#remote-code-execution

[ follow ]
Information security
fromThe Hacker News
1 day ago

Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution

Unauthenticated stack-based buffer overflow (CVE-2026-2329) in Grandstream GXP1600 VoIP phones' /cgi-bin/api.values.get allows remote root code execution via malicious request parameter.
Information security
fromSecurityWeek
1 day ago

Vulnerabilities in Popular PDF Platforms Allowed Account Takeover, Data Exfiltration

Critical and high-severity vulnerabilities were found in Apryse and Foxit PDF platforms that could enable account takeover, data exfiltration, and remote code execution.
fromThe Hacker News
1 day ago

Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs

CVE-2025-65717 (CVSS score: 9.1) - A vulnerability in Live Server that allows attackers to exfiltrate local files, tricking a developer into visiting a malicious website when the extension is running, causing JavaScript embedded in the page to crawl and extract files from the local development HTTP server that runs at localhost:5500, and transmit them to a domain under their control. (Remains unpatched)
Information security
#visual-studio-code
fromInfoWorld
1 day ago
Information security

Flaws in four popular VS Code extensions left 128 million installs open to attack

fromInfoWorld
1 day ago
Information security

Flaws in four popular VS Code extensions left 128 million installs open to attack

#cve-2026-1731
#beyondtrust
fromThe Hacker News
6 days ago
Information security

Researchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerability

Critical BeyondTrust RCE CVE-2026-1731 is being actively exploited; apply provided RS and PRA patches immediately to prevent unauthorized access and data exfiltration.
fromTechzine Global
1 week ago
Information security

BeyondTrust Remote Support has a critical vulnerability

Unauthenticated remote-code-execution vulnerability in BeyondTrust Remote Support and Privileged Remote Access enables full system compromise; affected versions require urgent patching or upgrades.
fromThe Verge
1 week ago

Microsoft fixes Notepad flaw that could trick users into clicking malicious Markdown links

Microsoft has fixed a serious security vulnerability affecting Markdown files in Notepad. In the company's Tuesday patch notes, Microsoft says a bad actor could carry out a remote code execution attack by tricking users "into clicking a malicious link inside a Markdown file opened in Notepad," as reported earlier by The Register. Clicking the link would "launch unverified protocols," allowing attackers to remotely load and execute malicious files on a victim's computer, according to the patch notes.
Information security
Information security
fromTheregister
1 week ago

Notepad's new Markdown powers served with a side of RCE

Notepad's Markdown support contains a vulnerability (CVE-2026-20841) that can achieve remote code execution when users open a malicious Markdown file and click a link.
fromTheregister
1 week ago

Claude add-on turns Google Calendar into malware courier

Claude Desktop Extensions, recently renamed MCP Bundles, are packaged applications that extend the capabilities of Claude Desktop using the Model Context Protocol, a standard way to give generative AI models access to other software and data. Stored as .dxt files (with Anthropic transitioning the format to .mcpb), they are ZIP archives that package a local MCP server alongside a manifest.json file describing the extension's capabilities.
Information security
fromTechRepublic
1 week ago

10K Claude Desktop Users Exposed by Zero-Click Vulnerability

LayerX researchers found that a single malicious Google Calendar event can trigger remote code execution on Claude Desktop systems, enabling silent takeover at scale. "If exploited by a bad actor, even a benign prompt ("take care of it"), coupled with a maliciously worded calendar event, is sufficient to trigger arbitrary local code execution that compromises the entire system," said LayerX researchers in their analysis.
Information security
Information security
fromThe Hacker News
1 week ago

SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers

Threat actors exploited internet-exposed SolarWinds Web Help Desk instances to achieve unauthenticated remote code execution, move laterally, and access high-value assets.
#openclaw
#n8n
Information security
fromSecurityWeek
2 weeks ago

Cisco, F5 Patch High-Severity Vulnerabilities

Multiple critical vulnerabilities in Cisco and F5 products allow remote DoS, arbitrary file upload leading to root command execution, and privilege escalation; patches released.
#solarwinds
fromSecurityWeek
3 weeks ago
Information security

