<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>RCE Flaw &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/vulnerability/rce-flaw/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Tue, 02 Dec 2025 10:59:13 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>RCE Flaw &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>PoC Released for Critical Outlook Zero-Click RCE Bug</title>
		<link>https://firsthackersnews.com/monikerlink/</link>
					<comments>https://firsthackersnews.com/monikerlink/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 01 Dec 2025 10:15:49 +0000</pubDate>
				<category><![CDATA[RCE Flaw]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[CVE‑2024‑21413]]></category>
		<category><![CDATA[outlook]]></category>
		<category><![CDATA[PoC]]></category>
		<category><![CDATA[rce bug]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<category><![CDATA[zero-click]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10734</guid>

					<description><![CDATA[<p>A Proof‑of‑Concept exploit has been released for a critical remote code execution vulnerability in Microsoft Outlook, tracked as</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/monikerlink/">PoC Released for Critical Outlook Zero-Click RCE Bug</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><span style="font-size: revert; color: initial;">A Proof‑of‑Concept exploit has been released for a critical remote code execution vulnerability in Microsoft Outlook, tracked as CVE‑2024‑21413.</span></p>



<p><span style="font-size: revert; color: initial;">The flaw, known as “MonikerLink,” allows attackers to bypass Outlook’s Protected View and execute malicious code or steal credentials. The PoC release highlights the continuing risk and provides security teams with insight into the attack vector.</span> </p>



<h2 class="wp-block-heading"><strong data-start="627" data-end="665">Understanding the MonikerLink Flaw</strong> </h2>



<p>This vulnerability, rated with a CVSS score of 9.8, originates from the way Outlook parses special hyperlinks called Moniker Links. </p>



<p>Protected View is designed to restrict suspicious files by running them in a limited, read‑only mode. However, attackers can bypass this protection by embedding a crafted file:// link containing an exclamation mark and additional text.</p>



<h2 class="wp-block-heading"><strong>How the Exploit Triggers in Outlook</strong></h2>



<p>When a user clicks a malicious Moniker Link, Outlook attempts to access the referenced file without presenting any security warning.</p>



<p>This silent lookup can trigger an SMB connection to an attacker‑controlled server, resulting in the leakage of the victim’s NTLM credentials. In advanced attack scenarios, this behavior can escalate to remote code execution, giving attackers high‑level control over the compromised system.</p>



<p>The newly published Python-based PoC illustrates how this vulnerability can be exploited in a controlled lab setup. Available on GitHub, the script is designed to work with a specific configuration involving hMailServer and targets a user running a vulnerable version of Outlook. </p>



<p>It automates the process of sending an email that embeds the crafted Moniker Link, ensuring the malicious payload lands directly in the victim’s inbox.</p>



<p>According to the PoC author, the script assumes a simplified testing environment, including the absence of TLS authentication, to make the learning process easier. While the code is intentionally basic and aimed at users exploring the “MonikerLink” room on TryHackMe, it effectively demonstrates the core attack mechanics. </p>



<p>For researchers looking for more advanced tooling, the author also recommends alternative repositories, such as the one maintained by security researcher Xaitax.</p>



<h2 class="wp-block-heading"><strong>Impact and Security Considerations</strong></h2>



<p>Beyond credential theft, the MonikerLink bypass can lead to full remote code execution when combined with other exploitation techniques. </p>



<p>This makes the flaw one of the most critical Outlook vulnerabilities disclosed in recent years. Organizations are urged to apply available patches and review email security controls to reduce exposure.</p>



<h2 class="wp-block-heading"><strong>Mitigations:</strong></h2>



<ul class="wp-block-list">
<li> Watch for unusual email patterns that may indicate someone trying to trigger this weakness. A new YARA rule from researcher Florian Roth can help spot emails containing the <strong>file:\</strong> path trick.</li>



<li> Using this rule allows defenders to catch risky emails early, before they reach users.</li>



<li> Microsoft has published security fixes for <strong>CVE-2024-21413</strong>, and updating systems right away is strongly recommended.</li>



<li> Since exploit examples are now public, attackers are more likely to copy and use them.</li>



<li> Make sure every Microsoft Office installation is running the latest security updates.</li>



<li> Blocking outbound SMB connections on <strong>port 445</strong> can help prevent NTLM credentials from leaking to outside servers.</li>
</ul>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/monikerlink/">PoC Released for Critical Outlook Zero-Click RCE Bug</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/monikerlink/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Ivanti RCE flaw affects over 5,000 devices</title>
		<link>https://firsthackersnews.com/ivanti-rce-flaw/</link>
					<comments>https://firsthackersnews.com/ivanti-rce-flaw/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 08 Apr 2025 16:24:34 +0000</pubDate>
				<category><![CDATA[RCE Flaw]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Ivanti RCE flaw]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=9977</guid>

					<description><![CDATA[<p>More than 5,000 Ivanti Connect Secure devices remain exposed to a high-risk remote code execution (RCE) vulnerability, CVE-2025-22457,</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/ivanti-rce-flaw/">Ivanti RCE flaw affects over 5,000 devices</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>More than 5,000 Ivanti Connect Secure devices remain exposed to a high-risk remote code execution (RCE) vulnerability, CVE-2025-22457, according to data from the Shadowserver Foundation.</p>



<p>This flaw, caused by a stack-based buffer overflow, allows unauthenticated attackers to remotely execute arbitrary code on affected systems. It has already been actively exploited in the wild, raising concerns across the cybersecurity community.</p>



<h2 class="wp-block-heading"><strong>Exploitation in the Wild</strong></h2>



<p>As of April 6, 2025, the Shadowserver Foundation reported that 5,113 Ivanti Connect Secure devices are still unpatched and vulnerable to a critical remote code execution (RCE) flaw—CVE-2025-22457.</p>



<p>This serious vulnerability allows attackers to take full control of affected devices without needing a password. Due to its severity, it has been added to CISA’s Known Exploited Vulnerabilities (KEV) catalog, highlighting the urgent need for organizations to take action.</p>



<p>Attackers can use this flaw to steal data, install ransomware, or create persistent backdoors into networks.</p>



<p>Shadowserver’s scan data shows these vulnerable devices are spread across IPv4 and IPv6 spaces, with high concentrations in North America, Europe, and Asia.</p>



<p>Ivanti first disclosed the issue in March 2025 and released patches to fix it. However, many organizations have yet to update, leaving them open to attack.</p>



<h2 class="wp-block-heading"><strong>Recommendation</strong></h2>



<ul class="wp-block-list">
<li><strong>Apply Ivanti’s patch immediately</strong> if you’re using Connect Secure.</li>



