Vulnerabilities Archives - Information Security /uit/infosec/category/vulnerabilities/ Fri, 24 Apr 2026 14:17:09 +0000 en-CA hourly 1 https://wordpress.org/?v=6.9.4 ASP.NET Core Privilege Escalation Vulnerability (CVE-2026-40372) /uit/infosec/2026/04/24/asp-net-core-privilege-escalation-vulnerability-cve-2026-40372/ Fri, 24 Apr 2026 14:17:06 +0000 /uit/infosec/?p=2694 A recently disclosed vulnerability (CVE-2026-40372) affects a Windows-based application and may allow unauthenticated remote attackers to escalate privileges. Severity level  CVSS Score: 9.1/Critical. Description:-  CVE‑2026‑40372 is a critical security vulnerability that arises from improper control of file names or file paths within a Windows-based application. The affected component processes user-supplied file path inputs without adequately […]

The post ASP.NET Core Privilege Escalation Vulnerability (CVE-2026-40372) appeared first on Information Security.

]]>
A recently disclosed vulnerability (CVE-2026-40372) affects a Windows-based application and may allow unauthenticated remote attackers to escalate privileges.

Severity level 

CVSS Score: 9.1/Critical.

Description:-  CVE‑2026‑40372 is a critical security vulnerability that arises from improper control of file names or file paths within a Windows-based application. The affected component processes user-supplied file path inputs without adequately validating or restricting them. Due to this insufficient validation, an unauthenticated remote attacker can supply specially crafted path inputs to manipulate underlying file system operations. This may allow file access or modification outside the intended directory scope, ultimately enabling the attacker to perform actions with elevated privileges.

Affected VersionsÌý:-Ìý Ìý

Microsoft AspNetCore.DataProtection Package versions (10.0.0 – 10.0.6)

Impact:-

Successful exploitation may allow attacker to Escalate privileges on the affected system.

Resolution:-

Upgrade the affected package to:

  • Microsoft.AspNetCore.DataProtection version 10.0.7.

Rebuild and redeploy affected applications.

Rotate Data Protection keys and invalidate existing sessions/tokens to remove forged credentials.

Mitigations:-

  • Restrict external/network access to affected applications.
  • Identify applications with direct or transitive dependencies on vulnerable Data Protection packages.
  • Monitor application and authentication logs for anomalous behaviour.

Reference:-

UIT Information Security

The post ASP.NET Core Privilege Escalation Vulnerability (CVE-2026-40372) appeared first on Information Security.

]]>
Adobe Acrobat security vulnerability (CVE-2026-34621) /uit/infosec/2026/04/24/adobe-acrobat-security-vulnerability-cve-2026-34621/ Fri, 24 Apr 2026 14:11:28 +0000 /uit/infosec/?p=2692 A recently disclosed high‑severity vulnerability in Adobe Acrobat and Acrobat Reader (°ä³Õ·¡â€‘2026‑34621) allows attackers to execute arbitrary code on affected systems by tricking users into opening a specially crafted PDF file. Severity level  CVSS Score: 8.6/High. Description:-  Adobe Acrobat and Acrobat Reader contain an improperly controlled modification of object prototype attributes (Prototype Pollution) vulnerability. The […]

The post Adobe Acrobat security vulnerability (CVE-2026-34621) appeared first on Information Security.

]]>
A recently disclosed high‑severity vulnerability in Adobe Acrobat and Acrobat Reader (°ä³Õ·¡â€‘2026‑34621) allows attackers to execute arbitrary code on affected systems by tricking users into opening a specially crafted PDF file.

Severity level 

CVSS Score: 8.6/High.

Description:-  Adobe Acrobat and Acrobat Reader contain an improperly controlled modification of object prototype attributes (Prototype Pollution) vulnerability. The flaw exists in the handling of JavaScript objects within PDF documents.

In vulnerable versions, opening a maliciously crafted PDF allows an attacker to manipulate JavaScript object prototypes and invoke privileged APIs. This can result in arbitrary code execution in the context of the current user.

Affected VersionsÌý:-Ìý Ìý

  • Acrobat DC: 26.001.21367 and earlier.
  • Acrobat Reader DC: 26.001.21367 and earlier.
  • Acrobat 2024: 24.001.30356 and earlier.
  • Platforms: Windows and macOS.

Impact:-

Successful exploitation may result in arbitrary code execution on the affected system.

