<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Alexander V. Leonov</title>
	<atom:link href="https://avleonov.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://avleonov.com</link>
	<description>Vulnerability Management and more</description>
	<lastBuildDate>Tue, 03 Mar 2026 11:57:30 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://avleonov.com/wp-content/uploads/2017/11/cropped-avl-32x32.png</url>
	<title>Alexander V. Leonov</title>
	<link>https://avleonov.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>About Remote Code Execution &#8211; Microsoft Word (CVE-2026-21514) vulnerability</title>
		<link>https://avleonov.com/2026/03/03/1635-about-remote-code-execution-microsoft-word-cve-2/</link>
					<comments>https://avleonov.com/2026/03/03/1635-about-remote-code-execution-microsoft-word-cve-2/#respond</comments>
		
		<dc:creator><![CDATA[Alexander Leonov]]></dc:creator>
		<pubDate>Mon, 02 Mar 2026 22:04:57 +0000</pubDate>
				<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Office]]></category>
		<category><![CDATA[OLE]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://avleonov.com/2026/03/03/1635-about-remote-code-execution-microsoft-word-cve-2/</guid>

					<description><![CDATA[About Remote Code Execution &#8211; Microsoft Word (CVE-2026-21514) vulnerability. This vulnerability is from February Microsoft Patch Tuesday. Reliance on Untrusted Inputs in a Security Decision (CWE-807) in Microsoft Office Word allows an unauthenticated attacker to bypass OLE security features when opening a malicious file. The vulnerability is NOT exploitable via the Preview Pane. 👾 Microsoft [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><center><a href="https://avleonov.com/wp-content/uploads/2026/03/photo_902@03-03-2026_01-04-57.jpg"><img decoding="async" fetchpriority="high" class="aligncenter wp-image-65 " src="https://avleonov.com/wp-content/uploads/2026/03/photo_902@03-03-2026_01-04-57.jpg" alt="About Remote Code Execution - Microsoft Word (CVE-2026-21514) vulnerability"width="425" height="425"/></a></center></p>
<p>
<b>About Remote Code Execution &#8211; Microsoft Word (CVE-2026-21514) vulnerability.</b> This vulnerability is from <a href="https://avleonov.com/2026/02/11/1631-february-microsoft-patch-tuesday/">February Microsoft Patch Tuesday</a>. Reliance on Untrusted Inputs in a Security Decision (<a href="https://cwe.mitre.org/data/definitions/807.html">CWE-807</a>) in Microsoft Office Word allows an unauthenticated attacker to bypass OLE security features when opening a malicious file. The vulnerability is NOT exploitable via the Preview Pane.</p>
<p>👾 Microsoft reports that the vulnerability is being exploited in the wild. It has been listed in CISA KEV <a href="https://www.cisa.gov/news-events/alerts/2026/02/10/cisa-adds-six-known-exploited-vulnerabilities-catalog">since February 10</a>.</p>
<p>💬 Microsoft has classified the vulnerability as a <b>Security Feature Bypass</b>, but given that exploiting such vulnerabilities can lead to arbitrary code execution, it seems reasonable to classify it as <b>Remote Code Execution,</b> similar to the actively exploited <a href="https://avleonov.com/2026/01/27/1629-about-remote-code-execution---microsoft-office-cve/">CVE-2026-21509</a>.</p>
<p>🛠 No public exploits are available yet.</p>
<p><a href="https://t.me/avleonovrus/3048">На русском</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://avleonov.com/2026/03/03/1635-about-remote-code-execution-microsoft-word-cve-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>February Linux Patch Wednesday</title>
		<link>https://avleonov.com/2026/02/20/1634-february-linux-patch-wednesday/</link>
					<comments>https://avleonov.com/2026/02/20/1634-february-linux-patch-wednesday/#respond</comments>
		
		<dc:creator><![CDATA[Alexander Leonov]]></dc:creator>
		<pubDate>Fri, 20 Feb 2026 16:20:27 +0000</pubDate>
				<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Vulristics]]></category>
		<category><![CDATA[Chromium]]></category>
		<category><![CDATA[DiskCache]]></category>
		<category><![CDATA[Grafana]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[LinuxPatchWednesday]]></category>
		<category><![CDATA[MMonit]]></category>
		<category><![CDATA[MongoBleed]]></category>
		<category><![CDATA[MongoDB]]></category>
		<category><![CDATA[OpenSSL]]></category>
		<category><![CDATA[pgAdmin]]></category>
		<category><![CDATA[ProxmoxVE]]></category>
		<category><![CDATA[PyTorch]]></category>
		<category><![CDATA[Roundcube]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Wheel]]></category>
		<guid isPermaLink="false">https://avleonov.com/2026/02/20/1634-february-linux-patch-wednesday/</guid>

