Back to Feed

Tag

Zero-day

Zero-day exploits and active exploitation

50 items tagged #zero-day

Articles

Drupal: Critical SQL injection flaw now targeted in attacks

Drupal SQL injection vulnerability CVE-2026-9082 now actively exploited in attacks.

macOS Kernel Memory Corruption Exploit - Schneier on Security

Researchers used Anthropic's Mythos AI to discover and exploit macOS kernel memory corruption flaw on Apple M5.

Microsoft acknowledges the YellowKey BitLocker bypass vulnerability and releases mitigations htt...

Microsoft acknowledges YellowKey BitLocker bypass vulnerability and releases mitigations.

Hackers Actively Exploit ‘Nginx Rift’ Vulnerability Affecting NGINX, F5 Products

Hackers actively exploit Nginx Rift (CVE-2026-42945) heap buffer overflow in NGINX and F5 products.

Hackers earn $1,298,250 for 47 zero-days at Pwn2Own Berlin 2026

Pwn2Own Berlin 2026 awards $1.3M for 47 zero-day exploits across enterprise and AI products.

PoC Code Published for Critical NGINX Vulnerability

PoC code published for critical NGINX heap buffer overflow vulnerability (CVE-2026-42945).

Hackers Use PyInstaller and AMSI Patching to Deliver XWorm RAT v7.4

Hackers deploy XWorm RAT v7.4 via PyInstaller with AMSI patching to bypass Windows security.

Hackers exploit auth bypass flaw in Burst Statistics WordPress plugin

Authentication bypass vulnerability in Burst Statistics WordPress plugin allows admin account takeover.

🚨 Nightmare Eclipse just released another vulnerability called MiniPlasma GitHub: https://t.co/...

Nightmare Eclipse releases MiniPlasma vulnerability (CVE-2020-17103) in Windows Cloud Files Mini Filter Driver

CVE-2026-20182: Critical Cisco SD-WAN Auth Bypass Under Active Exploitation

Cisco SD-WAN Controller/Manager CVE-2026-20182 critical auth bypass under active exploitation

Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access

Cisco patches critical auth bypass in Catalyst SD-WAN Controller actively exploited for admin access.

ThreatsDay Bulletin: PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks, and 10+ Stories

Weekly threat roundup: PAN-OS RCE exploited, Mythos cURL bug, AI tokenizer attacks, and 10+ security stories.

18-year-old NGINX vulnerability allows DoS, potential RCE

18-year-old NGINX heap buffer overflow vulnerability allows DoS and potential RCE.

mutreasury Allegedly Breached: Admin Credentials and API Keys Exposed From the Egyptian University Payment Gateway Covering 28+ Universities, Sold With a Zero-Day Vulnerability

mutreasury payment gateway breach exposes admin credentials, API keys, and student data from 28+ Egyptian universities;

CISA Adds One Known Exploited Vulnerability to Catalog

CISA adds CVE-2026-20182 Cisco SD-WAN authentication bypass to KEV Catalog as actively exploited.

Siemens Siemens ROS#

Siemens ROS# path traversal vulnerability (CVE-2026-41551) allows arbitrary file access in versions before 2.2.2.

Siemens gWAP

Siemens gWAP RCE vulnerability via Axios library prototype pollution gadget chain

Universal Robots Polyscope 5

Critical OS command injection in Universal Robots Polyscope 5 allows unauthenticated remote code execution.

Siemens Ruggedcom Rox

Siemens Ruggedcom Rox OS command injection vulnerability allows authenticated RCE with root privileges.

Siemens SENTRON 7KT PAC1261 Data Manager

Siemens SENTRON 7KT PAC1261 Data Manager HTTP request smuggling flaw allows admin token theft

Siemens Ruggedcom Rox

Siemens Ruggedcom Rox input validation flaw allows authenticated RCE with root privileges.

PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure

PraisonAI CVE-2026-44338 auth bypass exploited within hours of disclosure

New Fragnesia Linux flaw lets attackers gain root privileges

Fragnesia Linux kernel flaw (CVE-2026-46300) enables local privilege escalation to root.

18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE

18-year-old NGINX rewrite module heap buffer overflow enables unauthenticated RCE

Fortinet warns of critical RCE flaws in FortiSandbox and FortiAuthenticator

Fortinet patches critical RCE flaws in FortiSandbox and FortiAuthenticator.

