Topic: vulnerability disclosure

  • SolarWinds Issues Urgent Patch for Critical Web Help Desk Flaw

    SolarWinds Issues Urgent Patch for Critical Web Help Desk Flaw

    SolarWinds has released an urgent hotfix for a critical, unauthenticated remote code execution vulnerability (CVE-2025-26399) in its Web Help Desk software, which poses a severe risk to affected systems. The flaw is a patch bypass for a previous vulnerability and stems from unsafe deserialization...

    Read More »
  • CISA Orders Agencies to Patch Critical Fortinet Flaw in 7 Days

    CISA Orders Agencies to Patch Critical Fortinet Flaw in 7 Days

    CISA has mandated a 7-day deadline for U.S. government agencies to patch CVE-2025-58034, a critical Fortinet FortiWeb vulnerability being actively exploited in zero-day attacks. The vulnerability is an OS command injection flaw that allows authenticated attackers to execute arbitrary code with ro...

    Read More »
  • Security Firms Clash Over CVE Credit Claims

    Security Firms Clash Over CVE Credit Claims

    FuzzingLabs accuses Gecko Security of copying their vulnerability discoveries and proof-of-concept exploits, including backdating blog posts to claim credit for CVEs like CVE-2025-51471 and CVE-2025-48889. Gecko Security denies intentional misconduct, attributing the overlap to parallel research ...

    Read More »
  • SolarWinds Patches Critical RCE Flaw in Web Help Desk

    SolarWinds Patches Critical RCE Flaw in Web Help Desk

    SolarWinds has released a critical update for its Web Help Desk software to patch CVE-2025-26399, an unauthenticated remote code execution vulnerability requiring immediate action to prevent system compromise. The flaw, located in the AjaxProxy class, allows remote attackers to execute arbitrary ...

    Read More »
  • Urgent: NetScaler Zero-Day Exploit Actively Attacked (CVE-2025-7775)

    Urgent: NetScaler Zero-Day Exploit Actively Attacked (CVE-2025-7775)

    Three critical vulnerabilities have been discovered in Citrix NetScaler ADC and Gateway devices, with CVE-2025-7775 already being actively exploited for remote code execution and denial of service. Citrix has released security updates for affected versions and strongly advises immediate patching,...

    Read More »
  • Gladinet patches critical zero-day flaw in file-sharing software

    Gladinet patches critical zero-day flaw in file-sharing software

    Gladinet has released a critical security update for CentreStack to address CVE-2025-11371, a zero-day vulnerability that allowed attackers to bypass protections and execute remote code on systems. The flaw, discovered by Huntress, involved inadequate input sanitization enabling directory travers...

    Read More »
  • UK NCSC Backs Public Disclosure of AI Security Flaws

    UK NCSC Backs Public Disclosure of AI Security Flaws

    UK cybersecurity and AI authorities advocate for crowdsourced initiatives to identify and address AI vulnerabilities, emphasizing the rising risks from malicious exploitation of advanced platforms. In response to AI system breaches, developers have launched bug bounty programs to incentivize ethi...

    Read More »
  • Microsoft Entra ID Flaw Let Attackers Hijack Company Tenants

    Microsoft Entra ID Flaw Let Attackers Hijack Company Tenants

    A critical vulnerability (CVE-2025-55241) in Microsoft's Entra ID could have allowed attackers to gain full control over an organization's tenant by exploiting unsigned "actor tokens" and a weakness in the Azure AD Graph API. The flaw enabled attackers to impersonate any user, escalate privileges...

    Read More »
  • Critical React & Node.js Flaw Patched: Update Now (CVE-2025-55182)

    Critical React & Node.js Flaw Patched: Update Now (CVE-2025-55182)

    A critical remote code execution vulnerability (CVE-2025-55182) affects React versions 19.0.0 through 19.2.0, requiring an immediate update to version 19.2.1. The flaw involves unsafe deserialization in React Server Components, impacting not only React but also major dependent frameworks like Nex...

    Read More »
  • Urgent CISA Alert: Active Attacks Exploit Critical CentOS Bug

    Urgent CISA Alert: Active Attacks Exploit Critical CentOS Bug

    A critical security flaw (CVE-2025-48703) in CentOS Web Panel allows unauthenticated attackers to execute arbitrary commands, prompting CISA to issue an urgent patch-or-discontinue directive by November 25. The vulnerability stems from improper handling of the 'changePerm' endpoint and unsanitize...

    Read More »
  • Active Attack Exploits Critical Adobe Commerce, Magento Flaw

    Active Attack Exploits Critical Adobe Commerce, Magento Flaw

    Security researchers have identified active exploitation of a critical Adobe Commerce and Magento vulnerability (CVE-2025-54236, SessionReaper), which allows attackers to hijack customer accounts and potentially execute remote code, with over 250 attack attempts blocked in a single day. The vulne...

    Read More »
  • Urgent CISA Alert: Active Attacks Exploit Critical Linux Sudo Flaw

    Urgent CISA Alert: Active Attacks Exploit Critical Linux Sudo Flaw

    A critical vulnerability (CVE-2025-32463) in Linux sudo versions 1.9.14 to 1.9.17 allows local attackers to escalate privileges to root using the -R option, even without sudoers file authorization. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added this flaw to its Known E...