					<description><![CDATA[February Linux Patch Wednesday. In February, Linux vendors addressed 632 vulnerabilities &#8211; 1.5× fewer than in January, including 305 in the Linux Kernel. Two vulnerabilities show signs of in-the-wild exploitation: 🔻 RCE &#8211; Chromium (CVE-2026-2441)🔻 InfDisc &#8211; MongoDB &#8220;MongoBleed&#8221; (CVE-2025-14847) Public exploits are available or suspected for 56 more vulnerabilities. Notable ones include: 🔸 RCE [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><center><a href="https://avleonov.com/wp-content/uploads/2026/02/photo_901@20-02-2026_19-20-27.jpg"><img decoding="async" fetchpriority="high" class="aligncenter wp-image-65 " src="https://avleonov.com/wp-content/uploads/2026/02/photo_901@20-02-2026_19-20-27.jpg" alt="February Linux Patch Wednesday"width="425" height="425"/></a></center></p>
<p>
<b>February </b><b><a href="https://github.com/leonov-av/linux-patch-wednesday">Linux Patch Wednesday</a></b><b>. </b>In February, Linux vendors addressed 632 vulnerabilities &#8211; 1.5× fewer than <a href="https://avleonov.com/2026/01/25/1626-january-linux-patch-wednesday/">in January</a>, including 305 in the Linux Kernel. Two vulnerabilities show signs of in-the-wild exploitation:</p>
<p><b>🔻 RCE </b>&#8211; Chromium (CVE-2026-2441)<br />🔻 <b>InfDisc</b> &#8211; MongoDB &#8220;MongoBleed&#8221; (<a href="https://avleonov.com/2026/01/19/1622-about-information-disclosure---mongodb-mongobleed/">CVE-2025-14847</a>)</p>
<p>Public exploits are available or suspected for 56 more vulnerabilities. Notable ones include:</p>
<p>🔸 <b>RCE</b> &#8211; OpenSSL (CVE-2025-15467, CVE-2025-69421, CVE-2025-11187), pgAdmin (CVE-2025-12762, CVE-2025-13780), DiskCache (CVE-2025-69872), PyTorch (CVE-2026-24747), Wheel (CVE-2026-24049)<br />🔸 <b>AuthBypass</b> &#8211; M/Monit (CVE-2020-36968)<br />🔸 <b>EoP</b> &#8211; Grafana (CVE-2025-41115, CVE-2026-21721), M/Monit (CVE-2020-36969)<br />🔸 <b>AFR</b> &#8211; Proxmox Virtual Environment (CVE-2024-21545)<br />🔸 <b>SFB</b> &#8211; Chromium (CVE-2026-1504), Roundcube (CVE-2026-25916)</p>
<p>🗒 <a href="https://avleonov.com/vulristics_reports/linux_patch_wednesday_february2026_report_with_comments_ext_img.html">Full Vulristics report</a></p>
<p><a href="https://t.me/avleonovrus/3014">На русском</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://avleonov.com/2026/02/20/1634-february-linux-patch-wednesday/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>February &#8220;In the Trend of VM&#8221; (#24): vulnerabilities in Microsoft products</title>
		<link>https://avleonov.com/2026/02/13/1632-february-in-the-trend-of-vm-24-vulnerabilities-in/</link>
					<comments>https://avleonov.com/2026/02/13/1632-february-in-the-trend-of-vm-24-vulnerabilities-in/#respond</comments>
		
		<dc:creator><![CDATA[Alexander Leonov]]></dc:creator>
		<pubDate>Thu, 12 Feb 2026 22:19:42 +0000</pubDate>
				<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[ALPC]]></category>
		<category><![CDATA[ASLR]]></category>
		<category><![CDATA[DWM]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Office]]></category>
		<category><![CDATA[OLE]]></category>
		<category><![CDATA[PositiveTechnologies]]></category>
		<category><![CDATA[TrendVulns]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://avleonov.com/2026/02/13/1632-february-in-the-trend-of-vm-24-vulnerabilities-in/</guid>