Fuji Electric Tellus

Fuji Electric Tellus 5.0.2 kernel driver flaw allows local privilege escalation (CVE-2026-8108)

ABB AC500 V3 Stack Buffer Overflow in Cryptographic Message Syntax

ABB AC500 V3 PLC critical stack buffer overflow in CMS cryptographic parsing (CVE-2025-15467)

Copy.Fail Linux Vulnerability - Schneier on Security

Copy.Fail Linux kernel LPE vulnerability disclosed; affects Ubuntu, RHEL, Debian, SUSE, Amazon Linux, Fedora.

Copy Fail — 732 Bytes to Root

CVE-2026-31431 Copy Fail: 732-byte Linux kernel LPE affecting all major distros since 2017

'Dirty Frag' Exploit Poised to Blow Up on Enterprise Linux Distros

'Dirty Frag' Linux privilege escalation vulnerability discovered, similar to Dirty Pipe flaw.

⚡ Weekly Recap: Linux Rootkit, macOS Crypto Stealer, WebSocket Skimmers and More

Weekly security recap covers Linux RAT, macOS stealer, WebSocket skimmers, and active exploitation of Ivanti and Palo

9-Year-Old Dirty Frag Vulnerability Enables Root Access on Linux Systems

9-year-old Dirty Frag Linux kernel vulnerability enables unprivileged root access; public PoC released.

New ‘Dirty Frag’ Linux Vulnerability Possibly Exploited in Attacks

Dirty Frag Linux privilege escalation vulnerability possibly exploited in wild attacks.

Ollama Out-of-Bounds Read Vulnerability Allows Remote Process Memory Leak

Critical out-of-bounds read in Ollama allows remote memory leak affecting 300K+ servers.

Dirty Frag: Using the Page Caches as an Attack Surface

Dirty Frag LPE chain exploits two Linux kernel page-cache vulnerabilities to escalate to root.

‼️ Dirty Frag: A Universal Linux Local Privilege Escalation via Page-Cache Write Primitives GitH...

Dirty Frag Linux LPE vulnerability in kernel page-cache xfrm-ESP subsystem disclosed

Ransomware negotiator tied to $56M in attacks was sentenced, DPRK-linked fraudulent IT worker sch...

Ransomware negotiator sentenced for $56M attacks; DPRK IT fraud disrupted; PCPJack targets cloud credentials; Palo Alto

Active attack: Dirty Frag Linux vulnerability expands post-compromise risk

Dirty Frag Linux kernel vulnerability enables reliable privilege escalation from unprivileged user to root.

Dirty Frag is a Linux LPE case worth watching closely It chains two page-cache write issues to g...

Dirty Frag Linux LPE chains two page-cache write bugs for root access on major distros

ClaudeBleed Vulnerability Lets Hackers Hijack Claude Chrome Extension to Steal Data

ClaudeBleed vulnerability in Claude Chrome extension allows data exfiltration via guardrail bypass.

CISA Adds One Known Exploited Vulnerability to Catalog

CISA adds BerriAI LiteLLM SQL injection vulnerability to Known Exploited Vulnerabilities catalog.

Pentest-Tools.com Releases Free Scanner for CVE-2026-41940 as cPanel Authentication Bypass Enters Its Third Week of Active Exploitation

Pentest-Tools releases free scanner for CVE-2026-41940, critical cPanel auth bypass actively exploited for 3 weeks.

CVE-2025-68670: discovering an RCE vulnerability in xrdp

CVE-2025-68670: Pre-auth RCE in xrdp server via buffer overflow in UTF-16 conversion.

Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions

Unpatched Linux kernel Dirty Frag LPE vulnerability enables root access across major distributions.

New threat brief: CVE-2026-0300, a buffer overflow vulnerability in the PAN-OS User-ID Authentica...

CVE-2026-0300 buffer overflow in PAN-OS User-ID portal enables unauthenticated RCE.

When prompts become shells: RCE vulnerabilities in AI agent frameworks

Microsoft discloses RCE vulnerabilities in Semantic Kernel AI agent framework via prompt injection.

Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access

Ivanti EPMM CVE-2026-6973 RCE under active exploitation requires admin auth.

ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New Stories

Weekly threat bulletin covers MicroStealer, ICS flaws, supply chain defenses, and North Korea cybercrime case.

Gemini CLI Vulnerability Could Have Led to Code Execution, Supply Chain Attack

Gemini CLI vulnerability allowed prompt injection to enable supply chain attacks via GitHub issues.

Google Fixes CVSS 10 Gemini CLI Vulnerability Enabling GitHub Issue-Based RCE

Google patches CVSS 10 Gemini CLI vulnerability allowing prompt injection RCE via GitHub issues.