<li><strong>Check access logs</strong> for any unusual activity that could indicate compromise.</li>



<li><strong>Scan your infrastructure</strong> to make sure no vulnerable devices are exposed online.</li>
</ul>



<p>Experts stress that unpatched systems are actively being targeted. Delays in applying security updates can lead to serious consequences, including breaches, downtime, and regulatory issues.</p>



<p>This situation is a clear reminder of how crucial timely patching and proactive cybersecurity practices are in today’s threat landscape.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/ivanti-rce-flaw/">Ivanti RCE flaw affects over 5,000 devices</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/ivanti-rce-flaw/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft Patch Tuesday (Feb 2025): 61 Vulnerabilities, 25 RCE, 3 Zero-Day</title>
		<link>https://firsthackersnews.com/microsoft-patch-tuesday-3/</link>
					<comments>https://firsthackersnews.com/microsoft-patch-tuesday-3/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 11 Feb 2025 18:17:00 +0000</pubDate>
				<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[RCE Flaw]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Zero Day Attack]]></category>
		<category><![CDATA[patch tuesday]]></category>
		<category><![CDATA[privilege escalation flaws]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=9611</guid>

					<description><![CDATA[<p>Microsoft’s February 2025 Patch Tuesday fixes multiple vulnerabilities, including critical RCE and privilege escalation flaws. Users and organizations</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-patch-tuesday-3/">Microsoft Patch Tuesday (Feb 2025): 61 Vulnerabilities, 25 RCE, 3 Zero-Day</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Microsoft’s February 2025 Patch Tuesday fixes multiple vulnerabilities, including critical RCE and privilege escalation flaws. Users and organizations should update immediately to stay protected.</p>



<h2 class="wp-block-heading"><strong>All about the vulnerability</strong></h2>



<p>The February update addressed:</p>



<ul class="wp-block-list">
<li><strong>25</strong> Remote Code Execution flaws</li>



<li><strong>14</strong> Elevation of Privilege vulnerabilities</li>



<li><strong>6</strong> Denial of Service issues</li>



<li><strong>4</strong> Security Feature Bypass flaws</li>



<li><strong>2</strong> Spoofing vulnerabilities</li>



<li><strong>1</strong> Information Disclosure vulnerability</li>
</ul>



<p><strong>Microsoft Patch Tuesday &#8211; February 2025</strong></p>



<p>This update addresses <strong>61+ vulnerabilities</strong>, including critical and important flaws:</p>



<p><strong>Critical Vulnerabilities:</strong></p>



<ul class="wp-block-list">
<li><strong>CVE-2025-21376:</strong> Remote code execution via LDAP protocol.</li>



<li><strong>CVE-2025-21379:</strong> RCE risk via crafted DHCP packets.</li>



<li><strong>CVE-2025-21381, 21386, 21387:</strong> Excel vulnerabilities allowing code execution via malicious files.</li>



<li><strong>CVE-2025-21406, 21407:</strong> RCE vulnerabilities in Windows Telephony Service.</li>
</ul>



<p><strong>Exploited in the Wild:</strong></p>



<ul class="wp-block-list">
<li><strong>CVE-2023-24932:</strong> Secure Boot bypass risk.</li>



<li><strong>CVE-2025-21391:</strong> Elevated privileges for attackers.</li>



<li><strong>CVE-2025-21418:</strong> SYSTEM privileges gained via exploit.</li>
</ul>



<p><strong>Other Notable Fixes:</strong></p>



<ul class="wp-block-list">
<li><strong>Visual Studio RCE (CVE-2025-21176, 21178):</strong> Immediate updates needed for RCE risks.</li>



<li><strong>Azure Network Watcher Elevation of Privilege (CVE-2025-21188):</strong> Update for Azure cloud admins.</li>



<li><strong>Microsoft Office RCE (CVE-2025-21392, 21397):</strong> Fix for Office document exploit risks.</li>
</ul>



<p>Here’s a table of <strong>61 vulnerabilities</strong> addressed in Microsoft’s <strong>February 2025 Patch Tuesday</strong>, based on the provided data and search results.</p>