					<description><![CDATA[February &#8220;In the Trend of VM&#8221; (#24): vulnerabilities in Microsoft products. A traditional monthly roundup of trending vulnerabilities. This time, compact and all-Microsoft. 🗞 Post on Habr (rus)🗒 Digest on the PT website (rus) In total, two vulnerabilities: 🔻 RCE &#8211; Microsoft Office (CVE-2026-21509)🔻 InfDisc &#8211; Desktop Window Manager (CVE-2026-20805) 🟥 Trending Vulnerabilities Portal На [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><center><a href="https://avleonov.com/wp-content/uploads/2026/02/photo_900@13-02-2026_01-19-42.jpg"><img decoding="async" fetchpriority="high" class="aligncenter wp-image-65 " src="https://avleonov.com/wp-content/uploads/2026/02/photo_900@13-02-2026_01-19-42.jpg" alt="February In the Trend of VM (#24): vulnerabilities in Microsoft products"width="425" height="425"/></a></center></p>
<p>
<b>February &#8220;In the Trend of VM&#8221; (#24): vulnerabilities in Microsoft products. </b>A traditional monthly roundup of trending vulnerabilities. This time, compact and all-Microsoft.</p>
<p>🗞 <a href="https://habr.com/ru/companies/pt/articles/995362/">Post on Habr (rus)</a><br />🗒 <a href="https://ptsecurity.com/research/analytics/trending-vulnerability-digest-february-2026/">Digest on the PT website (rus)</a></p>
<p>In total, two vulnerabilities:</p>
<p>🔻 <b>RCE</b> &#8211; Microsoft Office (<a href="https://avleonov.com/2026/01/27/1629-about-remote-code-execution---microsoft-office-cve/">CVE-2026-21509</a>)<br />🔻 <b>InfDisc</b> &#8211; Desktop Window Manager (<a href="https://avleonov.com/2026/01/24/1624-about-information-disclosure---desktop-window-mana/">CVE-2026-20805</a>)</p>
<p>🟥 <a href="https://ptsecurity.com/research/trending-vulnerabilities/?utm_source=tg_leonov&#038;utm_medium=article&#038;utm_campaign=trending">Trending Vulnerabilities Portal</a></p>
<p><a href="https://t.me/avleonovrus/2993">На русском</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://avleonov.com/2026/02/13/1632-february-in-the-trend-of-vm-24-vulnerabilities-in/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>February Microsoft Patch Tuesday</title>
		<link>https://avleonov.com/2026/02/11/1631-february-microsoft-patch-tuesday/</link>
					<comments>https://avleonov.com/2026/02/11/1631-february-microsoft-patch-tuesday/#respond</comments>
		
		<dc:creator><![CDATA[Alexander Leonov]]></dc:creator>
		<pubDate>Wed, 11 Feb 2026 11:08:11 +0000</pubDate>
				<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Vulristics]]></category>
		<category><![CDATA[AFDsys]]></category>
		<category><![CDATA[DWM]]></category>
		<category><![CDATA[libjpeg]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[MSHTML]]></category>
		<category><![CDATA[Notepad]]></category>
		<category><![CDATA[Outlook]]></category>
		<category><![CDATA[PatchTuesday]]></category>
		<category><![CDATA[RACM]]></category>
		<category><![CDATA[RDS]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[WindowsShell]]></category>
		<category><![CDATA[WinKernel]]></category>
		<category><![CDATA[Word]]></category>
		<guid isPermaLink="false">https://avleonov.com/2026/02/11/1631-february-microsoft-patch-tuesday/</guid>