Resolution:-

Adobe strongly recommends immediately upgrading to the latest patched versions:

Acrobat DC / Acrobat Reader DC: 26.001.21411 or later.

Acrobat 2024: Windows: 24.001.30362 or later and macOS: 24.001.30360 or later.

Reference:-

UIT Information Security

The post Adobe Acrobat security vulnerability (CVE-2026-34621) appeared first on Information Security.

]]>
Ninja Forms WordPress Plugin Vulnerability (CVE-2026-0740) /uit/infosec/2026/04/14/ninja-forms-wordpress-plugin-vulnerability-cve-2026-0740/ Tue, 14 Apr 2026 14:23:53 +0000 /uit/infosec/?p=2668 A recently disclosed critical vulnerability in the Ninja Forms – File Uploads plugin for WordPress (CVE‑2026‑0740) allows unauthenticated remote attackers to upload arbitrary files, potentially leading to remote code execution and full site compromise. Severity level:- CVSS Score: 9.8/Critical. Description:-  The Ninja Forms – File Uploads plugin for WordPress fails to properly validate uploaded file […]

The post Ninja Forms WordPress Plugin Vulnerability (CVE-2026-0740) appeared first on Information Security.

]]>
A recently disclosed critical vulnerability in the Ninja Forms – File Uploads plugin for WordPress (CVE‑2026‑0740) allows unauthenticated remote attackers to upload arbitrary files, potentially leading to remote code execution and full site compromise.

Severity level:-

CVSS Score: 9.8/Critical.

Description:-  The Ninja Forms – File Uploads plugin for WordPress fails to properly validate uploaded file types in the NF_FU_AJAX_Controllers_Uploads::handle_upload function. In vulnerable versions, this flaw allows unauthenticated attackers to upload arbitrary files, including malicious PHP scripts. Due to insufficient filename sanitization, attackers may also leverage path traversal techniques to place files in sensitive directories, such as the web root. Successful exploitation can result in remote code execution, web shell deployment, and complete takeover of the affected WordPress site.

Affected VersionsÌý:-Ìý Ìý

All versions up to and including 3.3.26.

Impact:-

Successful exploitation may result in Remote code execution on the server.

Resolution:-

Upgrade immediately to Ninja Forms – File Uploads plugin version 3.3.27 or later.

Reference:-

UIT Information Security

The post Ninja Forms WordPress Plugin Vulnerability (CVE-2026-0740) appeared first on Information Security.

]]>
Zoom Workplace for Windows Vulnerability (CVE-2026-30903) /uit/infosec/2026/04/14/zoom-workplace-for-windows-vulnerability-cve-2026-30903/ Tue, 14 Apr 2026 14:20:53 +0000 /uit/infosec/?p=2665 A recently disclosed vulnerability in Zoom Workplace for Windows ( CVE‑2026‑30903) allows unauthenticated remote attackers to escalate privileges by exploiting improper control of file names or paths. Severity level:- CVSS Score: 9.6/Critical Description:-  Zoom Workplace for Windows includes a Mail feature that processes user-supplied file references. In vulnerable versions, this component fails to properly validate […]

The post Zoom Workplace for Windows Vulnerability (CVE-2026-30903) appeared first on Information Security.

]]>
A recently disclosed vulnerability in Zoom Workplace for Windows ( CVE‑2026‑30903) allows unauthenticated remote attackers to escalate privileges by exploiting improper control of file names or paths.

Severity level:-

CVSS Score: 9.6/Critical

Description:-  Zoom Workplace for Windows includes a Mail feature that processes user-supplied file references. In vulnerable versions, this component fails to properly validate file paths, enabling attackers to manipulate file system operations. This flaw allows an unauthenticated remote attacker to manipulate file system operations by supplying crafted path inputs. As a result, the attacker may escalate privileges on the affected system, gaining unauthorized access or control.

Affected Versions :-   

ÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýZoom Workplace for Windows before version 6.6.0.

Impact:-

Successful exploitation potentially allows attackers to Escalate privileges on the target systems.

Resolution:-

Upgrade to Zoom Workplace for Windows version 6.6.0 or later immediately.

Reference:-

UIT Information Security

The post Zoom Workplace for Windows Vulnerability (CVE-2026-30903) appeared first on Information Security.

