Bug Fuels Frost Botnet Attacks

A critical RCE (CVE-2025-6389) in Sneeit Framework WordPress plugin (≤8.3) is actively exploited; update to 8.4 to mitigate.
Information security
fromThe Hacker News
1 week ago

Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks

AI-powered IDEs have chained vulnerabilities that enable prompt injection, abuse of auto-approved tools, and weaponization of legitimate IDE features for data exfiltration and RCE.
Information security
fromComputerWeekly.com
1 week ago

Cloudflare fixes second outage in a month | Computer Weekly

Cloudflare briefly lost Dashboard and API availability due to a WAF parsing change deployed to mitigate a critical React Server Components RCE (React2Shell) vulnerability, now resolved.
Information security
fromTechzine Global
1 week ago

React2Shell exploited hours after discovery

Chinese state-backed groups actively weaponized React2Shell (CVE-2025-55182) within hours, enabling unauthenticated remote code execution against React 19.x and Next.js App Router.
Information security
fromInfoWorld
1 week ago

Developers urged to immediately upgrade React, Next.js

React 19's RSC Flight protocol contains a critical deserialization vulnerability enabling remote code execution; immediate upgrade and patching are required.
#react
fromArs Technica
1 week ago
React

Maximum-severity vulnerability threatens 6% of all websites

An unsafe deserialization vulnerability in React Flight (CVE-2025-55182) enables unauthenticated remote code execution; upgrade patched React versions immediately.
fromTheregister
1 week ago
Information security

'Exploitation is imminent' of max-severity React bug

A critical RCE vulnerability in React and several frameworks allows unauthenticated remote code execution; immediate upgrading to patched React versions is required.
Information security
fromThe Hacker News
1 week ago

Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation

Microsoft patched CVE-2025-9491, a Windows .LNK UI misinterpretation vulnerability enabling remote code execution via crafted shortcut files.
fromTechzine Global
1 week ago

OpenAI Codex CLI contained dangerous MCP security gap

This happened via the Model Context Protocol, intended to integrate external tools into the Codex environment. The CLI loaded MCP configurations from a .codex/config.toml file and executed the commands defined therein immediately upon startup. There was no approval prompt, no validation, and no check when the commands changed. MCP itself does not contain extensive built-in security, even after a series of updates.
Information security
Information security
fromComputerworld
1 week ago

Newly discovered malicious extensions could be lurking in enterprise browsers

ShadyPanda used legitimate browser extensions to build trust, then deployed silent malicious updates harvesting data and enabling remote code execution across millions of users.
Information security
fromThe Hacker News
1 week ago

ShadyPanda Turns Popular Browser Extensions with 4.3 Million Installs Into Spyware

ShadyPanda operated a seven-year browser extension campaign that amassed over 4.3 million installs and escalated to remote code execution, data exfiltration, and affiliate fraud.
fromThe Hacker News
2 weeks ago

New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

Cybersecurity researchers have discovered five vulnerabilities in Fluent Bit, an open-source and lightweight telemetry agent, that could be chained to compromise and take over cloud infrastructures. The security defects "allow attackers to bypass authentication, perform path traversal, achieve remote code execution, cause denial-of-service conditions, and manipulate tags," Oligo Security said in a report shared with The Hacker News. Successful exploitation of the flaws could enable attackers to disrupt cloud services, manipulate data, and burrow deeper into cloud and Kubernetes infrastructure.
Information security
#oracle-identity-manager
Information security
fromTheregister
2 weeks ago

Weaponized file name flaw allows RCE through glob

A shell-invocation flaw in glob's CLI -c option enables remote code execution on POSIX systems when processing attacker-controlled filenames; update affected glob versions immediately.
Information security
fromSecurityWeek
4 weeks ago

Imunify360 Vulnerability Could Expose Millions of Sites to Hacking

A critical flaw in Imunify360's Ai-Bolit scanner can allow arbitrary code execution and potential full compromise of shared hosting servers running the scanner.
#zeromq
fromInfoWorld
4 weeks ago
Information security

Copy-paste vulnerability hits AI inference frameworks at Meta, Nvidia, and Microsoft

fromInfoWorld
4 weeks ago
Information security

Copy-paste vulnerability hits AI inference frameworks at Meta, Nvidia, and Microsoft

#wsus
fromIT Pro
1 month ago
Information security

CISA issues alert after botched Windows Server patch exposes critical flaw

fromIT Pro
1 month ago
Information security

CISA issues alert after botched Windows Server patch exposes critical flaw

Information security
fromTechzine Global
1 month ago

Critical vulnerability exposed in JavaScript library expr-eval

A critical expr-eval vulnerability (CVE-2025-12735) permits remote code execution by abusing evaluate() context validation, risking full system compromise.
Information security
fromBleepingComputer
1 month ago