    Read More »
  • CISA Flags Spyware Zero-Day in Urgent Security Alert

    CISA Flags Spyware Zero-Day in Urgent Security Alert

    US authorities issued a critical security alert for a high-risk vulnerability in Samsung mobile devices, exploited since mid-2024 to install spyware via malicious files on WhatsApp. The vulnerability, CVE-2025-21042 with a CVSS score of 9.8, enables attackers to use LandFall spyware for surveilla...

    Read More »
  • Google: Microsoft WSUS Attacks Strike Multiple Organizations

    Google: Microsoft WSUS Attacks Strike Multiple Organizations

    A critical remote code execution vulnerability (CVE-2025-59287) in Microsoft's WSUS is being actively exploited, affecting Windows Server versions from 2012 to 2025, despite an emergency patch being released after initial fixes failed. Exploitation involves unauthenticated attackers running arbit...

    Read More »
  • New Ethics Rules for Cybersecurity Research: What You Need to Know

    New Ethics Rules for Cybersecurity Research: What You Need to Know

    Major cybersecurity conferences are implementing new ethics requirements for research submissions, requiring authors to include stakeholder-based ethics analyses in their papers. A new framework has been developed to help researchers systematically identify all affected parties and assess potenti...

    Read More »
  • SAP S/4HANA Vulnerability Actively Exploited in Attacks

    SAP S/4HANA Vulnerability Actively Exploited in Attacks

    A critical vulnerability (CVE-2025-42957) in SAP S/4HANA allows attackers to execute unauthorized code and gain administrative control. Despite a patch being available since August 2025, many systems remain unpatched, leading to active exploitation in the wild. Successful attacks can result in se...

    Read More »
  • Urgent: Patch Windows SMB Flaw Being Actively Exploited

    Urgent: Patch Windows SMB Flaw Being Actively Exploited

    A critical Windows SMB Client vulnerability (CVE-2025-33073) is being actively exploited, allowing attackers to gain SYSTEM-level privileges through a malicious script that compromises SMB connections. Microsoft patched the flaw in June 2025, and CISA has added it to its Known Exploited Vulnerabi...

    Read More »
  • AI Supply Chains at Risk from Critical PickleScan Flaws

    AI Supply Chains at Risk from Critical PickleScan Flaws

    Researchers discovered three critical zero-day vulnerabilities (CVSS 9.3) in PickleScan, a tool for inspecting Python pickle files and PyTorch models, which allow attackers to bypass security checks and distribute malicious machine learning models. The flaws include a file extension bypass, a dis...

    Read More »
  • Synology Patches Critical BeeStation Flaws Exposed at Pwn2Own

    Synology Patches Critical BeeStation Flaws Exposed at Pwn2Own

    Synology released a critical security update for BeeStation devices to fix a remote code execution vulnerability (CVE-2025-12686) caused by an unchecked buffer copy operation. The flaw was exploited live at Pwn2Own Ireland 2025, earning researchers a $40,000 prize, and users must upgrade to BeeSt...

    Read More »
  • Cisco ASA Firewalls Remain Vulnerable to Zero-Day Attacks

    Cisco ASA Firewalls Remain Vulnerable to Zero-Day Attacks

    Approximately 48,000 Cisco ASA devices remain vulnerable to active zero-day attacks, posing ongoing risks globally, with the majority located in the U.S. and other key countries. Attackers have used advanced tactics, including disabling logging and intercepting commands, to exploit vulnerabilitie...

    Read More »
  • Critical Flaws Found in Fluent Bit Logging Agent

    Critical Flaws Found in Fluent Bit Logging Agent

    Severe security vulnerabilities have been discovered in Fluent Bit, a widely used telemetry logging tool installed over 15 billion times, impacting core functions in banking, cloud, and SaaS environments. The flaws include input validation issues, tag manipulation, path traversal, buffer overflow...

    Read More »
  • Urgent Windows Flaw CVE-2025-9491 Actively Exploited by Hackers

    Urgent Windows Flaw CVE-2025-9491 Actively Exploited by Hackers

    A critical Windows security flaw (CVE-2025-9491) is being actively exploited by hacking group UNC6384, enabling unauthorized code execution through malicious LNK files in spearphishing campaigns targeting European diplomatic and aviation entities. The exploitation involves a multi-stage malware c...

    Read More »
  • How MCP Server Flaws Escalate to Supply Chain Attacks

    How MCP Server Flaws Escalate to Supply Chain Attacks

    A path traversal vulnerability in Smithery.ai's MCP server platform exposed administrative credentials, compromising over 3,000 AI servers and risking a major supply chain incident. The flaw allowed attackers to access sensitive files and an overprivileged token, enabling potential code execution...

    Read More »
  • Microsoft GoAnywhere Bug Fuels Medusa Ransomware Attacks

    Microsoft GoAnywhere Bug Fuels Medusa Ransomware Attacks

    A critical vulnerability (CVE-2025-10035) in Fortra's GoAnywhere platform allows unauthenticated attackers to execute remote code, prompting urgent patching and removal of internet exposure. The flaw was exploited as a zero-day by Storm-1175, who used legitimate tools for reconnaissance and deplo...

    Read More »
  • Critical DrayTek Router Flaw Allows Remote Code Execution

    Critical DrayTek Router Flaw Allows Remote Code Execution

    A critical vulnerability (CVE-2025-10547) in DrayTek routers allows unauthenticated remote attackers to execute commands via crafted HTTP/HTTPS requests, potentially leading to system crashes or code execution. DrayTek has released firmware updates for 35 router models and advises immediate insta...

    Read More »