
TVE-2026-03: Xiaomi miIO client heap buffer overflow
Xiaomi miIO client heap buffer overflow
Remote Pre-Auth Buffer Overflow in GNU Inetutils telnetd (LINEMODE SLC)
https://seclists.org/oss-sec/2026/q1/300#NoCVE yet?

oss-sec: Remote Pre-Auth Buffer Overflow in GNU Inetutils telnetd (LINEMODE SLC)
When NAS Vendors Forget How TLS Works
When NAS Vendors Forget How TLS Works

SSD Advisory - Kerio Control Authentication Bypass and RCE - SSD Secure Disclosure
Summary An analysis primarily of Kerio Control revealed a design flaw in the implementation of the communication with GFI AppManager, leading to an authentication bypass vulnerability in the product under audit. Once the authentication bypass is achieved, the attacker can cause the execution of arbitrary code and commands. Credit An independent security researcher, z3er01 of … SSD Advisory – Kerio Control Authentication Bypass and RCE Read More »
SSD Secure Disclosure[oss-security] Roundcube webmail: Post-Auth RCE via PHP Object Deserialization reported by firs0v /by
@hanno https://www.openwall.com/lists/oss-security/2025/06/02/1#NoCVEoss-security - Roundcube webmail: Post-Auth RCE via PHP Object Deserialization
reported by firs0v

Protecting Windows users from Janet Jackson's Rhythm Nation - The Old New Thing
Granting an exception to a system policy.
The Old New Thing[RSS] Finding an Unauthenticated RCE nday in Zendto, patched quietly in 2021. Lots of vulnerable instances exposed to the internet.
https://projectblack.io/blog/zendto-nday-vulnerabilities/#NoCVE
ZendTo NDay Vulnerability Hunting - Unauthenticated RCE in v5.24-3 <= v6.10-4
Discovering NDay flaws in ZendTo filesharing software highlighted an interesting fact: without the issuance of CVEs, vulnerabilities can easily go unpatched.
Research Blog | Project Black 
Possible out of bounds read when XML_OPTION_SKIP_TAGSTART used
This is a reocurrence of bug #72714 .
### Impact
Out of bounds read can leak heap contents.
```php
<?php
$sample = "<?xml version=\"1.0\"?><test><child/></test>";
$parser = xml_parser_c...
GitHub[RSS] Pwn everything Bounce everywhere all at once (part 2)
http://blog.quarkslab.com/pwn-everything-bounce-everywhere-all-at-once-part-2.htmlNew pre-auth RCE exploit chains for old SOPlanning bugs
#NoCVEPwn everything Bounce everywhere all at once (part 2)
In this series of articles we describe how, during an "assumed breach" security audit, we compromised multiple web applications on our client's network to carry out a watering hole attack by installing fake Single Sign-On pages on compromised servers. In our second episode we take a look at SOPlanning, a project management application that we encountered during the audit.
Quarkslab's blog#cURL doesn't validate SSH host identity if known_hosts file is missing. I think this is a #vulnerability, but the project disagrees. Advisory is here: https://sintonen.fi/advisories/curl-ssh-insufficient-host-identity-verification.txt
#infosec #cybersecurity #nocve