<figure class="wp-block-table"><table><thead><tr><th><strong>CVE ID</strong></th><th><strong>Title</strong></th><th><strong>Impact</strong></th><th><strong>Severity</strong></th><th><strong>Exploited</strong></th></tr></thead><tbody><tr><td>CVE-2025-21376</td><td>Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability</td><td>Remote Code Execution</td><td>Critical</td><td>No</td></tr><tr><td>CVE-2025-21379</td><td>DHCP Client Service Remote Code Execution Vulnerability</td><td>Remote Code Execution</td><td>Critical</td><td>No</td></tr><tr><td>CVE-2025-21381</td><td>Microsoft Excel Remote Code Execution Vulnerability</td><td>Remote Code Execution</td><td>Critical</td><td>No</td></tr><tr><td>CVE-2023-24932</td><td>Secure Boot Security Feature Bypass Vulnerability</td><td>Security Feature Bypass</td><td>Important</td><td>Yes</td></tr><tr><td>CVE-2025-21176</td><td>.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability</td><td>Remote Code Execution</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21178</td><td>Visual Studio Remote Code Execution Vulnerability</td><td>Remote Code Execution</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21172</td><td>.NET and Visual Studio Remote Code Execution Vulnerability</td><td>Remote Code Execution</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21188</td><td>Azure Network Watcher VM Extension Elevation of Privilege Vulnerability</td><td>Elevation of Privilege</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21206</td><td>Visual Studio Installer Elevation of Privilege Vulnerability</td><td>Elevation of Privilege</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21351</td><td>Windows Active Directory Domain Services API Denial of Service Vulnerability</td><td>Denial of Service</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21352</td><td>Internet Connection Sharing (ICS) Denial of Service Vulnerability</td><td>Denial of Service</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21368</td><td>Microsoft Digest Authentication Remote Code Execution Vulnerability</td><td>Remote Code Execution</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21369</td><td>Microsoft Digest Authentication Remote Code Execution Vulnerability</td><td>Remote Code Execution</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21375</td><td>Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability</td><td>Elevation of Privilege</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21383</td><td>Microsoft Excel Information Disclosure Vulnerability</td><td>Information Disclosure</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21182</td><td>Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability</td><td>Elevation of Privilege</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21183</td><td>Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability</td><td>Elevation of Privilege</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21391</td><td>Windows Storage Elevation of Privilege Vulnerability</td><td>Elevation of Privilege</td><td>Important</td><td>Yes</td></tr><tr><td>CVE-2025-21418</td><td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</td><td>Elevation of Privilege</td><td>Important</td><td>Yes</td></tr><tr><td>CVE-2025-21419</td><td>Windows Setup Files Cleanup Elevation of Privilege Vulnerability</td><td>Elevation of Privilege</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21420</td><td>Windows Disk Cleanup Tool Elevation of Privilege Vulnerability</td><td>Elevation of Privilege</td><td>Important</td><td>No</td></tr><tr><td>CVE-2023-32002</td><td>Node.js&nbsp;<code>Module._load()</code>&nbsp;Policy Remote Code Execution Vulnerability</td><td>Remote Code Execution</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-24036</td><td>Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability</td><td>Elevation of Privilege</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-24039</td><td>Visual Studio Code Elevation of Privilege Vulnerability</td><td>Elevation of Privilege</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21259</td><td>Microsoft Outlook Spoofing Vulnerability</td><td>Spoofing</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21194</td><td>Microsoft Surface Security Feature Bypass Vulnerability</td><td>Security Feature Bypass</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21208</td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</td><td>Remote Code Execution</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21406</td><td>Windows Telephony Service Remote Code Execution Vulnerability</td><td>Remote Code Execution</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21407</td><td>Windows Telephony Service Remote Code Execution Vulnerability</td><td>Remote Code Execution</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21410</td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</td><td>Remote Code Execution</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21190</td><td>Windows Telephony Service Remote Code Execution Vulnerability</td><td>Remote Code Execution</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21200</td><td>Windows Telephony Service Remote Code Execution Vulnerability</td><td>Remote Code Execution</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21201</td><td>Windows Telephony Server Remote Code Execution Vulnerability</td><td>Remote Code Execution</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21198</td><td>Microsoft High Performance Compute (HPC) Pack Remote Code Execution Vulnerability</td><td>Remote Code Execution</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21337</td><td>Windows NTFS Elevation of Privilege Vulnerability</td><td>Elevation of Privilege</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21347</td><td>Windows Deployment Services Denial of Service Vulnerability</td><td>Denial of Service</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21349</td><td>Windows Remote Desktop Configuration Service Tampering Vulnerability</td><td>Tampering</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21350</td><td>Windows Kerberos Denial of Service Vulnerability</td><td>Denial of Service</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21358</td><td>Windows Core Messaging Elevation of Privileges Vulnerability</td><td>Elevation of Privilege</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21359</td><td>Windows Kernel Security Feature Bypass Vulnerability</td><td>Security Feature Bypass</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21367</td><td>Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability</td><td>Elevation of Privilege</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21371</td><td>Windows Telephony Service Remote Code Execution Vulnerability</td><td>Remote Code Execution</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21377</td><td>NTLM Hash Disclosure Spoofing Vulnerability</td><td>Spoofing</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21386</td><td>Microsoft Excel Remote Code Execution Vulnerability</td><td>Remote Code Execution</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21387</td><td>Microsoft Excel Remote Code Execution Vulnerability</td><td>Remote Code Execution</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21390</td><td>Microsoft Excel Remote Code Execution Vulnerability</td><td>Remote Code Execution</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21392</td><td>Microsoft Office Remote Code Execution Vulnerability</td><td>Remote Code Execution</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21394</td><td>Microsoft Excel Remote Code Execution Vulnerability</td><td>Remote Code Execution</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21397</td><td>Microsoft Office Remote Code Execution Vulnerability</td><td>Remote Code Execution</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21400</td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability</td><td>Remote Code Execution</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21179</td><td>DHCP Client Service Denial of Service Vulnerability</td><td>Denial of Service</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21181</td><td>Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability</td><td>Denial of Service</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21184</td><td>Windows Core Messaging Elevation of Privileges Vulnerability</td><td>Elevation of Privilege</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21212</td><td>Internet Connection Sharing (ICS) Denial of Service Vulnerability</td><td>Denial of Service</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21216</td><td>Internet Connection Sharing (ICS) Denial of Service Vulnerability</td><td>Denial of Service</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21254</td><td>Internet Connection Sharing (ICS) Denial of Service Vulnerability</td><td>Denial of Service</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21322</td><td>Microsoft PC Manager Elevation of Privilege Vulnerability</td><td>Elevation of Privilege</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21414</td><td>Windows Core Messaging Elevation of Privileges Vulnerability</td><td>Elevation of Privilege</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-21373</td><td>Windows Installer Elevation of Privilege Vulnerability</td><td>Elevation of Privilege</td><td>Important</td><td>No</td></tr><tr><td>CVE-2025-24042</td><td>Visual Studio Code JS Debug Extension Elevation of Privilege Vulnerability</td><td>Elevation of Privilege</td><td>Important</td><td>No</td></tr></tbody></table></figure>



<p>With two vulnerabilities actively exploited, delaying updates could leave systems vulnerable to threats.</p>



<p>Microsoft stresses the need to install the latest servicing stack updates (ADV990001) for smooth patch deployment.</p>



<p><strong>How to Update:</strong></p>



<ul class="wp-block-list">
<li><strong>Windows Update:</strong> Go to Settings &gt; Update &amp; Security &gt; Windows Update.</li>



<li><strong>Microsoft Update Catalog:</strong> Download individual patches for offline installation.</li>



<li><strong>WSUS:</strong> For enterprise environments.</li>
</ul>



<p>The <strong>February 2025 Patch Tuesday</strong> highlights the growing complexity of cybersecurity threats. IT teams must act quickly to deploy these critical patches and stay vigilant against phishing and other exploits targeting unpatched systems.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-patch-tuesday-3/">Microsoft Patch Tuesday (Feb 2025): 61 Vulnerabilities, 25 RCE, 3 Zero-Day</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/microsoft-patch-tuesday-3/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>1-Click RCE Flaw in Voyager PHP Lets Attackers Run Arbitrary Code</title>
		<link>https://firsthackersnews.com/1-click-rce-flaw/</link>
					<comments>https://firsthackersnews.com/1-click-rce-flaw/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 05 Feb 2025 03:38:18 +0000</pubDate>
				<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[RCE Flaw]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[1-Click RCE Flaw]]></category>
		<category><![CDATA[arbitrary code execution]]></category>
		<category><![CDATA[php]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=9558</guid>

