Sudo 1.9.17 Host Option – Elevation of Privilege

# Exploit Title: Sudo 1.9.17 Host Option – Elevation of Privilege # Date: 2025-06-30 # Exploit Author: Rich Mirch # Vendor Homepage: https://www.sudo.ws # Software Link: https://www.sudo.ws/dist/sudo-1.9.17.tar.gz # Version: Stable 1.9.0 – 1.9.17, Legacy 1.8.8 – 1.8.32 # Fixed in: 1.9.17p1 # Vendor Advisory: https://www.sudo.ws/security/advisories/host_any # Blog: https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-sudo-host # Tested on: Ubuntu 24.04.1; Sudo 1.9.15p5,…

Read More

Microsoft PowerPoint 2019 – Remote Code Execution (RCE)

#!/usr/bin/env python3 # Exploit Title: Microsoft PowerPoint 2019 – Remote Code Execution (RCE) # Author: Mohammed Idrees Banyamer # Instagram: @banyamer_security # GitHub: https://github.com/mbanyamer # Date: 2025-07-02 # Tested on: Microsoft PowerPoint 2019 / Office 365 (version before June 2025 Patch) # CVE: CVE-2025-47175 # Type: Use-After-Free (UAF) Remote Code Execution (local user required) #…

Read More

Qualys Named as a Major Player in the IDC MarketScape: Worldwide Cloud-Native Application Protection Platform, 2025

We’re proud to share that Qualys has been recognized as a Major Player in the IDC MarketScape:  Worldwide Cloud-Native Application Protection Platform 2025 Vendor Assessment (doc #US53549925, June 2025). We believe this recognition reinforces our commitment to delivering game-changing innovation that delivers comprehensive protection, risk management, and cost efficiency across diverse multi and hybrid cloud…

Read More

6th July – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 6th July, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES The International Criminal Court (ICC) disclosed a sophisticated cyber‐security incident in late June 2025, its second such event in recent years. The intrusion, which occurred in June 2025, was promptly detected and…

Read More

A few interesting and notable ssh/telnet usernames

Just looked at our telnet/ssh honeypot data, and found some interesting new usernames that  attackers attempted to use: “notachancethisisreal“ This username is likely used to detect Cowrie (and other) honeypots. Cowrie is often configured to accept logins randomly. No matter the username/password combination used, the login will succeed every few times. This is supposed to…

Read More

Social Warfare WordPress Plugin 3.5.2 – Remote Code Execution (RCE)

#!/usr/bin/env python3 # Exploit Title: Social Warfare WordPress Plugin 3.5.2 – Remote Code Execution (RCE) # Date: 25-06-2025 # Exploit Author: Huseyin Mardini (@housma) # Original Researcher: Luka Sikic # Original Exploit Author: hash3liZer # Vendor Homepage: https://wordpress.org/plugins/social-warfare/ # Software Link: https://downloads.wordpress.org/plugin/social-warfare.3.5.2.zip # Version: <= 3.5.2 # CVE: CVE-2019-9978 # Tested On: WordPress 5.1.1…

Read More