					<description><![CDATA[February Microsoft Patch Tuesday. A total of 55 vulnerabilities, half as many as in January. There are as many as six (❗️) vulnerabilities being exploited in the wild: 🔻 SFB &#8211; Windows Shell (CVE-2026-21510)🔻 SFB/RCE &#8211; Microsoft Word (CVE-2026-21514)🔻 SFB &#8211; MSHTML Framework (CVE-2026-21513)🔻 EoP &#8211; Windows Remote Desktop Services (CVE-2026-21533)🔻 EoP &#8211; Desktop Window [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><center><a href="https://avleonov.com/wp-content/uploads/2026/02/photo_899@11-02-2026_14-08-11.jpg"><img decoding="async" fetchpriority="high" class="aligncenter wp-image-65 " src="https://avleonov.com/wp-content/uploads/2026/02/photo_899@11-02-2026_14-08-11.jpg" alt="February Microsoft Patch Tuesday"width="425" height="425"/></a></center></p>
<p>
<b>February Microsoft Patch Tuesday. </b>A total of 55 vulnerabilities, half as many as <a href="https://avleonov.com/2026/01/13/1620-january-microsoft-patch-tuesday/">in January</a>. There are as many as six (❗️) vulnerabilities being exploited in the wild:</p>
<p>🔻 <b>SFB</b> &#8211; Windows Shell (CVE-2026-21510)<br />🔻 <b>SFB/RCE</b> &#8211; Microsoft Word (<a href="https://avleonov.com/2026/03/03/1635-about-remote-code-execution---microsoft-word-cve-2/">CVE-2026-21514</a>)<br />🔻 <b>SFB</b> &#8211; MSHTML Framework (CVE-2026-21513)<br />🔻 <b>EoP</b> &#8211; Windows Remote Desktop Services (CVE-2026-21533)<br />🔻 <b>EoP</b> &#8211; Desktop Window Manager (CVE-2026-21519)<br />🔻 <b>DoS</b> &#8211; Windows Remote Access Connection Manager (CVE-2026-21525)</p>
<p>There is also one vulnerability with a public exploit:</p>
<p>🔸 <b>DoS</b> &#8211; libjpeg (CVE-2023-2804)</p>
<p>Among the remaining vulnerabilities, the following stand out:</p>
<p>🔹 <b>RCE</b> &#8211; Windows Notepad (CVE-2026-20841)<br />🔹 <b>Spoofing</b> &#8211; Outlook (CVE-2026-21511)<br />🔹 <b>EoP</b> &#8211; Windows Kernel (CVE-2026-21231, CVE-2026-21239, CVE-2026-21245), Windows AFD.sys (CVE-2026-21236, CVE-2026-21238, CVE-2026-21241)</p>
<p>🗒 <a href="https://avleonov.com/vulristics_reports/ms_patch_tuesday_february2026_report_with_comments_ext_img.html">Full Vulristics report</a></p>
<p><a href="https://t.me/avleonovrus/2990">На русском</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://avleonov.com/2026/02/11/1631-february-microsoft-patch-tuesday/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>I released Vulristics 1.0.11: added Server-Side Request Forgery (SSRF) as a distinct vulnerability type</title>
		<link>https://avleonov.com/2026/02/05/1630-i-released-vulristics-1011-added-server-side-reque/</link>
					<comments>https://avleonov.com/2026/02/05/1630-i-released-vulristics-1011-added-server-side-reque/#respond</comments>
		
		<dc:creator><![CDATA[Alexander Leonov]]></dc:creator>
		<pubDate>Thu, 05 Feb 2026 16:58:04 +0000</pubDate>
				<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Vulristics]]></category>
		<category><![CDATA[SSRF]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://avleonov.com/2026/02/05/1630-i-released-vulristics-1011-added-server-side-reque/</guid>

					<description><![CDATA[I released Vulristics 1.0.11: added Server-Side Request Forgery (SSRF) as a distinct vulnerability type. I try to use a very small set of base vulnerability types (around 20) in Vulristics and map everything else to them. With a few exceptions, these are the same types Microsoft uses &#8211; and Microsoft doesn&#8217;t like SSRF.SSRF is a [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><center><a href="https://avleonov.com/wp-content/uploads/2026/02/photo_898@05-02-2026_19-58-04.jpg"><img decoding="async" fetchpriority="high" class="aligncenter wp-image-65 " src="https://avleonov.com/wp-content/uploads/2026/02/photo_898@05-02-2026_19-58-04.jpg" alt="I released Vulristics 1.0.11: added Server-Side Request Forgery (SSRF) as a distinct vulnerability type"width="425" height="425"/></a></center></p>
<p>
<b>I released </b><b><a href="https://github.com/leonov-av/vulristics/commit/1c52298b99b09f7e8bf1cf4ab10bf428572507db">Vulristics 1.0.11</a></b><b>: added Server-Side Request Forgery (SSRF) as a distinct vulnerability type.</b> I try to use a very small set of base vulnerability types (around 20) in Vulristics and map everything else to them. With a few exceptions, these are the same types Microsoft uses &#8211; and Microsoft doesn&#8217;t like SSRF.<br /><b></b><br /><i>SSRF is a vulnerability that allows an attacker to make network requests to arbitrary destinations.</i><b></b></p>
<p>Microsoft usually classifies SSRFs as <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-38109">EoP</a>, <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-32987">Information Disclosure</a>, or <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2021-26855">RCE</a>. 🤯</p>
<p>I used to map SSRF to <b>Command Injection</b>, based on the logic that crafting a request can be considered a form of command execution. But, of course, that&#8217;s&#8230; questionable. 🙄</p>
<p>So I decided to add a dedicated <b>SSRF</b> type (with a severity of 0.87) and stopped doing mental gymnastics. 🙂 For the icon, I drew an <b>anvil</b> (a play on words with &#8220;forge&#8221;). I also uploaded the icon to <a href="avleonov.com">avleonov.com</a> so that Vulristics HTML reports <a href="https://avleonov.com/vulristics_reports/cve-2021-39935_report_with_comments_ext_img.html">render correctly</a>.</p>
<p><a href="https://t.me/avleonovrus/2964">На русском</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://avleonov.com/2026/02/05/1630-i-released-vulristics-1011-added-server-side-reque/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>About Remote Code Execution &#8211; Microsoft Office (CVE-2026-21509) vulnerability</title>
		<link>https://avleonov.com/2026/01/27/1629-about-remote-code-execution-microsoft-office-cve/</link>
					<comments>https://avleonov.com/2026/01/27/1629-about-remote-code-execution-microsoft-office-cve/#respond</comments>
		