SolarWinds Patches Critical Web Help Desk Vulnerabilities

SolarWinds released patches for six Web Help Desk vulnerabilities, including four critical unauthenticated deserialization and authentication-bypass flaws enabling remote code execution.
fromThe Hacker News
3 weeks ago
Information security

SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass

SolarWinds Web Help Desk has multiple critical vulnerabilities, including deserialization flaws enabling unauthenticated remote code execution; updates fixed issues in WHD 2026.1.
Information security
fromThe Hacker News
2 weeks ago

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

A critical untrusted-data deserialization vulnerability in SolarWinds Web Help Desk (CVE-2025-40551) enables unauthenticated remote code execution and is actively exploited.
Information security
fromSecurityWeek
2 weeks ago

Vulnerabilities Allowed Full Compromise of Google Looker Instances

Two Looker vulnerabilities (LookOut) allow attackers with developer permissions to achieve remote code execution, full administrative access, data exfiltration, and potential cross-tenant access.
#docker
Information security
fromTechzine Global
2 weeks ago

CISA warns of active exploitation of critical SolarWinds vulnerability

A critical remote-code-execution vulnerability CVE-2025-40551 in SolarWinds Web Help Desk is actively exploited; federal agencies must install the patch within three days.
Information security
fromTechzine Global
2 weeks ago

Critical vulnerability in React Native development tool actively exploited

Critical CVE-2025-11953 in React Native's Metro server permits remote code execution via exposed /open-url endpoint, impacting many development environments on Windows and Linux.
#react2shell
fromInfoWorld
1 month ago
Information security

React2Shell: Anatomy of a max-severity flaw that sent shockwaves through the web

fromInfoWorld
1 month ago
Information security

React2Shell: Anatomy of a max-severity flaw that sent shockwaves through the web

Information security
fromThe Hacker News
2 weeks ago

Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package

CVE-2025-11953 (Metro4Shell) is actively exploited to achieve unauthenticated remote command execution and deliver persistent, Rust-based malware via a PowerShell loader.
#ivanti-epmm
#smartermail
Information security
fromSecurityWeek
3 weeks ago

'PackageGate' Flaws Open JavaScript Ecosystem to Supply Chain Attacks

Six vulnerabilities in major JavaScript package managers (NPM, PNPM, VLT, Bun) allow bypassing supply chain protections and enable remote code execution.
Information security
fromThe Hacker News
3 weeks ago

Critical Grist-Core Vulnerability Allows RCE Attacks via Spreadsheet Formulas

A Pyodide sandbox escape (Cellbreak, CVE-2026-24002) in Grist-Core allows remote code execution; upgrade to Grist 1.7.9 or later to mitigate.
Information security
fromKotaku
3 weeks ago

Report Of Steam Game Exploit Leads To Online Dispute With Devs

A remote code execution vulnerability in Screeps: World allowed players to gain control of others' computers, prompting developers to patch after a disputed report.
Information security
fromTechRepublic
4 weeks ago

Zoom and GitLab Patch RCE, DoS, and 2FA Bypass Vulnerabilities - TechRepublic

Emergency patches for Zoom and GitLab fix critical vulnerabilities that could enable remote code execution, full network takeover, and development-operation crashes.
Apple
fromTechRepublic
4 weeks ago

New iOS and iPadOS Flaws Leave Millions of iPhones at Risk

Two WebKit vulnerabilities (CVE-2025-43529 and CVE-2025-14174) allow zero-click remote code execution in Safari, potentially giving attackers full access to iPhones and iPads.
Information security
fromSecurityWeek
3 weeks ago

2024 VMware Flaw Now in Attackers' Crosshairs

CVE-2024-37079, a critical DCERPC out-of-bounds write in VMware vCenter (CVSS 9.8), is being exploited in the wild; apply June 2024 patches immediately.
Information security
fromComputerworld
4 weeks ago

Critical Cisco UC bug actively exploited

Critical RCE vulnerability CVE-2026-20045 affects Cisco Unified Communications products, is actively exploited, and patches have been released; CISA added it to its exploited vulnerabilities catalog.
#cve-2026-20045
fromThe Hacker News
4 weeks ago

