<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Alexander V. Leonov</title>
	<atom:link href="https://avleonov.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://avleonov.com</link>
	<description>Vulnerability Management and more</description>
	<lastBuildDate>Mon, 30 Mar 2026 23:05:20 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://avleonov.com/wp-content/uploads/2017/11/cropped-avl-32x32.png</url>
	<title>Alexander V. Leonov</title>
	<link>https://avleonov.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>March Linux Patch Wednesday</title>
		<link>https://avleonov.com/2026/03/30/i012-march-linux-patch-wednesday/</link>
					<comments>https://avleonov.com/2026/03/30/i012-march-linux-patch-wednesday/#respond</comments>
		
		<dc:creator><![CDATA[Alexander Leonov]]></dc:creator>
		<pubDate>Mon, 30 Mar 2026 20:00:00 +0000</pubDate>
				<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Vulristics]]></category>
		<category><![CDATA[Authlib]]></category>
		<category><![CDATA[basicftp]]></category>
		<category><![CDATA[Caddy]]></category>
		<category><![CDATA[Chromium]]></category>
		<category><![CDATA[coTURN]]></category>
		<category><![CDATA[curl]]></category>
		<category><![CDATA[Glances]]></category>
		<category><![CDATA[GNUInetutils]]></category>
		<category><![CDATA[gSOAP]]></category>
		<category><![CDATA[GVfs]]></category>
		<category><![CDATA[Keycloak]]></category>
		<category><![CDATA[Libsoup]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[LinuxPatchWednesday]]></category>
		<category><![CDATA[lxml]]></category>
		<category><![CDATA[NLTK]]></category>
		<category><![CDATA[OpenStack]]></category>
		<category><![CDATA[PyJWT]]></category>
		<category><![CDATA[Rollup]]></category>
		<category><![CDATA[Snapd]]></category>
		<category><![CDATA[SPIP]]></category>
		<category><![CDATA[Vitrage]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://avleonov.com/2026/03/30/i012-march-linux-patch-wednesday/</guid>

					<description><![CDATA[March Linux Patch Wednesday. In March, Linux vendors began addressing 575 vulnerabilities, which is 57 fewer than in February. Of these, 93 are in the Linux Kernel (⬇️ a significant decrease &#8211; there were 305 in February). There are two vulnerabilities with signs of in-the-wild exploitation: 🔻 RCE &#8211; Chromium (CVE-2026-3909, CVE-2026-3910) Additionally, for 130 [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><center><a href="https://avleonov.com/wp-content/uploads/2026/03/photo_i012@0.jpg"><img decoding="async" fetchpriority="high" class="aligncenter wp-image-65 " src="https://avleonov.com/wp-content/uploads/2026/03/photo_i012@0.jpg" alt="March Linux Patch Wednesday"width="425" height="425"/></a></center></p>
<p>
<b>March <a href="https://github.com/leonov-av/linux-patch-wednesday">Linux Patch Wednesday</a>.</b> In March, Linux vendors began addressing 575 vulnerabilities, which is 57 fewer than <a href="https://avleonov.com/2026/02/20/1634-february-linux-patch-wednesday/">in February</a>. Of these, 93 are in the Linux Kernel (⬇️ a significant decrease &#8211; there were 305 in February). There are two vulnerabilities with signs of in-the-wild exploitation: </p>
<p>🔻 <b>RCE</b> &#8211; Chromium (CVE-2026-3909, CVE-2026-3910)</p>
<p>Additionally, for 130 (❗️) vulnerabilities, public exploits are available or there are indications of their existence. Notable ones include:</p>
<p>🔸 <b>RCE</b> &#8211; Caddy (CVE-2026-27590), NLTK (CVE-2025-14009), Rollup (CVE-2026-27606), GVfs (CVE-2026-28296), SPIP (CVE-2026-27475), OpenStack Vitrage (CVE-2026-28370)<br />
🔸 <b>AuthBypass</b> &#8211; Curl (CVE-2026-3783), coTURN (CVE-2026-27624), Libsoup (CVE-2026-3099)<br />
🔸 <b>InfDisc</b> &#8211; Glances (CVE-2026-30928, CVE-2026-32596)<br />
🔸 <b>PathTrav</b> &#8211; gSOAP (CVE-2019-25355), basic-ftp (CVE-2026-27699)<br />
🔸 <b>EoP</b> &#8211; Snapd (CVE-2026-3888), GNU Inetutils (CVE-2026-28372)<br />
🔸 <b>SFB</b> &#8211; Caddy (CVE-2026-27585, CVE-2026-27587/88/89), Keycloak (CVE-2026-1529), PyJWT (CVE-2026-32597), Authlib (CVE-2026-27962, CVE-2026-28498, CVE-2026-28802)<br />
🔸 <b>CodeInj</b> &#8211; lxml_html_clean (CVE-2026-28350), ormar (CVE-2026-26198)<br />
🔸 <b>SSRF</b> &#8211; Libsoup (CVE-2026-3632)</p>
<p>🗒 <a href="https://avleonov.com/vulristics_reports/linux_patch_wednesday_march2026_report_with_comments_ext_img.html">Full Vulristics report</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://avleonov.com/2026/03/30/i012-march-linux-patch-wednesday/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>March &#8220;In the Trend of VM&#8221; (#25): once again, vulnerabilities are only in Microsoft products</title>
		<link>https://avleonov.com/2026/03/22/i003-march-in-the-trend-of-vm-25-once-again-vulnerabilities-are-only-in-microsoft-products/</link>
					<comments>https://avleonov.com/2026/03/22/i003-march-in-the-trend-of-vm-25-once-again-vulnerabilities-are-only-in-microsoft-products/#respond</comments>
		