		<dc:creator><![CDATA[Alexander Leonov]]></dc:creator>
		<pubDate>Tue, 27 Jan 2026 07:04:08 +0000</pubDate>
				<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Office]]></category>
		<category><![CDATA[OLE]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://avleonov.com/2026/01/27/1629-about-remote-code-execution-microsoft-office-cve/</guid>

					<description><![CDATA[About Remote Code Execution &#8211; Microsoft Office (CVE-2026-21509) vulnerability. The vulnerability was urgently fixed on January 26, outside the regular Microsoft Patch Tuesday. Microsoft classified it as a Security Feature Bypass, but in fact, it is more of a Remote Code Execution. The vulnerability involves bypassing OLE (Object Linking and Embedding) security features in Microsoft [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><center><a href="https://avleonov.com/wp-content/uploads/2026/02/photo_897@27-01-2026_10-04-08.jpg"><img decoding="async" fetchpriority="high" class="aligncenter wp-image-65 " src="https://avleonov.com/wp-content/uploads/2026/02/photo_897@27-01-2026_10-04-08.jpg" alt="About Remote Code Execution - Microsoft Office (CVE-2026-21509) vulnerability"width="425" height="425"/></a></center></p>
<p>
<b>About Remote Code Execution &#8211; Microsoft Office (CVE-2026-21509) vulnerability.</b> The vulnerability was <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509">urgently fixed</a> on January 26, outside the regular Microsoft Patch Tuesday. Microsoft classified it as a Security Feature Bypass, but in fact, it is more of a Remote Code Execution. The vulnerability involves bypassing OLE (<a href="https://ru.wikipedia.org/wiki/Object_Linking_and_Embedding">Object Linking and Embedding</a>) security features in Microsoft 365 and Microsoft Office. It is exploited when opening malicious Office files (Preview Pane is safe).</p>
<p>⚙️ In Office 2021+, protection is enabled automatically via server-side changes after restarting the applications. For Office 2016/2019, updates must be installed or registry changes applied.</p>
<p>👾 Microsoft reports that the vulnerability is being exploited in the wild.</p>
<p>🛠 No public exploits are available yet.</p>
<p><a href="https://t.me/avleonovrus/2945">На русском</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://avleonov.com/2026/01/27/1629-about-remote-code-execution-microsoft-office-cve/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>January &#8220;In the Trend of VM&#8221; (#23): vulnerabilities in Windows, React and MongoDB</title>
		<link>https://avleonov.com/2026/01/26/1627-january-in-the-trend-of-vm-23-vulnerabilities-in-w/</link>
					<comments>https://avleonov.com/2026/01/26/1627-january-in-the-trend-of-vm-23-vulnerabilities-in-w/#respond</comments>
		
