Contact: contact@cyberthreat.zip
SharpADUserIP (Recon)
SharpChrome (Password theft)
StickyNotesExtract (Data theft)
Tailscale VPN (Tunneling)
CloudSorcerer/OneDriveDoor (Cloud C2)
VtChatter (VirusTotal C2)
LocalPlugX (Lateral movement)
Various backdoors (Linux/Windows)
SharpADUserIP (Recon)
SharpChrome (Password theft)
StickyNotesExtract (Data theft)
Tailscale VPN (Tunneling)
CloudSorcerer/OneDriveDoor (Cloud C2)
VtChatter (VirusTotal C2)
LocalPlugX (Lateral movement)
Various backdoors (Linux/Windows)
CVE-2025-11001: Critical vulnerability in 7-Zip! A malicious ZIP file can allow remote code execution on your computer. Simply opening the file is enough.
❕ Users are advised to update to 7-Zip version 25.00 or later.
CVE-2025-11001: Critical vulnerability in 7-Zip! A malicious ZIP file can allow remote code execution on your computer. Simply opening the file is enough.
❕ Users are advised to update to 7-Zip version 25.00 or later.
CVE-2025-10680: High-severity flaw enabling authenticated VPN servers to execute OS commands on clients.
Scope: OpenVPN Client (Linux, macOS)
Requirement: --dns-updown enabled
CVE-2025-10680: High-severity flaw enabling authenticated VPN servers to execute OS commands on clients.
Scope: OpenVPN Client (Linux, macOS)
Requirement: --dns-updown enabled
CVE-2024-55591: (CVSS score: 9.6) is an authentication bypass vulnerability in FortiOS and FortiProxy. It allows attackers to gain super admin privileges through specially crafted Node.js websocket requests.
CVE-2024-55591: (CVSS score: 9.6) is an authentication bypass vulnerability in FortiOS and FortiProxy. It allows attackers to gain super admin privileges through specially crafted Node.js websocket requests.
At CyberThreat.zip, we’re here to ensure your growth and security in 2025. 🛡️💻
Wishing everyone a happy, healthy, and safe New Year! 🎄🎆
#CyberThreatZip #HappyNewYear2025
At CyberThreat.zip, we’re here to ensure your growth and security in 2025. 🛡️💻
Wishing everyone a happy, healthy, and safe New Year! 🎄🎆
#CyberThreatZip #HappyNewYear2025
CVE-2024-11477: CVE-2024-11477: An integer underflow vulnerability in 7-Zip’s Zstandard decompression function (CVSS 7.8) allows attackers to execute malicious code.
❕ Users are advised to update to 7-Zip version 24.07 or later.
CVE-2024-11477: CVE-2024-11477: An integer underflow vulnerability in 7-Zip’s Zstandard decompression function (CVSS 7.8) allows attackers to execute malicious code.
❕ Users are advised to update to 7-Zip version 24.07 or later.
CVE-2024-9474: A privilege escalation vulnerability affecting authorized users.
CVE-2024-9474: A privilege escalation vulnerability affecting authorized users.
CVE-2024-0012: An authentication bypass vulnerability in PAN-OS allows attackers to gain administrator privileges.
CVE-2024-0012: An authentication bypass vulnerability in PAN-OS allows attackers to gain administrator privileges.
Over 35 IIS servers compromised using BadIIS malware and ASPXspy, exploiting web app vulnerabilities for SEO fraud.
Over 35 IIS servers compromised using BadIIS malware and ASPXspy, exploiting web app vulnerabilities for SEO fraud.
❕Systems are not affected if IPv6 is disabled on the target machine.
CVE-2024-38063: Microsoft released an urgent update for a critical vulnerability. It allows remote code execution via specially crafted IPv6 packets. All Windows and Windows Server versions are affected.
❕Systems are not affected if IPv6 is disabled on the target machine.
CVE-2024-38063: Microsoft released an urgent update for a critical vulnerability. It allows remote code execution via specially crafted IPv6 packets. All Windows and Windows Server versions are affected.
CVE-2024-38063: Microsoft released an urgent update for a critical vulnerability. It allows remote code execution via specially crafted IPv6 packets. All Windows and Windows Server versions are affected.
Our Telegram channel, where we make all announcements about cyber threats and security vulnerabilities, has been opened.
t.me/cyberthreatzip
Our Telegram channel, where we make all announcements about cyber threats and security vulnerabilities, has been opened.
t.me/cyberthreatzip
CVE-2024-36401: GeoServer versions before 2.24.4, 2.25.2, and 2.23.6 have a critical RCE vulnerability (CVSS 9.8). Users should upgrade to the latest versions to mitigate the threat.
CVE-2024-36401: GeoServer versions before 2.24.4, 2.25.2, and 2.23.6 have a critical RCE vulnerability (CVSS 9.8). Users should upgrade to the latest versions to mitigate the threat.
CVE-2024-37085: VMware ESXi Vulnerability
On July 29, Microsoft announced that ransomware groups were exploiting a vulnerability identified as CVE-2024-37085.
CVE-2024-37085: VMware ESXi Vulnerability
On July 29, Microsoft announced that ransomware groups were exploiting a vulnerability identified as CVE-2024-37085.
CVE-2024-21007: Weblogic Server Remote Code Execution(RCE)
Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0
CVE-2024-21007: Weblogic Server Remote Code Execution(RCE)
Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0
CVE-2024-37032: Ollama Remote Code Execution(RCE) vulnerability.
Exploitation involved overwriting /etc/ld.so.preload to load a malicious shared library, escalating from arbitrary file write to remote code execution.
CVE-2024-37032: Ollama Remote Code Execution(RCE) vulnerability.
Exploitation involved overwriting /etc/ld.so.preload to load a malicious shared library, escalating from arbitrary file write to remote code execution.
CVE-2024-5655: GitLab security updates fixing 14 vulnerabilities.
GitLab Critical Patch Release: 17.1.1, 17.0.3, 16.11.5
CVE-2024-5655: GitLab security updates fixing 14 vulnerabilities.
GitLab Critical Patch Release: 17.1.1, 17.0.3, 16.11.5
CVE-2024-6387: OpenSSH's server (sshd), allows unauthenticated remote code execution (RCE) as root on glibc-based Linux systems.
CVE-2024-6387: OpenSSH's server (sshd), allows unauthenticated remote code execution (RCE) as root on glibc-based Linux systems.