		<dc:creator><![CDATA[Alexander Leonov]]></dc:creator>
		<pubDate>Sun, 22 Mar 2026 09:00:00 +0000</pubDate>
				<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[CrowdStrike]]></category>
		<category><![CDATA[DWM]]></category>
		<category><![CDATA[LNK]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Office]]></category>
		<category><![CDATA[OLE]]></category>
		<category><![CDATA[PositiveTechnologies]]></category>
		<category><![CDATA[RDP]]></category>
		<category><![CDATA[RDS]]></category>
		<category><![CDATA[SmartScreen]]></category>
		<category><![CDATA[TrendVulns]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[WindowsShell]]></category>
		<guid isPermaLink="false">https://avleonov.com/2026/03/22/i003-march-in-the-trend-of-vm-25-once-again-vulnerabilities-are-only-in-microsoft-products/</guid>

					<description><![CDATA[March &#8220;In the Trend of VM&#8221; (#25): once again, vulnerabilities are only in Microsoft products. I present the traditional monthly roundup of trending vulnerabilities according to Positive Technologies. As in February, it turned out to be quite compact and focused on a single vendor. 🗞 Post on Habr (rus) 🗒 Digest on the PT website [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><center><a href="https://avleonov.com/wp-content/uploads/2026/03/photo_i003@0.jpg"><img decoding="async" fetchpriority="high" class="aligncenter wp-image-65 " src="https://avleonov.com/wp-content/uploads/2026/03/photo_i003@0.jpg" alt="March In the Trend of VM (#25): once again, vulnerabilities are only in Microsoft products"width="425" height="425"/></a></center></p>
<p>
<b>March &#8220;In the Trend of VM&#8221; (#25): once again, vulnerabilities are only in Microsoft products.</b> I present the traditional monthly roundup of trending vulnerabilities according to Positive Technologies. As <a href="https://avleonov.com/2026/02/13/1632-february-in-the-trend-of-vm-24-vulnerabilities-in/">in February</a>, it turned out to be quite compact and focused on a single vendor.</p>
<p>🗞 <a href="https://habr.com/ru/companies/pt/articles/1009980/">Post on Habr (rus)</a><br />
🗒 <a href="https://ptsecurity.com/research/analytics/trending-vulnerability-digest-march-2026/">Digest on the PT website (rus)</a></p>
<p>All four vulnerabilities are from the <a href="https://avleonov.com/2026/02/11/1631-february-microsoft-patch-tuesday/">February Microsoft Patch Tuesday</a>, and all are actively being exploited in the wild:</p>
<p>🔻 <b>RCE</b> &#8211; Windows Shell (<a href="https://avleonov.com/2026/03/10/1636-about-remote-code-execution---windows-shell-cve-20/">CVE-2026-21510</a>)<br />
🔻 <b>RCE</b> &#8211; Microsoft Word (<a href="https://avleonov.com/2026/03/03/1635-about-remote-code-execution---microsoft-word-cve-2/">CVE-2026-21514</a>)</p>
<p>💬 Microsoft classified the two vulnerabilities above as <b>Security Feature Bypass</b>, but in fact, they are <b>Remote Code Execution</b>.</p>
<p>🔻 <b>EoP</b> &#8211; Windows Remote Desktop Services (<a href="https://avleonov.com/2026/03/12/1638-about-elevation-of-privilege---windows-rds-cve-202/">CVE-2026-21533</a>)<br />
🔻 <b>EoP</b> &#8211; Desktop Window Manager (<a href="https://avleonov.com/2026/03/12/1639-about-elevation-of-privilege---desktop-window-mana/">CVE-2026-21519</a>)</p>
<p>🟥 The full list of trending vulnerabilities can be found <a href="https://ptsecurity.com/research/trending-vulnerabilities/?utm_source=tg_leonov&#038;utm_medium=article&#038;utm_campaign=trending">on the portal</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://avleonov.com/2026/03/22/i003-march-in-the-trend-of-vm-25-once-again-vulnerabilities-are-only-in-microsoft-products/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>About the Remote Code Execution Vulnerability &#8211; n8n (CVE-2025-68613)</title>
		<link>https://avleonov.com/2026/03/16/i001-about-the-remote-code-execution-vulnerability-n8n-cve202568613/</link>
					<comments>https://avleonov.com/2026/03/16/i001-about-the-remote-code-execution-vulnerability-n8n-cve202568613/#respond</comments>
		
		<dc:creator><![CDATA[Alexander Leonov]]></dc:creator>
		<pubDate>Mon, 16 Mar 2026 12:16:21 +0000</pubDate>
				<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Akamai]]></category>
		<category><![CDATA[CyberOK]]></category>
		<category><![CDATA[n8n]]></category>
		<category><![CDATA[Ni8mare]]></category>
		<category><![CDATA[SKIPA]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Zerobot]]></category>
		<guid isPermaLink="false">https://avleonov.com/2026/03/16/i001-about-the-remote-code-execution-vulnerability-n8n-cve202568613/</guid>