Popular JavaScript library expr-eval vulnerable to RCE flaw

Critical RCE vulnerability (CVE-2025-12735) in expr-eval/expr-eval-fork allows remote code execution via unvalidated Parser.evaluate() context variables.
#redis
fromInfoQ
1 month ago
Information security

Redis Critical Remote Code Execution Vulnerability Discovered After 13 Years

fromInfoQ
1 month ago
Information security

Redis Critical Remote Code Execution Vulnerability Discovered After 13 Years

Information security
fromInfoWorld
1 month ago

RCE in React Native CLI opens Dev Servers to attacks

The Metro development server exposes an unsafe /open-url endpoint and defaults to listening on 0.0.0.0, allowing remote command execution unless patched.
Information security
fromThe Hacker News
1 month ago

New ChatGPT Atlas Browser Exploit Lets Attackers Plant Persistent Hidden Commands

A CSRF vulnerability in ChatGPT Atlas allows persistent-memory injection that can execute arbitrary code, persist across devices, and compromise accounts and systems.
fromThe Hacker News
1 month ago

Active Exploits Hit Dassault and XWiki - CISA Confirms Critical Flaws Under Attack

Both CVE-2025-6204 and CVE-2025-6205 affect DELMIA Apriso versions from Release 2020 through Release 2025. They were addressed by Dassault Systèmes in early August. According to details shared by ProjectDiscovery researchers Rahul Maini, Harsh Jaiswal, and Parth Malhotra last month, the two security flaws can be fashioned together into an exploit chain to create accounts with elevated privileges and then drop executable files into a web-served directory, resulting in a full application compromise.
Information security
Information security
fromTheregister
1 month ago

Windows Server WSUS bug exploits underway, Microsoft's mum

A critical RCE in Windows Server Update Services (CVE-2025-59287) enables unauthenticated full system takeover and is being actively exploited, prompting emergency patches.
#rust
fromThe Hacker News
1 month ago

Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control

Red Lion's Sixnet RTUs provide advanced automation, control, and data acquisition capabilities in industrial automation and control systems, primarily across energy, water, and wastewater treatment, transportation, utilities, and manufacturing sectors. These industrial devices are configured using a Windows utility called Sixnet IO Tool Kit, with a proprietary Sixnet "Universal" protocol used to interface and enable communication between the kit and the RTUs.
Information security
fromThe Cyber Express
1 month ago

Critical CVE-2025-61927 VM Context Escape In Happy DOM Library

A critical security flaw has been identified in Happy DOM, a widely used JavaScript library primarily employed for server-side rendering and testing frameworks. The vulnerability, cataloged as CVE-2025-61927, allows attackers to escape the library's virtual machine (VM) context, leading to potential remote code execution on vulnerable systems. This flaw threatens millions of applications that depend on Happy DOM. The root of this vulnerability lies in the improper isolation of the Node.js VM context within Happy DOM versions 19 and earlier.
Information security
Information security
fromSecurityWeek
2 months ago

ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities

Multiple high-severity input-validation vulnerabilities in Ivanti Endpoint Manager allow authenticated attackers to achieve remote code execution or local privilege escalation.
Information security
fromThe Hacker News
2 months ago

Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely - Patch Now

A command injection vulnerability in the figma-developer-mcp MCP server (CVE-2025-53967) permits remote code execution via unsanitized user input.
Information security
fromThe Hacker News
2 months ago

Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacks

Graceful Spider (Cl0p) is attributed with exploiting Oracle E-Business Suite CVE-2025-61882 on August 9, 2025, enabling unauthenticated remote code execution.
fromSecurityWeek
2 months ago

Unauthenticated RCE Flaw Patched in DrayTek Routers

DrayTek on Thursday announced patches for an unauthenticated remote code execution (RCE) vulnerability affecting DrayOS routers. Tracked as CVE-2025-10547, the issue can be exploited via crafted HTTP or HTTPS requests sent to a vulnerable device's web user interface. Successful exploitation of the bug, DrayTek explains in its advisory, may result in memory corruption and a system crash. In certain circumstances, it could be used to execute arbitrary code remotely, it says.
Information security
#goanywhere-mft
#cve-2025-20352
Information security
fromArs Technica
2 months ago

As many as 2 million Cisco devices affected by actively exploited 0-day

Up to two million Cisco IOS and IOS XE devices are vulnerable to CVE-2025-20352, an SNMP stack overflow allowing remote DoS or root-level code execution.
Information security
fromComputerWeekly.com
2 months ago