					<description><![CDATA[<p>A newly found flaw in Voyager PHP, a Laravel management tool, risks RCE on affected servers. Discovered via</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/1-click-rce-flaw/">1-Click RCE Flaw in Voyager PHP Lets Attackers Run Arbitrary Code</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A newly found flaw in Voyager PHP, a Laravel management tool, risks RCE on affected servers. Discovered via SonarQube Cloud scans, it lets authenticated users execute code by clicking a crafted link. No patch is available yet.</p>



<h2 class="wp-block-heading"><strong>1-Click RCE Flaw </strong></h2>



<p>The flaw in Voyager comes from an arbitrary file write issue in its media upload function. The app checks MIME types against a predefined list, but this check is flawed. </p>



<p>Attackers can exploit this by creating polyglot files, like disguising a PHP script as an image or video. Since file extensions aren&#8217;t properly verified, the malicious file could be uploaded, allowing arbitrary PHP code execution on the server.</p>



<p>The vulnerability is worsened by a reflected XSS flaw. Attackers can trick authenticated users into clicking a malicious link on the /admin/compass endpoint, executing arbitrary JavaScript and increasing the risk of server compromise.</p>



<p>These vulnerabilities pose significant risks, especially for applications using the popular Voyager package, which has over 11,000 stars on GitHub. While the threat is lower for users with the proper permissions, the potential for unauthorized code execution is high, especially in compromised admin contexts. </p>



<p>Despite outreach attempts, Voyager has not provided a fix, leaving version 1.8.0 unpatched. Users should carefully assess the risks before using it in production. The discovery of these flaws emphasizes the need for vigilance. </p>



<p>Organizations are advised to audit Voyager usage, enforce strict permissions, and consider alternatives until patches are released. Regular monitoring and proactive security measures are essential.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/1-click-rce-flaw/">1-Click RCE Flaw in Voyager PHP Lets Attackers Run Arbitrary Code</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/1-click-rce-flaw/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Android Update Fixes Linux Kernel RCE Flaw</title>
		<link>https://firsthackersnews.com/linux-kernel/</link>
					<comments>https://firsthackersnews.com/linux-kernel/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 04 Feb 2025 17:26:00 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[Android malware]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[RCE Flaw]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[android security]]></category>
		<category><![CDATA[Android updates]]></category>
		<category><![CDATA[linux kernel]]></category>
		<category><![CDATA[rce]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=9552</guid>

					<description><![CDATA[<p>On February 3, 2025, Google released the February Android Security Bulletin, fixing 47 vulnerabilities. One major flaw, CVE-2024-53104,</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/linux-kernel/">Android Update Fixes Linux Kernel RCE Flaw</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>On February 3, 2025, Google released the February Android Security Bulletin, fixing 47 vulnerabilities. One major flaw, CVE-2024-53104, in the Linux kernel’s UVC driver, could let attackers execute remote code and gain unauthorized access.</p>



<h2 class="wp-block-heading"><strong>All about the vulnerability</strong></h2>



<p>The vulnerability originates from improper handling of UVC_VS_UNDEFINED frames in the UVC driver’s <code>uvc_parse_format</code> function, leading to buffer size miscalculations and out-of-bounds memory writes. </p>



<p>Attackers can exploit this flaw by inserting malicious USB devices or manipulating video streams, causing buffer overflows that overwrite adjacent memory regions. This can enable local privilege escalation without requiring additional execution privileges.</p>



<p>While the flaw is not directly exploitable remotely, attackers can use USB device spoofing to bypass security measures, making it a serious risk to system integrity. Google has reported signs of limited, targeted exploitation, highlighting the urgency of applying security patches.</p>



<h2 class="wp-block-heading"><strong>Affected Kernel Versions</strong></h2>



<p>The vulnerability impacts all Linux kernel versions from 2.6.26 to the latest patched releases. Users should update their devices to security patch levels 2025-02-01 or 2025-02-05 to protect against this and other vulnerabilities.</p>



<h3 class="wp-block-heading">Fixed Kernel Versions</h3>



<ul class="wp-block-list">
<li><strong>4.19.324 (LTS)</strong> – 95edf13a48e7</li>



<li><strong>5.4.286 (LTS)</strong> – 684022f81f12</li>



<li><strong>5.10.230 (LTS)</strong> – faff5bbb2762</li>



<li><strong>5.15.172 (LTS)</strong> – 467d84dc78c9</li>



<li><strong>6.1.117</strong> – beced2cb09b5</li>



<li><strong>6.6.61</strong> – 575a562f7a3e</li>



<li><strong>6.11.8</strong> – 622ad10aae5f</li>



<li><strong>6.12.1</strong> – 1ee9d9122801</li>



<li><strong>6.13-rc1</strong> – ecf2b43018da</li>
</ul>



<p>The update also fixes vulnerabilities in Qualcomm components and third-party drivers, stressing the need for timely security updates. Given the severity of CVE-2024-53104, Android users should apply the latest patches immediately to prevent potential exploits.</p>



<p>The Android Security Bulletin highlights the importance of staying vigilant against threats that could lead to unauthorized access and device compromise. Users should follow their device manufacturer’s instructions to apply updates as soon as possible.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/linux-kernel/">Android Update Fixes Linux Kernel RCE Flaw</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/linux-kernel/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Android Security Update Fixes Critical RCE Vulnerabilities</title>
		<link>https://firsthackersnews.com/android/</link>
					<comments>https://firsthackersnews.com/android/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 07 Jan 2025 17:16:45 +0000</pubDate>
				<category><![CDATA[Android malware]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[RCE Flaw]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[Android Security Update]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=9373</guid>