					<description><![CDATA[About Remote Code Execution Vulnerability &#8211; n8n (CVE-2025-68613). n8n is a workflow automation platform available under a fair-code license. Improper Control of Dynamically-Managed Code Resources (CWE-913) in the n8n workflow expression evaluation system allows a remote authenticated attacker without administrative privileges to execute arbitrary code. ⚙️ The vulnerability was fixed in late December 2025. ⚒️ [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><center><a href="https://avleonov.com/wp-content/uploads/2026/03/photo_i001@1.jpg"><img decoding="async" fetchpriority="high" class="aligncenter wp-image-65 " src="https://avleonov.com/wp-content/uploads/2026/03/photo_i001@1.jpg" alt="About the Remote Code Execution Vulnerability - n8n (CVE-2025-68613)"width="425" height="425"/></a></center></p>
<p>
<b>About Remote Code Execution Vulnerability &#8211; n8n (CVE-2025-68613).</b> <a href="https://n8n.io/">n8n</a> is a workflow automation platform <a href="https://github.com/n8n-io/n8n/blob/master/LICENSE.md">available under a fair-code license</a>. Improper Control of Dynamically-Managed Code Resources (<a href="https://cwe.mitre.org/data/definitions/913.html">CWE-913</a>) in the n8n workflow expression evaluation system allows a remote authenticated attacker <a href="https://www.akamai.com/blog/security-research/2026/feb/zerobot-malware-targets-n8n-automation-platform#:~:text=without%20administrative%20privileges">without administrative privileges</a> to execute arbitrary code.</p>
<p>⚙️ The vulnerability was <a href="https://github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp">fixed</a> in late December 2025.</p>
<p>⚒️ Exploits on GitHub have been available since December 22, including those for combined exploitation with CVE-2026-21858 (Ni8mare).</p>
<p>👾 On December 26, a detailed <a href="https://www.resecurity.com/blog/article/cve-2025-68613-remote-code-execution-via-expression-injection-in-n8n-2">write-up</a> by Resecurity was published, reporting signs of exploitation in the wild. On February 27, Akamai <a href="https://www.akamai.com/blog/security-research/2026/feb/zerobot-malware-targets-n8n-automation-platform">reported</a> exploitation of the vulnerability by Zerobot malware. On March 11, the vulnerability was <a href="https://www.cisa.gov/news-events/alerts/2026/03/11/cisa-adds-one-known-exploited-vulnerability-catalog">added</a> to the CISA KEV.</p>
<p>🌐 In January, CyberOK SKIPA <a href="https://t.me/cyberok_news/173">recorded</a> just under 9,000 active n8n instances in the Runet, ~70% of which were vulnerable.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://avleonov.com/2026/03/16/i001-about-the-remote-code-execution-vulnerability-n8n-cve202568613/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>About Elevation of Privilege &#8211; Desktop Window Manager (CVE-2026-21519) vulnerability</title>
		<link>https://avleonov.com/2026/03/12/1639-about-elevation-of-privilege-desktop-window-mana/</link>
					<comments>https://avleonov.com/2026/03/12/1639-about-elevation-of-privilege-desktop-window-mana/#respond</comments>
		