]]>
Apple Memory Corruption Vulnerability (CVE‑2026‑20700) /uit/infosec/2026/04/13/cve-2026-20700-apple-memory-corruption-vulnerability/ Mon, 13 Apr 2026 18:00:51 +0000 /uit/infosec/?p=2663 A newly disclosed Apple zero‑day vulnerability (CVE‑2026‑20700) allows attackers with memory‑write capabilities to execute arbitrary code on affected devices. Severity level:- CVSS Score: 7.8/high Description:-  CVE‑2026‑20700 is a memory corruption vulnerability affecting Apple’s dyld (Dynamic Link Editor) component. Dyld is responsible for loading dynamic libraries and linking application code within Apple operating systems. Improper state […]

The post Apple Memory Corruption Vulnerability (CVE‑2026‑20700) appeared first on Information Security.

]]>
A newly disclosed Apple zero‑day vulnerability (CVE‑2026‑20700) allows attackers with memory‑write capabilities to execute arbitrary code on affected devices.

Severity level:-

CVSS Score: 7.8/high

Description:-  CVE‑2026‑20700 is a memory corruption vulnerability affecting Apple’s dyld (Dynamic Link Editor) component. Dyld is responsible for loading dynamic libraries and linking application code within Apple operating systems. Improper state management and insufficient memory‑safety controls can allow an attacker with memory write capability to achieve arbitrary code execution.

Affected Versions :-   

  • iOS â€“ versions prior to 26.3
  • iPadOS â€“ versions prior to 26.3
  • iOS â€“ versions prior to 18.7.5
  • iPadOS â€“ versions prior to 18.7.5
  • macOS Tahoe â€“ versions prior to 26.3
  • macOS Sequoia â€“ versions prior to 15.7.4
  • macOS Sonoma â€“ versions prior to 14.8.4
  • tvOS â€“ versions prior to 26.3
  • watchOS â€“ versions prior to 26.3
  • visionOS â€“ versions prior to 26.3

Impact:-

Successful exploitation may allow attackers to execute arbitrary code at the OS level.

Resolution:-

Update to the following patched OS versions or later:-

  • iOS 26.3 / iPadOS 26.3
  • macOS Tahoe 26.3
  • tvOS 26.3
  • watchOS 26.3
  • visionOS 26.3
  • iOS / iPadOS 18.7.5
  • macOS Sequoia 15.7.4
  • macOS Sonoma 14.8.4

Reference:-

UIT Information Security

The post Apple Memory Corruption Vulnerability (CVE‑2026‑20700) appeared first on Information Security.

]]>
Ingress‑NGINX Configuration Injection Vulnerability (CVE-2026-24512) /uit/infosec/2026/04/13/ingress-nginx-configuration-injection-vulnerability-cve-2026-24512/ Mon, 13 Apr 2026 17:53:41 +0000 /uit/infosec/?p=2661 A recently discovered vulnerability in the Kubernetes ingress-nginx controller (CVE‑2026‑24512) allows attackers to execute arbitrary code by exploiting improper sanitization of user‑supplied ingress path data. Severity level:- CVSS Score: 8.8/high Description:-  Ingress‑NGINX is a widely used open‑source Kubernetes ingress controller responsible for managing inbound traffic to cluster services. A vulnerability exists in ingress‑nginx where the […]

The post Ingress‑NGINX Configuration Injection Vulnerability (CVE-2026-24512) appeared first on Information Security.

]]>
A recently discovered vulnerability in the Kubernetes ingress-nginx controller (CVE‑2026‑24512) allows attackers to execute arbitrary code by exploiting improper sanitization of user‑supplied ingress path data.

Severity level:-

CVSS Score: 8.8/high

Description:-  Ingress‑NGINX is a widely used open‑source Kubernetes ingress controller responsible for managing inbound traffic to cluster services. A vulnerability exists in ingress‑nginx where the rules.http.paths.path field fails to properly validate user‑defined input. This flaw allows attackers to inject rogue NGINX configuration directives, enabling arbitrary code execution within the ingress‑nginx controller container.

Affected Versions :-   

ÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýÌýAll ingress-nginx versions prior to v1.13.7 and prior v1.14.3 are affected.

Impact:-

Successful exploitation allows attackers to execute arbitrary code inside the ingress-nginx controller.

Resolution:-

Upgrade to the version 1.13.7, 1.14.3 or later immediately.

Mitigation:-

Deploy a validating admission controller that rejects Ingress resources using the ImplementationSpecific path type, blocking the attack vector.