CERT/CC Warns binary-parser Bug Allows Node.js Privilege-Level Code Execution

The vulnerability, tracked as CVE-2026-1245 (CVSS score: N/A), affects all versions of the module prior to version 2.3.0, which addresses the issue. Patches for the flaw were released on November 26, 2025. Binary-parser is a widely used parser builder for JavaScript that allows developers to parse binary data. It supports a wide range of common data types, including integers, floating-point values, strings, and arrays. The package attracts approximately 13,000 downloads on a weekly basis.
Information security
Information security
fromTheregister
4 weeks ago

Anthropic quietly fixed flaws in its Git MCP server

Three mcp-server-git vulnerabilities allowed chaining with Filesystem MCP to achieve remote code execution; mcp-server-git prior to 2025.12.18 must be updated.
#cve-2025-37164
fromThe Hacker News
1 month ago

Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways

The vulnerability, tracked as CVE-2025-20393 (CVSS score: 10.0), is a remote command execution flaw arising as a result of insufficient validation of HTTP requests by the Spam Quarantine feature. Successful exploitation of the defect could permit an attacker to execute arbitrary commands with root privileges on the underlying operating system of an affected appliance. However, for the attack to work, three conditions must be met - The appliance is running a vulnerable release of Cisco AsyncOS Software The appliance is configured with the Spam Quarantine feature The Spam Quarantine feature is exposed to and reachable from the internet
Information security
#gogs
Information security
fromComputerworld
1 month ago

Trend Micro patches critical flaws in its Apex Central software

A vulnerability in Apex Central's management server lets remote attackers cause the server to load and execute a malicious DLL without authentication.
fromThe Hacker News
1 month ago

Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions

"Trend Micro has released security updates to address multiple security vulnerabilities impacting on-premise versions of Apex Central for Windows, including a critical bug that could result in arbitrary code execution. The vulnerability, tracked as CVE-2025-69258, carries a CVSS score of 9.8 out of a maximum of 10.0. The vulnerability has been described as a case of remote code execution affecting LoadLibraryEX."
Information security
Information security
fromThe Hacker News
1 month ago

Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances

Multiple critical command-injection and information-disclosure vulnerabilities in Coolify allow authenticated or low-privileged users to achieve remote code execution, container escape, and root compromise.
#hpe-oneview
#veeam-backup--replication
Information security
fromThe Hacker News
1 month ago

Ongoing Attacks Exploiting Critical RCE Vulnerability in Legacy D-Link DSL Routers

CVE-2026-0625 permits unauthenticated command injection in D-Link DSL gateway dnscfg.cgi, enabling remote code execution and active exploitation of legacy models.
Information security
fromInfoWorld
1 month ago

Open WebUI bug turns the 'free model' into an enterprise backdoor

Open WebUI's storage of long-lived JWTs in localStorage plus Direct Connections execute events enables account takeover and can escalate to remote code execution.
fromThe Hacker News
1 month ago

Critical AdonisJS Bodyparser Flaw (CVSS 9.2) Enables Arbitrary File Write on Servers

If a developer uses MultipartFile.move() without the second options argument or without explicitly sanitizing the filename, an attacker can supply a crafted filename value containing traversal sequences, writing to a destination path outside the intended upload directory," the project maintainers said in an advisory released last week. "This can lead to arbitrary file write on the server. However, successful exploitation hinges on a reachable upload endpoint.
Information security
#watchguard
#react-server-components
fromInfoQ
2 months ago
Information security

Patch Urgently - Critical Vulnerability CVE-2025-55182 in React Server Functions Actively Exploited

fromInfoQ
2 months ago
Information security

Patch Urgently - Critical Vulnerability CVE-2025-55182 in React Server Functions Actively Exploited

#browser-extensions
fromThe Hacker News
2 months ago

CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks

Details of the six-year-old flaw were publicly shared by Cisco Talos in April 2019, describing it as an exploitable remote code execution vulnerability in the ACEManager "upload.cgi" function of Sierra Wireless AirLink ES450 firmware version 4.9.3. Talos reported the flaw to the Canadian company in December 2018. "This vulnerability exists in the file upload capability of templates within the AirLink 450," the company said. "When uploading template files, you can specify the name of the file that you are uploading."
Information security
fromThe Hacker News
2 months ago