		<dc:creator><![CDATA[Alexander Leonov]]></dc:creator>
		<pubDate>Thu, 12 Mar 2026 15:14:19 +0000</pubDate>
				<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[DWM]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://avleonov.com/2026/03/12/1639-about-elevation-of-privilege-desktop-window-mana/</guid>

					<description><![CDATA[About Elevation of Privilege &#8211; Desktop Window Manager (CVE-2026-21519) vulnerability. The vulnerability is from the February Microsoft Patch Tuesday. Desktop Window Manager is a compositing window manager included in Windows starting with Windows Vista. A Type Confusion error (CWE-843) in Desktop Window Manager allows an authorized attacker to locally elevate privileges to the SYSTEM level. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><center><a href="https://avleonov.com/wp-content/uploads/2026/03/photo_906@12-03-2026_18-14-19.jpg"><img decoding="async" fetchpriority="high" class="aligncenter wp-image-65 " src="https://avleonov.com/wp-content/uploads/2026/03/photo_906@12-03-2026_18-14-19.jpg" alt="About Elevation of Privilege - Desktop Window Manager (CVE-2026-21519) vulnerability"width="425" height="425"/></a></center></p>
<p>
<b>About Elevation of Privilege &#8211; Desktop Window Manager (CVE-2026-21519) vulnerability. </b>The vulnerability is from the <a href="https://avleonov.com/2026/02/11/1631-february-microsoft-patch-tuesday/">February Microsoft Patch Tuesday</a>. <a href="https://en.wikipedia.org/wiki/Desktop_Window_Manager">Desktop Window Manager</a> is a compositing window manager included in Windows starting with Windows Vista. A Type Confusion error (<a href="https://cwe.mitre.org/data/definitions/843.html">CWE-843</a>) in Desktop Window Manager allows an authorized attacker to locally elevate privileges to the SYSTEM level. By fixing this vulnerability, Microsoft most likely attempted to counter the same attacker who exploited the January <b>Information Disclosure</b> vulnerability (<a href="https://avleonov.com/2026/01/24/1624-about-information-disclosure---desktop-window-mana/">CVE-2026-20805</a>) in the same component. It is possible that the original fix did not fully resolve the issue.</p>
<p>👾 Microsoft reports that the vulnerability has been exploited in the wild. The vulnerability has been in the CISA KEV <a href="https://www.cisa.gov/news-events/alerts/2026/02/10/cisa-adds-six-known-exploited-vulnerabilities-catalog">since February 10</a>.</p>
<p>🛠 No public exploits are available yet.</p>
<p><a href="https://t.me/avleonovrus/3081">На русском</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://avleonov.com/2026/03/12/1639-about-elevation-of-privilege-desktop-window-mana/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>About Elevation of Privilege &#8211; Windows RDS (CVE-2026-21533) vulnerability</title>
		<link>https://avleonov.com/2026/03/12/1638-about-elevation-of-privilege-windows-rds-cve-202/</link>
					<comments>https://avleonov.com/2026/03/12/1638-about-elevation-of-privilege-windows-rds-cve-202/#respond</comments>
		