Reference:-

UIT Information Security

The post Ingress‑NGINX Configuration Injection Vulnerability (CVE-2026-24512) appeared first on Information Security.

]]>
Notepad ++ Vulnerability (CVE-2025-15556) /uit/infosec/2026/02/06/notepad-vulnerability-cve-2025-15556/ Fri, 06 Feb 2026 16:53:58 +0000 /uit/infosec/?p=2584 A recently discovered Notepad++ vulnerability (CVE‑2025‑15556) allows attackers to execute arbitrary code by exploiting insecure update integrity verification. Severity level  CVSS Score: 7.7/high Description:- ÌýNotepad++ is a free and open-source source code editor. A vulnerability exists in Notepad++ versions prior to 8.8.9 involving the WinGUp updater, which fails to cryptographically verify downloaded update metadata and […]

The post Notepad ++ Vulnerability (CVE-2025-15556) appeared first on Information Security.

]]>
A recently discovered Notepad++ vulnerability (CVE‑2025‑15556) allows attackers to execute arbitrary code by exploiting insecure update integrity verification.

Severity level 

CVSS Score: 7.7/high

Description:- ÌýNotepad++ is a free and open-source source code editor. A vulnerability exists in Notepad++ versions prior to 8.8.9 involving the WinGUp updater, which fails to cryptographically verify downloaded update metadata and installer files. An attacker who can intercept or redirect update traffic may fraudulently supply a malicious installer that the updater will download and run. This can result in arbitrary code execution with the privileges of the user, potentially compromising the system. An attacker could use social engineering or clickjacking to trick users into downloading both the legitimate installer and a malicious executable to the same directory.Ìý

Affected VersionsÌý:-Ìý Ìý

  • All versions prior to 8.8.9.

Impact:-

Successful exploitation enables attackers to execute arbitrary code potentially leading to compromise of affected systems.

Resolution:-

Update to the version 8.8.9 or later.

Reference:-

UIT Information Security

The post Notepad ++ Vulnerability (CVE-2025-15556) appeared first on Information Security.

]]>
GNU InetUtils telnetd authentication bypass (CVE-2026-24061) /uit/infosec/2026/02/06/gnu-inetutils-telnetd-authentication-bypass-cve-2026-24061/ Fri, 06 Feb 2026 16:48:46 +0000 /uit/infosec/?p=2581 A critical remote authentication bypass vulnerability (CVE-2026-24061) has been disclosed in the GNU InetUtils telnetd server, affecting versions 1.9.3 through 2.7. Severity level  CVSS Score: 9.8/Critical. Description:- CVE-2026-24061 is an argument injection / authentication-bypass vulnerability in the telnetd component of GNU InetUtils. During Telnet NEW-ENVIRON negotiation, telnetd passes the attacker-controlled USER environment variable directly to […]

The post GNU InetUtils telnetd authentication bypass (CVE-2026-24061) appeared first on Information Security.

]]>

A critical remote authentication bypass vulnerability (CVE-2026-24061) has been disclosed in the GNU InetUtils telnetd server, affecting versions 1.9.3 through 2.7.

Severity level 

CVSS Score: 9.8/Critical.

Description:- CVE-2026-24061 is an argument injection / authentication-bypass vulnerability in the telnetd component of GNU InetUtils. During Telnet NEW-ENVIRON negotiation, telnetd passes the attacker-controlled USER environment variable directly to the system login program without sanitization. If USER is set to -f root, login treats the session as pre‑authenticated, yielding an unauthenticated root shell. The flaw impacts GNU InetUtils 1.9.3 through 2.7 and is fixed in 2.8.

Affected VersionsÌý:-Ìý Ìý

  • GNU InetUtils package 1.9.3 – 2.7.

Impact:-

Successful exploitation allows unauthenticated remote attackers to bypass login and obtain root-level command execution on the affected host.

Resolution:-

Please Upgrade GNU InetUtils to version 2.8 or later.

Mitigation:-

  • If you cannot upgrade immediately.
  • Disable the telnetd service.
  • Restrict access to Telnet to trusted management networks only.

Reference:-

UIT Information Security

The post GNU InetUtils telnetd authentication bypass (CVE-2026-24061) appeared first on Information Security.