					<description><![CDATA[<p>The January 2025 Android Security Bulletin highlights critical vulnerabilities affecting Android devices. Users should update to security patch</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/android/">Android Security Update Fixes Critical RCE Vulnerabilities</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><span style="font-size: revert; color: initial;">The January 2025 Android Security Bulletin highlights critical vulnerabilities affecting Android devices. Users should update to security patch level 2025-01-05 or later to stay protected.</span><span class="" data-state="closed"><span class="flex h-[30px] w-[30px] items-center justify-center"><path fill-rule="evenodd" clip-rule="evenodd" d="M11 4.9099C11 4.47485 10.4828 4.24734 10.1621 4.54132L6.67572 7.7372C6.49129 7.90626 6.25019 8.00005 6 8.00005H4C3.44772 8.00005 3 8.44776 3 9.00005V15C3 15.5523 3.44772 16 4 16H6C6.25019 16 6.49129 16.0938 6.67572 16.2629L10.1621 19.4588C10.4828 19.7527 11 19.5252 11 19.0902V4.9099ZM8.81069 3.06701C10.4142 1.59714 13 2.73463 13 4.9099V19.0902C13 21.2655 10.4142 22.403 8.81069 20.9331L5.61102 18H4C2.34315 18 1 16.6569 1 15V9.00005C1 7.34319 2.34315 6.00005 4 6.00005H5.61102L8.81069 3.06701ZM20.3166 6.35665C20.8019 6.09313 21.409 6.27296 21.6725 6.75833C22.5191 8.3176 22.9996 10.1042 22.9996 12.0001C22.9996 13.8507 22.5418 15.5974 21.7323 17.1302C21.4744 17.6185 20.8695 17.8054 20.3811 17.5475C19.8927 17.2896 19.7059 16.6846 19.9638 16.1962C20.6249 14.9444 20.9996 13.5175 20.9996 12.0001C20.9996 10.4458 20.6064 8.98627 19.9149 7.71262C19.6514 7.22726 19.8312 6.62017 20.3166 6.35665ZM15.7994 7.90049C16.241 7.5688 16.8679 7.65789 17.1995 8.09947C18.0156 9.18593 18.4996 10.5379 18.4996 12.0001C18.4996 13.3127 18.1094 14.5372 17.4385 15.5604C17.1357 16.0222 16.5158 16.1511 16.0539 15.8483C15.5921 15.5455 15.4632 14.9255 15.766 14.4637C16.2298 13.7564 16.4996 12.9113 16.4996 12.0001C16.4996 10.9859 16.1653 10.0526 15.6004 9.30063C15.2687 8.85905 15.3578 8.23218 15.7994 7.90049Z" fill="currentColor"></path><path fill-rule="evenodd" clip-rule="evenodd" d="M7 5C7 3.34315 8.34315 2 10 2H19C20.6569 2 22 3.34315 22 5V14C22 15.6569 20.6569 17 19 17H17V19C17 20.6569 15.6569 22 14 22H5C3.34315 22 2 20.6569 2 19V10C2 8.34315 3.34315 7 5 7H7V5ZM9 7H14C15.6569 7 17 8.34315 17 10V15H19C19.5523 15 20 14.5523 20 14V5C20 4.44772 19.5523 4 19 4H10C9.44772 4 9 4.44772 9 5V7ZM5 9C4.44772 9 4 9.44772 4 10V19C4 19.5523 4.44772 20 5 20H14C14.5523 20 15 19.5523 15 19V10C15 9.44772 14.5523 9 14 9H5Z" fill="currentColor"></path><path fill-rule="evenodd" clip-rule="evenodd" d="M12.1318 2.50389C12.3321 2.15338 12.7235 1.95768 13.124 2.00775L13.5778 2.06447C16.0449 2.37286 17.636 4.83353 16.9048 7.20993L16.354 8.99999H17.0722C19.7097 8.99999 21.6253 11.5079 20.9313 14.0525L19.5677 19.0525C19.0931 20.7927 17.5124 22 15.7086 22H6C4.34315 22 3 20.6568 3 19V12C3 10.3431 4.34315 8.99999 6 8.99999H8C8.25952 8.99999 8.49914 8.86094 8.6279 8.63561L12.1318 2.50389ZM10 20H15.7086C16.6105 20 17.4008 19.3964 17.6381 18.5262L19.0018 13.5262C19.3488 12.2539 18.391 11 17.0722 11H15C14.6827 11 14.3841 10.8494 14.1956 10.5941C14.0071 10.3388 13.9509 10.0092 14.0442 9.70591L14.9932 6.62175C15.3384 5.49984 14.6484 4.34036 13.5319 4.08468L10.3644 9.62789C10.0522 10.1742 9.56691 10.5859 9 10.8098V19C9 19.5523 9.44772 20 10 20ZM7 11V19C7 19.3506 7.06015 19.6872 7.17071 20H6C5.44772 20 5 19.5523 5 19V12C5 11.4477 5.44772 11 6 11H7Z" fill="currentColor"></path><path fill-rule="evenodd" clip-rule="evenodd" d="M11.8727 21.4961C11.6725 21.8466 11.2811 22.0423 10.8805 21.9922L10.4267 21.9355C7.95958 21.6271 6.36855 19.1665 7.09975 16.7901L7.65054 15H6.93226C4.29476 15 2.37923 12.4921 3.0732 9.94753L4.43684 4.94753C4.91145 3.20728 6.49209 2 8.29589 2H18.0045C19.6614 2 21.0045 3.34315 21.0045 5V12C21.0045 13.6569 19.6614 15 18.0045 15H16.0045C15.745 15 15.5054 15.1391 15.3766 15.3644L11.8727 21.4961ZM14.0045 4H8.29589C7.39399 4 6.60367 4.60364 6.36637 5.47376L5.00273 10.4738C4.65574 11.746 5.61351 13 6.93226 13H9.00451C9.32185 13 9.62036 13.1506 9.8089 13.4059C9.99743 13.6612 10.0536 13.9908 9.96028 14.2941L9.01131 17.3782C8.6661 18.5002 9.35608 19.6596 10.4726 19.9153L13.6401 14.3721C13.9523 13.8258 14.4376 13.4141 15.0045 13.1902V5C15.0045 4.44772 14.5568 4 14.0045 4ZM17.0045 13V5C17.0045 4.64937 16.9444 4.31278 16.8338 4H18.0045C18.5568 4 19.0045 4.44772 19.0045 5V12C19.0045 12.5523 18.5568 13 18.0045 13H17.0045Z" fill="currentColor"></path></span></span><span class="hidden"></span><span class="" data-state="closed"><path d="M3.06957 10.8763C3.62331 6.43564 7.40967 3 12 3C14.2824 3 16.4028 3.85067 18.0118 5.25439V4C18.0118 3.44772 18.4595 3 19.0118 3C19.5641 3 20.0118 3.44772 20.0118 4V8C20.0118 8.55228 19.5641 9 19.0118 9H15C14.4477 9 14 8.55228 14 8C14 7.44772 14.4477 7 15 7H16.9571C15.6757 5.76379 13.9101 5 12 5C8.43108 5 5.48466 7.67174 5.0542 11.1237C4.98586 11.6718 4.48619 12.0607 3.93815 11.9923C3.39011 11.924 3.00123 11.4243 3.06957 10.8763ZM20.0618 12.0077C20.6099 12.076 20.9988 12.5757 20.9304 13.1237C20.3767 17.5644 16.5903 21 12 21C9.72322 21 7.60762 20.1535 5.99999 18.7559V20C5.99999 20.5523 5.55228 21 4.99999 21C4.44771 21 3.99999 20.5523 3.99999 20V16C3.99999 15.4477 4.44771 15 4.99999 15H8.99999C9.55228 15 9.99999 15.4477 9.99999 16C9.99999 16.5523 9.55228 17 8.99999 17H7.04285C8.32433 18.2362 10.0899 19 12 19C15.5689 19 18.5153 16.3283 18.9458 12.8763C19.0141 12.3282 19.5138 11.9393 20.0618 12.0077Z" fill="currentColor"></path><span class="overflow-hidden text-clip whitespace-nowrap text-sm"></span></span></p>



