#remote-code-execution

[ follow ]
Information security
fromThe Hacker News
6 hours ago

Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials

Two critical vulnerabilities in n8n workflow automation platform enable arbitrary command execution through sandbox escape and unauthenticated expression evaluation, affecting both self-hosted and cloud deployments.
Information security
fromInfoQ
22 hours ago

AI-Powered Bot Compromises GitHub Actions Workflows Across Microsoft, DataDog, and CNCF Projects

An autonomous AI bot exploited GitHub Actions workflows across major open-source repositories, achieving remote code execution and stealing credentials with write permissions between February 21-28, 2026.
Information security
fromSecurityWeek
1 day ago

Microsoft Patches 83 Vulnerabilities

Microsoft released 83 vulnerability patches in March 2026, including one critical remote code execution flaw and several privilege escalation bugs requiring attention.
fromSecurityWeek
6 days ago

Cisco Patches Critical Vulnerabilities in Enterprise Networking Products

This vulnerability is due to an improper system process that is created at boot time. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute a variety of scripts and commands that allow root access to the device.
Information security
Information security
fromSecurityWeek
1 week ago

Critical FreeScout Vulnerability Leads to Full Server Compromise

A critical zero-click RCE vulnerability in FreeScout bypasses previous patches using zero-width space characters, enabling unauthenticated remote code execution through malicious emails.
Information security
fromSecurityWeek
1 week ago

VMware Aria Operations Vulnerability Exploited in the Wild

CVE-2026-22719, a high-severity unauthenticated command injection vulnerability in VMware Aria Operations, is being exploited in the wild and has been added to CISA's Known Exploited Vulnerabilities catalog.
Information security
fromThe Hacker News
1 week ago

CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog

CISA added CVE-2026-22719, a high-severity command injection vulnerability in Broadcom VMware Aria Operations, to its Known Exploited Vulnerabilities catalog due to active exploitation in the wild.
Information security
fromSecurityWeek
1 week ago

Android Update Patches Exploited Qualcomm Zero-Day

Google released Android security updates patching nearly 130 vulnerabilities, including an exploited zero-day in Qualcomm chipsets affecting over 200 devices through integer overflow in graphics components.
fromSecurityWeek
1 week ago

Juniper Networks PTX Routers Affected by Critical Vulnerability

The On-Box Anomaly detection framework should only be reachable by other internal processes over the internal routing instance, but not over an externally exposed port. With the ability to access and manipulate the service to execute code as root a remote attacker can take complete control of the device.
Information security
fromSecurityWeek
1 week ago

Critical Flaws Exposed Gardyn Smart Gardens to Remote Hacking

According to CISA, Gardyn products were affected by two critical and two high-severity vulnerabilities. One of the critical flaws, tracked as CVE-2025-29631, is a command injection issue that can be exploited to execute arbitrary OS commands on the targeted device. The second critical vulnerability, CVE-2025-1242, is related to the exposure of hardcoded admin credentials that can be used to gain full control of the Gardyn IoT Hub.
Information security
fromSecurityWeek
1 week ago

Zyxel Patches Critical Vulnerability in Many Device Models

An attacker could exploit the flaw via crafted UPnP SOAP requests to execute OS commands on a vulnerable device. It is important to note that WAN access is disabled by default on these devices, and the attack can be carried out remotely only if both WAN access and the vulnerable UPnP function have been enabled.
Information security
Information security
fromSecurityWeek
1 week ago

Trend Micro Patches Critical Apex One Vulnerabilities

TrendAI released patches for eight vulnerabilities in Apex One endpoint security, including two critical flaws allowing remote code execution on the management console.
fromBleepingComputer
1 week ago

Fake Next.js job interview tests backdoor developer's devices

The Microsoft Defender team says that the attacker created fake web app projects built with Next.js and disguised them as coding projects to share with developers during job interviews or technical assessments. The researchers initially identified a repository hosted on the Bitbucket cloud-based Git-based code hosting and collaboration service. However, they discovered multiple repositories that shared code structure, loader logic, and naming patterns.
Information security
Information security
fromTheregister
1 week ago

Claude's collaboration tools allowed remote code execution

Claude Code contained three security vulnerabilities allowing remote code execution and API key theft through malicious repository configurations, posing significant supply chain risks to developers.
fromCSS-Tricks
2 weeks ago

An Exploit ... in CSS?! | CSS-Tricks

Google credits security researcher Shaheen Fazim with reporting the exploit to Google. The dude's LinkedIn says he's a professional bug hunter, and I'd say he deserves the highest possible bug bounty for finding something that a government agency is saying "in CSS in Google Chrome before 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page."
Information security
Information security
fromThe Hacker News
2 weeks ago

Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration

Multiple critical vulnerabilities in Claude Code allow remote code execution and API credential theft when users open untrusted repositories.
Information security
fromSecurityWeek
2 weeks ago

SolarWinds Patches Four Critical Serv-U Vulnerabilities

SolarWinds released patches for four critical vulnerabilities in Serv-U with CVSS scores of 9.1 that enable remote code execution when exploited by administrators.
Information security
fromThe Hacker News
2 weeks ago

SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution

SolarWinds released patches for four critical remote code execution vulnerabilities in Serv-U file transfer software, all rated 9.1 CVSS severity, requiring administrative privileges for exploitation.
#cve-2026-1731
Information security
fromZero Day Initiative
2 weeks ago

Zero Day Initiative - CVE-2026-20841: Arbitrary Code Execution in the Windows Notepad

Remote code execution in Windows Notepad via improper validation of Markdown links can allow arbitrary command execution when a user opens a malicious file.
Information security
fromThe Hacker News
3 weeks ago

Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution

Unauthenticated stack-based buffer overflow (CVE-2026-2329) in Grandstream GXP1600 VoIP phones' /cgi-bin/api.values.get allows remote root code execution via malicious request parameter.
Information security
fromSecurityWeek
3 weeks ago

Vulnerabilities in Popular PDF Platforms Allowed Account Takeover, Data Exfiltration

Critical and high-severity vulnerabilities were found in Apryse and Foxit PDF platforms that could enable account takeover, data exfiltration, and remote code execution.
fromThe Hacker News
3 weeks ago

Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs

CVE-2025-65717 (CVSS score: 9.1) - A vulnerability in Live Server that allows attackers to exfiltrate local files, tricking a developer into visiting a malicious website when the extension is running, causing JavaScript embedded in the page to crawl and extract files from the local development HTTP server that runs at localhost:5500, and transmit them to a domain under their control. (Remains unpatched)
Information security
#visual-studio-code
fromInfoWorld
3 weeks ago
Information security

Flaws in four popular VS Code extensions left 128 million installs open to attack

fromInfoWorld
3 weeks ago
Information security

Flaws in four popular VS Code extensions left 128 million installs open to attack

#beyondtrust
fromThe Verge
4 weeks ago

Microsoft fixes Notepad flaw that could trick users into clicking malicious Markdown links

Microsoft has fixed a serious security vulnerability affecting Markdown files in Notepad. In the company's Tuesday patch notes, Microsoft says a bad actor could carry out a remote code execution attack by tricking users "into clicking a malicious link inside a Markdown file opened in Notepad," as reported earlier by The Register. Clicking the link would "launch unverified protocols," allowing attackers to remotely load and execute malicious files on a victim's computer, according to the patch notes.
Information security
Information security
fromTheregister
4 weeks ago

Notepad's new Markdown powers served with a side of RCE

Notepad's Markdown support contains a vulnerability (CVE-2026-20841) that can achieve remote code execution when users open a malicious Markdown file and click a link.
fromTheregister
4 weeks ago

Claude add-on turns Google Calendar into malware courier

Claude Desktop Extensions, recently renamed MCP Bundles, are packaged applications that extend the capabilities of Claude Desktop using the Model Context Protocol, a standard way to give generative AI models access to other software and data. Stored as .dxt files (with Anthropic transitioning the format to .mcpb), they are ZIP archives that package a local MCP server alongside a manifest.json file describing the extension's capabilities.
Information security
fromTechRepublic
4 weeks ago

10K Claude Desktop Users Exposed by Zero-Click Vulnerability

LayerX researchers found that a single malicious Google Calendar event can trigger remote code execution on Claude Desktop systems, enabling silent takeover at scale. "If exploited by a bad actor, even a benign prompt ("take care of it"), coupled with a maliciously worded calendar event, is sufficient to trigger arbitrary local code execution that compromises the entire system," said LayerX researchers in their analysis.
Information security
Information security
fromThe Hacker News
4 weeks ago

SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers

Threat actors exploited internet-exposed SolarWinds Web Help Desk instances to achieve unauthenticated remote code execution, move laterally, and access high-value assets.
#openclaw
#n8n
Information security
fromSecurityWeek
1 month ago

Cisco, F5 Patch High-Severity Vulnerabilities

Multiple critical vulnerabilities in Cisco and F5 products allow remote DoS, arbitrary file upload leading to root command execution, and privilege escalation; patches released.
#solarwinds
fromSecurityWeek
1 month ago
Information security

SolarWinds Patches Critical Web Help Desk Vulnerabilities

SolarWinds released patches for six Web Help Desk vulnerabilities, including four critical unauthenticated deserialization and authentication-bypass flaws enabling remote code execution.
fromThe Hacker News
1 month ago
Information security

SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass

SolarWinds Web Help Desk has multiple critical vulnerabilities, including deserialization flaws enabling unauthenticated remote code execution; updates fixed issues in WHD 2026.1.
Information security
fromThe Hacker News
1 month ago

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

A critical untrusted-data deserialization vulnerability in SolarWinds Web Help Desk (CVE-2025-40551) enables unauthenticated remote code execution and is actively exploited.
Information security
fromSecurityWeek
1 month ago

Vulnerabilities Allowed Full Compromise of Google Looker Instances

Two Looker vulnerabilities (LookOut) allow attackers with developer permissions to achieve remote code execution, full administrative access, data exfiltration, and potential cross-tenant access.
#docker
Information security
fromTechzine Global
1 month ago

CISA warns of active exploitation of critical SolarWinds vulnerability

A critical remote-code-execution vulnerability CVE-2025-40551 in SolarWinds Web Help Desk is actively exploited; federal agencies must install the patch within three days.
fromTechzine Global
1 month ago

Critical vulnerability in React Native development tool actively exploited

Attackers are actively exploiting a critical vulnerability in React Native's Metro server to infiltrate development environments. The vulnerability, CVE-2025-11953, allows malicious actors to execute code on Windows and Linux systems via exposed development servers. Metro is React Native's default JavaScript bundler during application development and testing. In many configurations, this server runs locally, but by default, Metro can also bind to external network interfaces. This makes HTTP endpoints available that are intended for development. It is precisely this functionality that now constitutes an attack vector,
Information security
#react2shell
fromInfoWorld
2 months ago
Information security

React2Shell: Anatomy of a max-severity flaw that sent shockwaves through the web

fromInfoWorld
2 months ago
Information security

React2Shell: Anatomy of a max-severity flaw that sent shockwaves through the web

fromThe Hacker News
1 month ago

Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package

Cybersecurity company VulnCheck said it first observed exploitation of CVE-2025-11953 (aka Metro4Shell) on December 21, 2025. With a CVSS score of 9.8, the vulnerability allows remote unauthenticated attackers to execute arbitrary operating system commands on the underlying host. Details of the flaw were first documented by JFrog in November 2025. Despite more than a month after initial exploitation in the wild, the "activity has yet to see broad public acknowledgment," it added.
Information security
#ivanti-epmm
#smartermail
Information security
fromSecurityWeek
1 month ago

'PackageGate' Flaws Open JavaScript Ecosystem to Supply Chain Attacks

Six vulnerabilities in major JavaScript package managers (NPM, PNPM, VLT, Bun) allow bypassing supply chain protections and enable remote code execution.
Information security
fromThe Hacker News
1 month ago

Critical Grist-Core Vulnerability Allows RCE Attacks via Spreadsheet Formulas

A Pyodide sandbox escape (Cellbreak, CVE-2026-24002) in Grist-Core allows remote code execution; upgrade to Grist 1.7.9 or later to mitigate.
Information security
fromKotaku
1 month ago

Report Of Steam Game Exploit Leads To Online Dispute With Devs

A remote code execution vulnerability in Screeps: World allowed players to gain control of others' computers, prompting developers to patch after a disputed report.
Information security
fromTechRepublic
1 month ago

Zoom and GitLab Patch RCE, DoS, and 2FA Bypass Vulnerabilities - TechRepublic

Emergency patches for Zoom and GitLab fix critical vulnerabilities that could enable remote code execution, full network takeover, and development-operation crashes.
Apple
fromTechRepublic
1 month ago

New iOS and iPadOS Flaws Leave Millions of iPhones at Risk

Two WebKit vulnerabilities (CVE-2025-43529 and CVE-2025-14174) allow zero-click remote code execution in Safari, potentially giving attackers full access to iPhones and iPads.
Information security
fromSecurityWeek
1 month ago

2024 VMware Flaw Now in Attackers' Crosshairs

CVE-2024-37079, a critical DCERPC out-of-bounds write in VMware vCenter (CVSS 9.8), is being exploited in the wild; apply June 2024 patches immediately.
Information security
fromComputerworld
1 month ago

Critical Cisco UC bug actively exploited

Critical RCE vulnerability CVE-2026-20045 affects Cisco Unified Communications products, is actively exploited, and patches have been released; CISA added it to its exploited vulnerabilities catalog.
#cve-2026-20045
fromThe Hacker News
1 month ago

CERT/CC Warns binary-parser Bug Allows Node.js Privilege-Level Code Execution

The vulnerability, tracked as CVE-2026-1245 (CVSS score: N/A), affects all versions of the module prior to version 2.3.0, which addresses the issue. Patches for the flaw were released on November 26, 2025. Binary-parser is a widely used parser builder for JavaScript that allows developers to parse binary data. It supports a wide range of common data types, including integers, floating-point values, strings, and arrays. The package attracts approximately 13,000 downloads on a weekly basis.
Information security
Information security
fromTheregister
1 month ago