Active Attacks Exploit Gladinet's Hard-Coded Keys for Unauthorized Access and Code Execution

"Threat actors can potentially abuse this as a way to access the web.config file, opening the door for deserialization and remote code execution," security researcher Bryan Masters said. The use of hard-coded cryptographic keys could allow threat actors to decrypt or forge access tickets, enabling them to access sensitive files like web.config that can be exploited to achieve ViewState deserialization and remote code execution, the cybersecurity company added.
Information security
Information security
fromThe Hacker News
2 months ago

.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL

A .NET Framework SOAP handling flaw (SOAPwn) enables attackers to abuse WSDL-created HTTP client proxies to perform arbitrary file writes and achieve remote code execution.
fromTheregister
2 months ago

Microsoft won't fix .NET RCE bug affecting enterprise apps

Its name and the official documentation both paint a simple picture: it should handle SOAP messages transported over HTTP. Straightforward. Predictable. Safe. Reality is less cooperative.
Information security
Information security
fromComputerWeekly.com
2 months ago

Microsoft patched over 1,100 CVEs in 2025 | Computer Weekly

A Windows Cloud Files Mini Filter Driver use-after-free vulnerability (CVE-2025-62221) is being actively exploited and can enable SYSTEM privilege escalation.
Information security
fromThe Hacker News
2 months ago

Sneeit WordPress RCE Exploited in the Wild While ICTBroadcast Bug Fuels Frost Botnet Attacks

A critical RCE (CVE-2025-6389) in Sneeit Framework WordPress plugin (≤8.3) is actively exploited; update to 8.4 to mitigate.
Information security
fromThe Hacker News
2 months ago

Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks

AI-powered IDEs have chained vulnerabilities that enable prompt injection, abuse of auto-approved tools, and weaponization of legitimate IDE features for data exfiltration and RCE.
Information security
fromComputerWeekly.com
2 months ago

Cloudflare fixes second outage in a month | Computer Weekly

Cloudflare briefly lost Dashboard and API availability due to a WAF parsing change deployed to mitigate a critical React Server Components RCE (React2Shell) vulnerability, now resolved.
Information security
fromTechzine Global
2 months ago

React2Shell exploited hours after discovery

Chinese state-backed groups actively weaponized React2Shell (CVE-2025-55182) within hours, enabling unauthenticated remote code execution against React 19.x and Next.js App Router.
Information security
fromInfoWorld
2 months ago

Developers urged to immediately upgrade React, Next.js

React 19's RSC Flight protocol contains a critical deserialization vulnerability enabling remote code execution; immediate upgrade and patching are required.
#react
Information security
fromThe Hacker News
2 months ago

Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation

Microsoft patched CVE-2025-9491, a Windows .LNK UI misinterpretation vulnerability enabling remote code execution via crafted shortcut files.
fromTechzine Global
2 months ago

OpenAI Codex CLI contained dangerous MCP security gap

This happened via the Model Context Protocol, intended to integrate external tools into the Codex environment. The CLI loaded MCP configurations from a .codex/config.toml file and executed the commands defined therein immediately upon startup. There was no approval prompt, no validation, and no check when the commands changed. MCP itself does not contain extensive built-in security, even after a series of updates.
Information security
Information security
fromThe Hacker News
2 months ago

ShadyPanda Turns Popular Browser Extensions with 4.3 Million Installs Into Spyware

ShadyPanda operated a seven-year browser extension campaign that amassed over 4.3 million installs and escalated to remote code execution, data exfiltration, and affiliate fraud.
fromThe Hacker News
2 months ago

New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

Cybersecurity researchers have discovered five vulnerabilities in Fluent Bit, an open-source and lightweight telemetry agent, that could be chained to compromise and take over cloud infrastructures. The security defects "allow attackers to bypass authentication, perform path traversal, achieve remote code execution, cause denial-of-service conditions, and manipulate tags," Oligo Security said in a report shared with The Hacker News. Successful exploitation of the flaws could enable attackers to disrupt cloud services, manipulate data, and burrow deeper into cloud and Kubernetes infrastructure.
Information security
[ Load more ]