		<dc:creator><![CDATA[Alexander Leonov]]></dc:creator>
		<pubDate>Mon, 26 Jan 2026 13:52:28 +0000</pubDate>
				<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Censys]]></category>
		<category><![CDATA[cldflt]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[MongoBleed]]></category>
		<category><![CDATA[MongoDB]]></category>
		<category><![CDATA[PositiveTechnologies]]></category>
		<category><![CDATA[React]]></category>
		<category><![CDATA[React2Shell]]></category>
		<category><![CDATA[RSC]]></category>
		<category><![CDATA[TrendVulns]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Wiz]]></category>
		<guid isPermaLink="false">https://avleonov.com/2026/01/26/1627-january-in-the-trend-of-vm-23-vulnerabilities-in-w/</guid>

					<description><![CDATA[January &#8220;In the Trend of VM&#8221; (#23): vulnerabilities in Windows, React and MongoDB. Traditional monthly roundup of trending vulnerabilities. Launching the 2026 season. 🙂 🗞 Post on Habr (rus)🗒 Digest on the PT website (rus) In total, three vulnerabilities: 🔻 EoP &#8211; Windows Cloud Files Mini Filter Driver (CVE-2025-62221)🔻 RCE &#8211; React Server Components &#8220;React2Shell&#8221; [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><center><a href="https://avleonov.com/wp-content/uploads/2026/02/photo_896@26-01-2026_16-52-28.jpg"><img decoding="async" fetchpriority="high" class="aligncenter wp-image-65 " src="https://avleonov.com/wp-content/uploads/2026/02/photo_896@26-01-2026_16-52-28.jpg" alt="January In the Trend of VM (#23): vulnerabilities in Windows, React and MongoDB"width="425" height="425"/></a></center></p>
<p>
<b>January &#8220;In the Trend of VM&#8221; (#23): vulnerabilities in Windows, React and MongoDB. </b>Traditional monthly roundup of trending vulnerabilities. Launching the 2026 season. 🙂</p>
<p>🗞 <a href="https://habr.com/ru/companies/pt/articles/989202/">Post on Habr (rus)</a><br />🗒 <a href="https://ptsecurity.com/research/analytics/trending-vulnerability-digest-january-2026/">Digest on the PT website (rus)</a></p>
<p>In total, three vulnerabilities:</p>
<p>🔻 EoP &#8211; Windows Cloud Files Mini Filter Driver (<a href="https://avleonov.com/2026/01/19/1621-about-elevation-of-privilege---windows-cloud-files/">CVE-2025-62221</a>)<br />🔻 RCE &#8211; React Server Components &#8220;React2Shell&#8221; (<a href="https://avleonov.com/2025/12/20/1619-about-remote-code-execution---react-server-compone/">CVE-2025-55182</a>)<br />🔻 InfDisc &#8211; MongoDB &#8220;MongoBleed&#8221; (<a href="https://avleonov.com/2026/01/19/1622-about-information-disclosure---mongodb-mongobleed/">CVE-2025-14847</a>)</p>
<p>🟥 <a href="https://ptsecurity.com/research/trending-vulnerabilities/?utm_source=tg_leonov&#038;utm_medium=article&#038;utm_campaign=trending">Trending Vulnerabilities Portal</a></p>
<p><a href="https://t.me/avleonovrus/2942">На русском</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://avleonov.com/2026/01/26/1627-january-in-the-trend-of-vm-23-vulnerabilities-in-w/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>January Linux Patch Wednesday</title>
		<link>https://avleonov.com/2026/01/25/1626-january-linux-patch-wednesday/</link>
					<comments>https://avleonov.com/2026/01/25/1626-january-linux-patch-wednesday/#respond</comments>
		
		<dc:creator><![CDATA[Alexander Leonov]]></dc:creator>
		<pubDate>Sat, 24 Jan 2026 21:19:01 +0000</pubDate>
				<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Vulristics]]></category>
		<category><![CDATA[Chromium]]></category>
		<category><![CDATA[Inetutils]]></category>
		<category><![CDATA[libpng]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[LinuxPatchWednesday]]></category>
		<category><![CDATA[Safari]]></category>
		<category><![CDATA[telnetd]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[webkit]]></category>
		<guid isPermaLink="false">https://avleonov.com/2026/01/25/1626-january-linux-patch-wednesday/</guid>