SolarWinds warns over dangerous RCE flaw | Computer Weekly

SolarWinds Web Help Desk contains an unauthenticated AjaxProxy deserialization RCE (CVE-2025-26399) that bypasses prior fixes and requires immediate patching via the 12.8.7 hotfix.
Information security
fromSecurityWeek
2 months ago

CISA Analyzes Malware From Ivanti EPMM Intrusions

Chained authentication-bypass and RCE flaws in Ivanti EPMM enabled unauthenticated remote code execution, allowing attackers to deploy segmented malware for persistence and credential theft.
fromZDNET
2 months ago

Update your Samsung phone ASAP to patch this zero-day flaw exploited in the wild

Samsung has issued a patch to resolve a critical vulnerability impacting its Android smartphone users. All impacted phone models will receive the fix, which patches a vulnerability tracked as . The security flaw, issued a critical base score of 8.8 by Samsung Mobile (a CNA), is described as an "out-of-bounds write in libimagecodec.quram.so prior to SMR Sep-2025 Release 1 allows remote attackers to execute arbitrary code."
Information security
Information security
fromThe Hacker News
2 months ago

Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover

Multiple critical Chaos Mesh vulnerabilities allow minimal in-cluster attackers to execute commands, disrupt services, steal tokens, and potentially achieve cluster-wide takeover.
Information security
fromTheregister
3 months ago

Claude Code runs code to test if is safe, which has risks

Automated security reviews can find simple vulnerabilities but may miss complex exploits, be deceived by crafted code, and introduce risk by executing tests.
Information security
fromTechzine Global
3 months ago

Zero-day vulnerability discovered in TP-Link routers

A CWMP (TR-069) stack-based buffer overflow in TP‑Link routers enables remote root compromise via crafted SetParameterValues messages and affects thousands of unpatched devices.
#sitecore
Information security
fromThe Hacker News
3 months ago

FreePBX Servers Targeted by Zero-Day Flaw, Emergency Patch Now Available

A critical CVE-2025-57819 FreePBX vulnerability enables unauthenticated arbitrary database manipulation and remote code execution; internet-exposed ACPs should be upgraded and restricted.
fromGameSpot
3 months ago

Call Of Duty: WW2 Is Once Again Available For PC Game Pass After Reportedly Serious Security Issue

Activision has brought Call of Duty: World War II back to the Microsoft Store and Xbox PC App after it was removed more than a month ago, though the company has still not said a word about what happened. A statement released on August 27 confirmed that the 2017 game has returned, and is once again available for PC Game Pass players. However, there was no explanation as to anything else related to the game's removal on July 4.
Video games
#citrix-netscaler
fromThe Hacker News
3 months ago

CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git

CVE-2024-8068 (CVSS score: 5.1) - An improper privilege management vulnerability in Citrix Session Recording that could allow for privilege escalation to NetworkService Account access when an attacker is an authenticated user in the same Windows Active Directory domain as the session recording server domain CVE-2024-8069 (CVSS score: 5.1) - A deserialization of untrusted data vulnerability in Citrix Session Recording that allows limited remote code execution with the privileges of a NetworkService Account access when an attacker is an authenticated user on the same intranet as the session recording server
Information security
#commvault
Information security
fromTheregister
3 months ago

AWS patches Q Developer after prompt injection, RCE demo

Amazon fixed prompt-injection and RCE-capable vulnerabilities in the Amazon Q Developer VS Code extension by updating the language server and adding human-in-the-loop approval.
fromThe Hacker News
3 months ago

Public Exploit for Chained SAP Flaws Exposes Unpatched Systems to Remote Code Execution

The existence of the exploit was first reported last week by vx-underground, which said it was released by Scattered Lapsus$ Hunters, a new fluid alliance formed by Scattered Spider and ShinyHunters.
Information security
#cybersecurity
fromThe Hacker News
4 months ago

Google's August Patch Fixes Two Qualcomm Vulnerabilities Exploited in the Wild

The vulnerabilities include CVE-2025-21479 (CVSS score: 8.6) and CVE-2025-27038 (CVSS score: 7.5), both of which were disclosed alongside CVE-2025-21480 (CVSS score: 8.6) by the chipmaker back in June 2025.
Privacy technologies
#nvidia
Information security
fromTheregister
4 months ago

Cisco ISE flaw gave root access before fix landed

Cisco's Identity Services Engine vulnerability has been actively exploited since early July, rated critical on the CVSS scale for remote code execution.
#sharepoint
fromZDNET
4 months ago
Privacy professionals

Microsoft fixes two SharePoint zero-days under attack, but it's not over - how to patch

fromZDNET
4 months ago
Privacy professionals

Microsoft fixes two SharePoint zero-days under attack, but it's not over - how to patch

[ Load more ]