<h2 class="wp-block-heading"><strong>Critical RCE Vulnerabilities</strong></h2>



<p>The bulletin highlights critical Remote Code Execution (RCE) vulnerabilities in the Android System component. These flaws could allow attackers to run malicious code without extra privileges, posing significant risks if security mitigations are bypassed.</p>



<p>Android partners were notified a month before the bulletin&#8217;s release. Patches will be added to the Android Open Source Project (AOSP) repository within 48 hours, with updated links to follow.</p>



<p>The following critical vulnerabilities are grouped by component, listed with their CVE IDs, severity, and affected AOSP versions.</p>



<figure class="wp-block-table"><table><thead><tr><td><strong>CVE ID</strong></td><td><strong>Type</strong></td><td><strong>Severity</strong></td><td><strong>Updated AOSP Versions</strong></td></tr></thead><tbody><tr><td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43096" target="_blank" rel="noreferrer noopener">CVE-2024-43096</a></td><td>RCE</td><td>Critical</td><td>12, 12L, 13, 14, 15</td></tr><tr><td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43770" target="_blank" rel="noreferrer noopener">CVE-2024-43770</a></td><td>RCE</td><td>Critical</td><td>12, 12L, 13, 14, 15</td></tr><tr><td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43771" target="_blank" rel="noreferrer noopener">CVE-2024-43771</a></td><td>RCE</td><td>Critical</td><td>12, 12L, 13, 14, 15</td></tr><tr><td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49747" target="_blank" rel="noreferrer noopener">CVE-2024-49747</a></td><td>RCE</td><td>Critical</td><td>12, 12L, 13, 14, 15</td></tr><tr><td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49748" target="_blank" rel="noreferrer noopener">CVE-2024-49748</a></td><td>RCE</td><td>Critical</td><td>12, 12L, 13, 14, 15</td></tr></tbody></table></figure>



<p>The Android security platform, combined with Google Play Protect, offers essential safeguards to minimize the risk of exploiting these vulnerabilities. These measures work together to protect devices from potential threats and harmful applications.</p>



<p>Users are strongly encouraged to stay proactive by regularly updating their devices to the latest Android version. Updates not only patch known vulnerabilities but also enhance overall system security, reducing the risk of exploitation.</p>



<p>Google Play Protect, enabled by default on devices with Google Mobile Services, is a critical line of defense. It scans apps in real-time, identifies potentially harmful applications, and removes threats to keep users safe.</p>



<p>By ensuring devices are up-to-date with the latest security patches, Android users can significantly enhance their mobile security and enjoy a safer, more reliable experience. Regular updates are not just a recommendation—they&#8217;re a necessity in today’s evolving threat landscape.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/android/">Android Security Update Fixes Critical RCE Vulnerabilities</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/android/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Node.js systeminformation Package Enables RCE Attacks</title>
		<link>https://firsthackersnews.com/cve-2024-56334/</link>
					<comments>https://firsthackersnews.com/cve-2024-56334/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 24 Dec 2024 18:35:42 +0000</pubDate>
				<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[RCE Flaw]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[command injection]]></category>
		<category><![CDATA[Node.js]]></category>
		<category><![CDATA[RCE attacks]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=9314</guid>

					<description><![CDATA[<p>A critical command injection vulnerability in the systeminformation npm package, CVE-2024-56334, exposes millions of systems to RCE and</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cve-2024-56334/">Node.js systeminformation Package Enables RCE Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A critical command injection vulnerability in the systeminformation npm package, CVE-2024-56334, exposes millions of systems to RCE and privilege escalation attacks.</p>



<p>The flaw affects versions ≤5.23.6 and lies in the <code>getWindowsIEEE8021x</code> function, where insufficient sanitization of the Wi-Fi SSID field allows attackers to execute malicious OS commands via Windows’ cmd.exe.</p>



<p>This highlights the need for secure coding practices when handling untrusted input.</p>



<h2 class="wp-block-heading"><strong>All about the vulnerability</strong></h2>



<p>GitHub reports reveal the flaw in how SSIDs are processed.</p>



<p>The SSID is retrieved via <code>netsh wlan show interface</code> and passed to <code>cmd.exe</code> without sanitization.</p>



<p>This lets attackers use malicious SSID names to execute commands on the victim&#8217;s system.</p>



<p><strong>Proof of Concept (PoC)</strong></p>



<ol class="wp-block-list">
<li><strong>Craft a Malicious SSID</strong>: An attacker sets a hotspot SSID with a command injection payload, e.g.:
<ul class="wp-block-list">
<li><code>a" | ping /t 127.0.0.1 &amp;</code></li>



<li><code>a" | %SystemDrive%\a\a.exe &amp;</code></li>
</ul>
</li>



<li><strong>Connect to the Network</strong>: The victim connects to the malicious SSID on a vulnerable system.</li>



<li><strong>Execute the Exploit</strong>: The attacker uses the vulnerable function in the package:javascriptCopy code<code>const si = require('systeminformation'); si.networkInterfaces((net) =&gt; { console.log(net) });</code></li>
</ol>



<p>This allows the attacker to run arbitrary commands, such as executing files or creating a continuous ping loop.</p>



<p>The vulnerability is critical, allowing RCE or privilege escalation based on how the systeminformation package is used.</p>



<p>Attackers can exploit it by injecting malicious commands via crafted Wi-Fi SSIDs, enabling unauthorized access, data theft, or disruption.</p>



<p>With a CVSS score of 10.0, it severely impacts confidentiality, integrity, and availability. Developers must patch their systems immediately.</p>



<p>Security researcher @xAiluros reported the issue and provided a proof of concept. The package author, sebhildebrandt, quickly released a patched version, urging users to update promptly.</p>