					<description><![CDATA[January Linux Patch Wednesday. In January, Linux vendors started fixing 918 vulnerabilities, one and a half times more than in December. Of these, 616 are in the Linux Kernel. Three show signs of exploitation in the wild: 🔻 AuthBypass &#8211; GNU Inetutils (telnetd) (CVE-2026-24061)🔻 RCE &#8211; Safari (CVE-2025-43529); fixed in Linux distributions in webkit packages🔻 [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><center><a href="https://avleonov.com/wp-content/uploads/2026/02/photo_895@25-01-2026_00-19-01.jpg"><img decoding="async" fetchpriority="high" class="aligncenter wp-image-65 " src="https://avleonov.com/wp-content/uploads/2026/02/photo_895@25-01-2026_00-19-01.jpg" alt="January Linux Patch Wednesday"width="425" height="425"/></a></center></p>
<p>
<b>January </b><b><a href="https://github.com/leonov-av/linux-patch-wednesday">Linux Patch Wednesday</a></b><b>. </b>In January, Linux vendors started fixing 918 vulnerabilities, one and a half times more than <a href="https://avleonov.com/2025/12/19/1618-december-linux-patch-wednesday/">in December</a>. Of these, 616 are in the Linux Kernel. Three show signs of exploitation in the wild:</p>
<p>🔻 <b>AuthBypass</b> &#8211; GNU Inetutils (telnetd) (<a href="https://avleonov.com/2026/01/24/1623-about-authentication-bypass---gnu-inetutils-cve-20/">CVE-2026-24061</a>)<br />🔻 <b>RCE</b> &#8211; Safari (CVE-2025-43529); <a href="https://security-tracker.debian.org/tracker/CVE-2025-43529">fixed</a> in Linux distributions in webkit packages<br />🔻 <b>MemCor</b> &#8211; Chromium (CVE-2025-14174)</p>
<p>Another 97 vulnerabilities have public exploits or signs of their existence. Key examples:</p>
<p>🔸 <b>MemCor</b> &#8211; libpng (CVE-2026-22695) <br />🔸 <b>XSS</b> &#8211; Roundcube (CVE-2025-68461)<br />🔸 <b>RCE</b> &#8211; expr-eval (CVE-2025-13204)<br />🔸 <b>ComInj</b> &#8211; cpp-httplib (CVE-2026-21428), httparty (CVE-2025-68696), Miniflux (CVE-2026-21885)<br />🔸 <b>SQLi</b> &#8211; parsl (CVE-2026-21892)<br />🔸 <b>SFB</b> &#8211; OWASP CRS (CVE-2026-21876), Authlib (CVE-2025-68158)<br />🔸 <b>AFW</b> &#8211; node-tar (CVE-2026-23745)<br />🔸 <b>PathTrav</b> &#8211; GNU Wget2 (CVE-2025-69194), Tar (CVE-2025-45582)</p>
<p>🗒 <a href="https://avleonov.com/vulristics_reports/linux_patch_wednesday_january2026_report_with_comments_ext_img.html">Full Vulristics Report</a></p>
<p><a href="https://t.me/avleonovrus/2939">На русском</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://avleonov.com/2026/01/25/1626-january-linux-patch-wednesday/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Our PR team awarded me the “The Best Positive Speaker 2025” metal pin for public speaking, articles, and media commentary</title>
		<link>https://avleonov.com/2026/01/24/1625-our-pr-team-awarded-me-the-the-best-positive-speak/</link>
					<comments>https://avleonov.com/2026/01/24/1625-our-pr-team-awarded-me-the-the-best-positive-speak/#respond</comments>
		
		<dc:creator><![CDATA[Alexander Leonov]]></dc:creator>
		<pubDate>Sat, 24 Jan 2026 10:32:48 +0000</pubDate>
				<category><![CDATA[Award]]></category>
		<category><![CDATA[PositiveTechnologies]]></category>
		<category><![CDATA[PR]]></category>
		<category><![CDATA[present]]></category>
		<category><![CDATA[TBPS2025]]></category>
		<guid isPermaLink="false">https://avleonov.com/2026/01/24/1625-our-pr-team-awarded-me-the-the-best-positive-speak/</guid>