Anthropic quietly fixed flaws in its Git MCP server

Three mcp-server-git vulnerabilities allowed chaining with Filesystem MCP to achieve remote code execution; mcp-server-git prior to 2025.12.18 must be updated.
#cve-2025-37164
fromThe Hacker News
1 month ago

Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways

The vulnerability, tracked as CVE-2025-20393 (CVSS score: 10.0), is a remote command execution flaw arising as a result of insufficient validation of HTTP requests by the Spam Quarantine feature. Successful exploitation of the defect could permit an attacker to execute arbitrary commands with root privileges on the underlying operating system of an affected appliance. However, for the attack to work, three conditions must be met - The appliance is running a vulnerable release of Cisco AsyncOS Software The appliance is configured with the Spam Quarantine feature The Spam Quarantine feature is exposed to and reachable from the internet
Information security
#gogs
Information security
fromComputerworld
2 months ago

Trend Micro patches critical flaws in its Apex Central software

A vulnerability in Apex Central's management server lets remote attackers cause the server to load and execute a malicious DLL without authentication.
fromThe Hacker News
2 months ago

Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions

"Trend Micro has released security updates to address multiple security vulnerabilities impacting on-premise versions of Apex Central for Windows, including a critical bug that could result in arbitrary code execution. The vulnerability, tracked as CVE-2025-69258, carries a CVSS score of 9.8 out of a maximum of 10.0. The vulnerability has been described as a case of remote code execution affecting LoadLibraryEX."
Information security
Information security
fromThe Hacker News
2 months ago

Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances

Multiple critical command-injection and information-disclosure vulnerabilities in Coolify allow authenticated or low-privileged users to achieve remote code execution, container escape, and root compromise.
#hpe-oneview
#veeam-backup--replication
Information security
fromThe Hacker News
2 months ago

Ongoing Attacks Exploiting Critical RCE Vulnerability in Legacy D-Link DSL Routers

CVE-2026-0625 permits unauthenticated command injection in D-Link DSL gateway dnscfg.cgi, enabling remote code execution and active exploitation of legacy models.
Information security
fromInfoWorld
2 months ago

Open WebUI bug turns the 'free model' into an enterprise backdoor

Open WebUI's storage of long-lived JWTs in localStorage plus Direct Connections execute events enables account takeover and can escalate to remote code execution.
fromThe Hacker News
2 months ago

Critical AdonisJS Bodyparser Flaw (CVSS 9.2) Enables Arbitrary File Write on Servers

If a developer uses MultipartFile.move() without the second options argument or without explicitly sanitizing the filename, an attacker can supply a crafted filename value containing traversal sequences, writing to a destination path outside the intended upload directory," the project maintainers said in an advisory released last week. "This can lead to arbitrary file write on the server. However, successful exploitation hinges on a reachable upload endpoint.
Information security
#watchguard
Information security
fromLogRocket Blog
2 months ago

React2Shell exploit: What happened and lessons learned - LogRocket Blog

A deserialization flaw in React Server Components (React2Shell, CVE-2025-55182) enabled remote code execution with CVSS 10.0 and was rapidly exploited in the wild.
Information security
fromThe Hacker News
2 months ago

GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads

GhostPoster used logo files in 17 Firefox add-ons to embed malicious JavaScript that hijacks affiliate links, injects tracking, and enables click and ad fraud.
fromThe Hacker News
2 months ago

CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks

Details of the six-year-old flaw were publicly shared by Cisco Talos in April 2019, describing it as an exploitable remote code execution vulnerability in the ACEManager "upload.cgi" function of Sierra Wireless AirLink ES450 firmware version 4.9.3. Talos reported the flaw to the Canadian company in December 2018. "This vulnerability exists in the file upload capability of templates within the AirLink 450," the company said. "When uploading template files, you can specify the name of the file that you are uploading."
Information security
fromThe Hacker News
2 months ago

Active Attacks Exploit Gladinet's Hard-Coded Keys for Unauthorized Access and Code Execution

"Threat actors can potentially abuse this as a way to access the web.config file, opening the door for deserialization and remote code execution," security researcher Bryan Masters said. The use of hard-coded cryptographic keys could allow threat actors to decrypt or forge access tickets, enabling them to access sensitive files like web.config that can be exploited to achieve ViewState deserialization and remote code execution, the cybersecurity company added.
Information security
Information security
fromThe Hacker News
2 months ago

.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL

A .NET Framework SOAP handling flaw (SOAPwn) enables attackers to abuse WSDL-created HTTP client proxies to perform arbitrary file writes and achieve remote code execution.
[ Load more ]