<p><strong>Affected and Patched Versions</strong></p>



<figure class="wp-block-table"><table><thead><tr><th><strong>Version Status</strong></th><th><strong>Version</strong></th><th><strong>Details</strong></th></tr></thead><tbody><tr><td>Affected Versions</td><td>≤ 5.23.6</td><td>Vulnerable to the command injection flaw.</td></tr><tr><td>Patched Version</td><td>5.23.7</td><td>Vulnerability fixed with proper sanitization.</td></tr></tbody></table></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cve-2024-56334/">Node.js systeminformation Package Enables RCE Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cve-2024-56334/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Critical Qlik Sense RCE vulnerability discovered</title>
		<link>https://firsthackersnews.com/qlik-sense/</link>
					<comments>https://firsthackersnews.com/qlik-sense/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 09 Dec 2024 18:05:58 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[RCE Flaw]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Qlik sense]]></category>
		<category><![CDATA[rce vulnerability]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=9204</guid>

					<description><![CDATA[<p>A critical vulnerability in Qlik Sense for Windows may allow remote code execution. It affects all versions up</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/qlik-sense/">Critical Qlik Sense RCE vulnerability discovered</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A critical vulnerability in Qlik Sense for Windows may allow remote code execution. It affects all versions up to the May 2024 Patch 9 release.</p>



<p>The &#8220;High&#8221; severity vulnerability in Qlik Sense for Windows includes two issues:</p>



<ul class="wp-block-list">
<li><strong>Remote Code Execution (RCE)</strong>: Unprivileged users could create connection objects to run arbitrary EXE files on the server.</li>



<li><strong>Broken Access Control (BAC)</strong>: Unprivileged users with network access may execute remote commands, risking availability, integrity, and confidentiality.</li>
</ul>



<p>The vulnerabilities have CVSS scores of 8.8 and 7.5, indicating high risk. If exploited, they could compromise the server running Qlik Sense, including remote code execution.</p>



<p>The vulnerability affects all versions of Qlik Sense Enterprise for Windows before and including:</p>



<ul class="wp-block-list">
<li>May 2024 Patch 9</li>



<li>February 2024 Patch 13</li>



<li>November 2023 Patch 15</li>



<li>August 2023 Patch 15</li>



<li>May 2023 Patch 17</li>



<li>February 2023 Patch 14</li>
</ul>



<p>Qlik has released patches for these vulnerabilities. Users should update to the latest patched versions, including:</p>



<ul class="wp-block-list">
<li>November 2024 Initial Release</li>



<li>May 2024 Patch 10</li>



<li>February 2024 Patch 14</li>



<li>November 2023 Patch 16</li>



<li>August 2023 Patch 16</li>



<li>May 2023 Patch 18</li>



<li>February 2023 Patch 15</li>
</ul>



<p>A workaround is available for extension and visualization issues by modifying the Repository.exe.config file and restarting specific services.</p>



<p>Although no exploitation has been reported, organizations are advised to act quickly to secure their systems and data. Regular patching and following security best practices is essential to protect against cyber threats.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/qlik-sense/">Critical Qlik Sense RCE vulnerability discovered</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/qlik-sense/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CVE-2024-30052: RCE vulnerability in Visual Studio via dump files</title>
		<link>https://firsthackersnews.com/cve-2024-30052/</link>
					<comments>https://firsthackersnews.com/cve-2024-30052/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 07 Oct 2024 16:45:13 +0000</pubDate>
				<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[RCE Flaw]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[CVE-2024-30052]]></category>
		<category><![CDATA[rce vulnerability]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[visual studio]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=8856</guid>

					<description><![CDATA[<p>A researcher identified a method to exploit Visual Studio by executing arbitrary code during the debugging of managed</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cve-2024-30052/">CVE-2024-30052: RCE vulnerability in Visual Studio via dump files</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A researcher identified a method to exploit Visual Studio by executing arbitrary code during the debugging of managed dump files, without needing memory corruption or specific PDB file components. By analyzing libraries used in these sessions, they uncovered vulnerabilities that could be exploited, emphasizing the need to address security flaws in debugging tools to prevent potential attacks.</p>



<h2 class="wp-block-heading"><strong>CVE-2024-30052</strong></h2>



<p>Microsoft introduced the Portable PDB format for managed modules, replacing the traditional MSF for better cross-platform support and optimization.</p>



<p>Embedded PDBs, generated with the -debug switch, store compressed PDB data within the executable, allowing debugging of older versions or dump files without external PDBs.</p>



<p>Source files can be embedded into PDBs using methods like EmbedAllSources or -embed, making debugging easier by storing source information in the executable. However, Visual Studio trusts these embedded files, which creates a risk. </p>



<p>If a malicious file with a certain extension is embedded, Visual Studio could open it with an external program. This allows attackers to execute arbitrary code during debugging, highlighting the need to validate and sanitize embedded files to prevent such attacks.</p>



<p>The researcher developed a proof-of-concept to exploit a flaw in Visual Studio&#8217;s handling of embedded source files in portable PDBs. By replacing a legitimate source file with a PDF and altering the PDB structure, they tricked Visual Studio into opening the PDF as a source file during a memory dump debug. This showed how attackers could run arbitrary code or access sensitive information.</p>



<p>Three file types (CHM, HTA, and PY) were found to be risky, with CHM files, often used for help files, potentially containing embedded Visual Basic code for execution.</p>



<p>HTA and PY files can execute VB and Python code, respectively, and can be modified with non-printable characters to inject malicious code.</p>



<p>The researcher automated the creation of exploit dumps using a C# program, triggering calc.exe when debugged in Visual Studio due to an ACE vulnerability.</p>



<p>A new check in Visual Studio’s CVsUIShellOpenDocument function now prevents this exploitation by blocking embedded sources during debugging.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cve-2024-30052/">CVE-2024-30052: RCE vulnerability in Visual Studio via dump files</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cve-2024-30052/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Arc Browser Launches Bug Bounty Program After RCE Vulnerability</title>
		<link>https://firsthackersnews.com/arc-browser/</link>
					<comments>https://firsthackersnews.com/arc-browser/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 03 Oct 2024 19:19:54 +0000</pubDate>
				<category><![CDATA[RCE Flaw]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Arc Browser]]></category>
		<category><![CDATA[Bug Bounty Program]]></category>
		<category><![CDATA[rce]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=8844</guid>

					<description><![CDATA[<p>The Browser Company has launched a Bug Bounty Program for its Arc Browser after quickly resolving a remote</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/arc-browser/">Arc Browser Launches Bug Bounty Program After RCE Vulnerability</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><span style="font-size: revert; color: initial;">The Browser Company has launched a Bug Bounty Program for its Arc Browser after quickly resolving a remote code execution (RCE) vulnerability, as announced by CEO Josh, highlighting their commitment to transparency and security.</span></p>