					<description><![CDATA[Our PR team awarded me the “The Best Positive Speaker 2025” metal pin for public speaking, articles, and media commentary. Huge thanks to my colleagues for this! I’m very pleased. 😇 The collection is growing. 😉 This time, the pin is styled like the Friends sitcom logo. It’s made of metal, coated with colored enamel, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><center><a href="https://avleonov.com/wp-content/uploads/2026/02/photo_894@24-01-2026_13-32-48.jpg"><img decoding="async" fetchpriority="high" class="aligncenter wp-image-65 " src="https://avleonov.com/wp-content/uploads/2026/02/photo_894@24-01-2026_13-32-48.jpg" alt="Our PR team awarded me the “The Best Positive Speaker 2025” metal pin for public speaking, articles, and media commentary"width="425" height="425"/></a></center></p>
<p>
<b>Our PR team awarded me the “The Best Positive Speaker 2025” metal pin for public speaking, articles, and media commentary. </b>Huge thanks to my colleagues for this! I’m very pleased. 😇 The <a href="https://t.me/avleonovrus/2232">collection</a> is growing. 😉</p>
<p>This time, the pin is styled like the <a href="https://en.wikipedia.org/wiki/Friends">Friends sitcom</a> logo. It’s made of metal, coated with colored enamel, quite hefty, measures 5×2 cm, and fastens with two butterfly clasps. Very nice. 👍</p>
<p>PS: I hope there wasn’t any hidden hint in the pin’s style. 😉</p>
<p><a href="https://www.youtube.com/watch?v=sLisEEwYZvw">So no one told</a> you life was going to be this way. 👏👏<br /><b>Your job&#8217;s a joke</b>, you&#8217;re broke, your love life&#8217;s DOA. 😅</p>
<p><a href="https://t.me/avleonovrus/2935">На русском</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://avleonov.com/2026/01/24/1625-our-pr-team-awarded-me-the-the-best-positive-speak/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>About Information Disclosure &#8211; Desktop Window Manager (CVE-2026-20805) vulnerability</title>
		<link>https://avleonov.com/2026/01/24/1624-about-information-disclosure-desktop-window-mana/</link>
					<comments>https://avleonov.com/2026/01/24/1624-about-information-disclosure-desktop-window-mana/#respond</comments>
		
		<dc:creator><![CDATA[Alexander Leonov]]></dc:creator>
		<pubDate>Sat, 24 Jan 2026 09:40:15 +0000</pubDate>
				<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[ALPC]]></category>
		<category><![CDATA[ASLR]]></category>
		<category><![CDATA[DWM]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://avleonov.com/2026/01/24/1624-about-information-disclosure-desktop-window-mana/</guid>

					<description><![CDATA[About Information Disclosure &#8211; Desktop Window Manager (CVE-2026-20805) vulnerability. Desktop Window Manager is a compositing window manager that has been part of Windows since Windows Vista. Exploitation of the vulnerability, which was addressed in the January Microsoft Patch Tuesday, allows a local attacker to disclose the &#8220;section address from a remote ALPC port which is [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><center><a href="https://avleonov.com/wp-content/uploads/2026/02/photo_893@24-01-2026_12-40-15.jpg"><img decoding="async" fetchpriority="high" class="aligncenter wp-image-65 " src="https://avleonov.com/wp-content/uploads/2026/02/photo_893@24-01-2026_12-40-15.jpg" alt="About Information Disclosure - Desktop Window Manager (CVE-2026-20805) vulnerability"width="425" height="425"/></a></center></p>
<p>
<b>About Information Disclosure &#8211; Desktop Window Manager (CVE-2026-20805) vulnerability.</b> <a href="https://en.wikipedia.org/wiki/Desktop_Window_Manager">Desktop Window Manager</a> is a compositing window manager that has been part of Windows since Windows Vista. Exploitation of the vulnerability, which was addressed in the <a href="https://avleonov.com/2026/01/13/1620-january-microsoft-patch-tuesday/">January Microsoft Patch Tuesday</a>, allows a local attacker to disclose the &#8220;section address from a remote <a href="https://en.wikipedia.org/wiki/Local_Inter-Process_Communication">ALPC</a> port which is user-mode memory&#8221;.</p>
<p>👾 Microsoft noted that this vulnerability is being exploited in attacks. The vulnerability <a href="https://www.cisa.gov/news-events/alerts/2026/01/13/cisa-adds-one-known-exploited-vulnerability-catalog">was added</a> to CISA’s KEV catalog on January 13. There are no public details about the attacks yet, but Rapid7 experts <a href="https://www.rapid7.com/blog/post/em-patch-tuesday-january-2026/">suggest</a> that the disclosed memory address can be used to bypass <a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization">ASLR</a>, &#8220;increasing the chance of developing a stable elevation of privilege exploit for DWM&#8221;.</p>
<p>🛠 Public exploit PoCs have been available on GitHub since January 14.</p>
<p><a href="https://t.me/avleonovrus/2934">На русском</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://avleonov.com/2026/01/24/1624-about-information-disclosure-desktop-window-mana/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