]]>
CVE-2025-14847 - MongoBleed - Vulnerability Affecting MongoDB /uit/infosec/2026/02/06/cve-2025-14847-mongobleed-vulnerability-affecting-mongodb/ Fri, 06 Feb 2026 16:44:24 +0000 /uit/infosec/?p=2579 Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client.  Severity level  CVSS Score: 8.7/High Description:-ÌýCVE-2025-14847, known as MongoBleed, is a heap-memory disclosure vulnerability in MongoDB Server. It arises in the server’s zlib compression handling logic, specifically in how it parses compressed network messages. By […]

The post CVE-2025-14847 - MongoBleed - Vulnerability Affecting MongoDB appeared first on Information Security.

]]>
Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. 

Severity level 

CVSS Score: 8.7/High

Description:-ÌýCVE-2025-14847, known as MongoBleed, is a heap-memory disclosure vulnerability in MongoDB Server. It arises in the server’s zlib compression handling logic, specifically in how it parses compressed network messages. By sending specially crafted messages with inconsistent length fields, an attacker can cause MongoDB to return uninitialized heap memory, potentially exposing sensitive in-memory data, without any authentication.

Affected VersionsÌý:-Ìý

  • 8.2.x < 8.2.3.
  • 8.0.x < 8.0.17.
  • 7.0.x < 7.0.28.
  • 6.0.x < 6.0.27.
  • 5.0.x < 5.0.32.
  • 4.4.x < 4.4.30.
  • All 4.2.x, 4.0.x.
  • 3.6.x versions.

Impact:- MongoDB can handle sensitive information such as PII, authentication credentials, tokens, keys, and operational metadata. Memory leaks may expose authentication tokens and secrets, database session data, and PII. Even a read-only leak can enable credential compromise, leading to data theft or full system takeover.

Resolution:-

  • Patch immediately to: 8.2.3, 8.0.17, 7.0.28, 6.0.27, 5.0.32, 4.4.30, or newer.
  • If patching is delayed: Disable zlib compression using networkMessageCompressors without zlib, and restrict network access to trusted IPs only.
  • Enable verbose JSON logging to track connection metadata and parsing errors.
  • Scan logs for bursty connections with missing metadata from suspicious IPs.
  • If exploitation is suspected, contact infosec@yorku.ca, rotate secrets such as tokens, keys, and credentials that may have been leaked.Ìý

Reference:

UIT - Information Security

The post CVE-2025-14847 - MongoBleed - Vulnerability Affecting MongoDB appeared first on Information Security.

]]>
PowerShell Remote Code Execution (CVE-2025-54100) /uit/infosec/2026/02/06/powershell-remote-code-execution-cve-2025-54100/ Fri, 06 Feb 2026 16:37:01 +0000 /uit/infosec/?p=2577 Microsoft has released security updates to address a vulnerability in Windows PowerShell (CVE-2025-54100) that could allow local users to execute arbitrary code when using the Invoke-WebRequest cmdlet. Severity level  CVSS Score: 7.8/high Description:- CVE-2025-54100 is a command injection vulnerability in Windows PowerShell, specifically affecting the Invoke-WebRequest cmdlet. The flaw occurs because PowerShell automatically parses HTML […]

The post PowerShell Remote Code Execution (CVE-2025-54100) appeared first on Information Security.

]]>
Microsoft has released security updates to address a vulnerability in Windows PowerShell (CVE-2025-54100) that could allow local users to execute arbitrary code when using the Invoke-WebRequest cmdlet.

Severity level 

CVSS Score: 7.8/high

Description:- CVE-2025-54100 is a command injection vulnerability in Windows PowerShell, specifically affecting the Invoke-WebRequest cmdlet. The flaw occurs because PowerShell automatically parses HTML content using the MSHTML engine, which can inadvertently execute embedded scripts during parsing. This behavior allows attackers to craft malicious web content that, when processed by Invoke-WebRequest, could lead to unintended script execution. Exploitation requires local access and user interaction, such as running a script that invokes Invoke-WebRequest on a malicious URL.

Affected Versions :-   All systems using Windows PowerShell 5.1 on vulnerable Windows versions.

  • Windows 10.
  • Windows 11.
  • Windows Server (2008 through 2025 editions).

Impact:-

Successful exploitation of this vulnerability may allow attackers to execute arbitrary code on the affected system.

After applying the patch, users will receive a security warning prompt before parsing any web content that could execute scripts.

Resolution:-

Please apply the latest Security updates released by Microsoft.

Reference:-

UIT Information Security

The post PowerShell Remote Code Execution (CVE-2025-54100) appeared first on Information Security.

]]>