<p>CVE-2024-45489 was reported on August 25 and patched within 24 hours, with no users affected. The incident led to a thorough review of the company&#8217;s security practices. CEO Josh stated, “This was an important moment for us and our members,” emphasizing their commitment to improving security and incident response.</p>



<h2 class="wp-block-heading"><strong>Arc Browser Launches Bug Bounty Program </strong></h2>



<p>The Arc Browser Company has launched the Arc Bug Bounty Program to engage the security research community in finding vulnerabilities. The program offers details on rewards and submission guidelines, and it will adapt based on feedback from participants.</p>



<p>In response to CVE-2024-45489, The Browser Company has implemented several security enhancements:</p>



<ul class="wp-block-list">
<li><strong>JavaScript Boosts:</strong> Automatic enabling of JavaScript boosts across synced devices is no longer allowed in Arc version 1.61.2.</li>



<li><strong>Global Toggle:</strong> A new global toggle is added in Advanced Settings to disable all Boost-related features.</li>



<li><strong>External Audit:</strong> An external firm has been engaged to review backend systems, starting with access-control lists (ACLs).</li>



<li><strong>Internal Processes:</strong> The company is improving its internal processes to identify vulnerabilities earlier, emphasizing secure-by-design principles and defense-in-depth coding practices.</li>
</ul>



<p>The company has improved its incident response processes for better communication and quicker response times. A new Security Bulletin will serve as the official source for all security incident reports, including technical details and impact assessments.</p>



<p><span class="" data-state="closed"><span class="flex h-[30px] w-[30px] items-center justify-center"><path fill-rule="evenodd" clip-rule="evenodd" d="M12.1318 2.50389C12.3321 2.15338 12.7235 1.95768 13.124 2.00775L13.5778 2.06447C16.0449 2.37286 17.636 4.83353 16.9048 7.20993L16.354 8.99999H17.0722C19.7097 8.99999 21.6253 11.5079 20.9313 14.0525L19.5677 19.0525C19.0931 20.7927 17.5124 22 15.7086 22H6C4.34315 22 3 20.6568 3 19V12C3 10.3431 4.34315 8.99999 6 8.99999H8C8.25952 8.99999 8.49914 8.86094 8.6279 8.63561L12.1318 2.50389ZM10 20H15.7086C16.6105 20 17.4008 19.3964 17.6381 18.5262L19.0018 13.5262C19.3488 12.2539 18.391 11 17.0722 11H15C14.6827 11 14.3841 10.8494 14.1956 10.5941C14.0071 10.3388 13.9509 10.0092 14.0442 9.70591L14.9932 6.62175C15.3384 5.49984 14.6484 4.34036 13.5319 4.08468L10.3644 9.62789C10.0522 10.1742 9.56691 10.5859 9 10.8098V19C9 19.5523 9.44772 20 10 20ZM7 11V19C7 19.3506 7.06015 19.6872 7.17071 20H6C5.44772 20 5 19.5523 5 19V12C5 11.4477 5.44772 11 6 11H7Z" fill="currentColor"></path><path fill-rule="evenodd" clip-rule="evenodd" d="M11.8727 21.4961C11.6725 21.8466 11.2811 22.0423 10.8805 21.9922L10.4267 21.9355C7.95958 21.6271 6.36855 19.1665 7.09975 16.7901L7.65054 15H6.93226C4.29476 15 2.37923 12.4921 3.0732 9.94753L4.43684 4.94753C4.91145 3.20728 6.49209 2 8.29589 2H18.0045C19.6614 2 21.0045 3.34315 21.0045 5V12C21.0045 13.6569 19.6614 15 18.0045 15H16.0045C15.745 15 15.5054 15.1391 15.3766 15.3644L11.8727 21.4961ZM14.0045 4H8.29589C7.39399 4 6.60367 4.60364 6.36637 5.47376L5.00273 10.4738C4.65574 11.746 5.61351 13 6.93226 13H9.00451C9.32185 13 9.62036 13.1506 9.8089 13.4059C9.99743 13.6612 10.0536 13.9908 9.96028 14.2941L9.01131 17.3782C8.6661 18.5002 9.35608 19.6596 10.4726 19.9153L13.6401 14.3721C13.9523 13.8258 14.4376 13.4141 15.0045 13.1902V5C15.0045 4.44772 14.5568 4 14.0045 4ZM17.0045 13V5C17.0045 4.64937 16.9444 4.31278 16.8338 4H18.0045C18.5568 4 19.0045 4.44772 19.0045 5V12C19.0045 12.5523 18.5568 13 18.0045 13H17.0045Z" fill="currentColor"></path></span></span><div class="mb-2 flex gap-3 empty:hidden -ml-2"><div class="items-center justify-start rounded-xl p-1 flex"><div class="flex items-center"><span class="hidden"></span></div></div></div><span class="" data-state="closed"><path d="M3.06957 10.8763C3.62331 6.43564 7.40967 3 12 3C14.2824 3 16.4028 3.85067 18.0118 5.25439V4C18.0118 3.44772 18.4595 3 19.0118 3C19.5641 3 20.0118 3.44772 20.0118 4V8C20.0118 8.55228 19.5641 9 19.0118 9H15C14.4477 9 14 8.55228 14 8C14 7.44772 14.4477 7 15 7H16.9571C15.6757 5.76379 13.9101 5 12 5C8.43108 5 5.48466 7.67174 5.0542 11.1237C4.98586 11.6718 4.48619 12.0607 3.93815 11.9923C3.39011 11.924 3.00123 11.4243 3.06957 10.8763ZM20.0618 12.0077C20.6099 12.076 20.9988 12.5757 20.9304 13.1237C20.3767 17.5644 16.5903 21 12 21C9.72322 21 7.60762 20.1535 5.99999 18.7559V20C5.99999 20.5523 5.55228 21 4.99999 21C4.44771 21 3.99999 20.5523 3.99999 20V16C3.99999 15.4477 4.44771 15 4.99999 15H8.99999C9.55228 15 9.99999 15.4477 9.99999 16C9.99999 16.5523 9.55228 17 8.99999 17H7.04285C8.32433 18.2362 10.0899 19 12 19C15.5689 19 18.5153 16.3283 18.9458 12.8763C19.0141 12.3282 19.5138 11.9393 20.0618 12.0077Z" fill="currentColor"></path><span class="overflow-hidden text-clip whitespace-nowrap text-sm"></span></span></p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/arc-browser/">Arc Browser Launches Bug Bounty Program After RCE Vulnerability</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/arc-browser/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
