TVE-2026-03: Xiaomi miIO client heap buffer overflow

Xiaomi miIO client heap buffer overflow

Remote Pre-Auth Buffer Overflow in GNU Inetutils telnetd (LINEMODE SLC)

https://seclists.org/oss-sec/2026/q1/300

#NoCVE yet?
oss-sec: Remote Pre-Auth Buffer Overflow in GNU Inetutils telnetd (LINEMODE SLC)

When NAS Vendors Forget How TLS Works

When NAS Vendors Forget How TLS Works

SSD Advisory - Kerio Control Authentication Bypass and RCE - SSD Secure Disclosure

Summary An analysis primarily of Kerio Control revealed a design flaw in the implementation of the communication with GFI AppManager, leading to an authentication bypass vulnerability in the product under audit. Once the authentication bypass is achieved, the attacker can cause the execution of arbitrary code and commands. Credit An independent security researcher, z3er01 of … SSD Advisory – Kerio Control Authentication Bypass and RCE Read More »

SSD Secure Disclosure
[oss-security] Roundcube webmail: Post-Auth RCE via PHP Object Deserialization reported by firs0v /by @hanno

https://www.openwall.com/lists/oss-security/2025/06/02/1

#NoCVE
oss-security - Roundcube webmail: Post-Auth RCE via PHP Object Deserialization reported by firs0v

[RSS] Protecting Windows users from Janet Jackson's Rhythm Nation

https://devblogs.microsoft.com/oldnewthing/20250429-42/?p=111127

#NoCVE
Protecting Windows users from Janet Jackson's Rhythm Nation - The Old New Thing

Granting an exception to a system policy.

The Old New Thing
[RSS] Finding an Unauthenticated RCE nday in Zendto, patched quietly in 2021. Lots of vulnerable instances exposed to the internet.

https://projectblack.io/blog/zendto-nday-vulnerabilities/

#NoCVE
ZendTo NDay Vulnerability Hunting - Unauthenticated RCE in v5.24-3 <= v6.10-4

Discovering NDay flaws in ZendTo filesharing software highlighted an interesting fact: without the issuance of CVEs, vulnerabilities can easily go unpatched.

Research Blog | Project Black
This is the out-of-bands read, that didn't get a CVE apparently:

https://github.com/php/php-src/security/advisories/GHSA-wg4p-4hqh-c3g9

#PHP #NoCVE
Possible out of bounds read when XML_OPTION_SKIP_TAGSTART used

This is a reocurrence of bug #72714 . ### Impact Out of bounds read can leak heap contents. ```php <?php $sample = "<?xml version=\"1.0\"?><test><child/></test>"; $parser = xml_parser_c...

GitHub
[RSS] Pwn everything Bounce everywhere all at once (part 2)

http://blog.quarkslab.com/pwn-everything-bounce-everywhere-all-at-once-part-2.html

New pre-auth RCE exploit chains for old SOPlanning bugs #NoCVE
Pwn everything Bounce everywhere all at once (part 2)

In this series of articles we describe how, during an "assumed breach" security audit, we compromised multiple web applications on our client's network to carry out a watering hole attack by installing fake Single Sign-On pages on compromised servers. In our second episode we take a look at SOPlanning, a project management application that we encountered during the audit.

Quarkslab's blog

#cURL doesn't validate SSH host identity if known_hosts file is missing. I think this is a #vulnerability, but the project disagrees. Advisory is here: https://sintonen.fi/advisories/curl-ssh-insufficient-host-identity-verification.txt

#infosec #cybersecurity #nocve