		<dc:creator><![CDATA[Alexander Leonov]]></dc:creator>
		<pubDate>Thu, 12 Mar 2026 09:06:47 +0000</pubDate>
				<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[CrowdStrike]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[RDP]]></category>
		<category><![CDATA[RDS]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://avleonov.com/2026/03/12/1638-about-elevation-of-privilege-windows-rds-cve-202/</guid>

					<description><![CDATA[About Elevation of Privilege &#8211; Windows RDS (CVE-2026-21533) vulnerability. The vulnerability is from the February Microsoft Patch Tuesday. Remote Desktop Services (RDS) is a component of Microsoft Windows that allows a user to initiate and control an interactive session on a remote computer or virtual machine over a network connection using the Remote Desktop Protocol [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><center><a href="https://avleonov.com/wp-content/uploads/2026/03/photo_905@12-03-2026_12-06-47.jpg"><img decoding="async" fetchpriority="high" class="aligncenter wp-image-65 " src="https://avleonov.com/wp-content/uploads/2026/03/photo_905@12-03-2026_12-06-47.jpg" alt="About Elevation of Privilege - Windows RDS (CVE-2026-21533) vulnerability"width="425" height="425"/></a></center></p>
<p>
<b>About Elevation of Privilege &#8211; Windows RDS (CVE-2026-21533) vulnerability.</b> The vulnerability is from the <a href="https://avleonov.com/2026/02/11/1631-february-microsoft-patch-tuesday/">February Microsoft Patch Tuesday</a>. <a href="https://en.wikipedia.org/wiki/Remote_Desktop_Services">Remote Desktop Services</a> (RDS) is a component of Microsoft Windows that allows a user to initiate and control an interactive session on a remote computer or virtual machine over a network connection using the Remote Desktop Protocol (RDP). Improper Privilege Management (<a href="https://cwe.mitre.org/data/definitions/269.html">CWE-269</a>) in Windows Remote Desktop allows a local attacker to gain SYSTEM privileges. <a href="https://www.crowdstrike.com/en-us/blog/patch-tuesday-analysis-february-2026/">According to CrowdStrike</a>, the exploit binary modifies a service configuration key, allowing the attacker to elevate privileges and <i>&#8220;add a new user to the Administrator group&#8221;</i>.</p>
<p>👾 Microsoft reports exploitation of the vulnerability in the wild. The vulnerability has been listed in the CISA KEV <a href="https://www.cisa.gov/news-events/alerts/2026/02/10/cisa-adds-six-known-exploited-vulnerabilities-catalog">since February 10</a>.</p>
<p>🛠 No public exploits are available yet, but there are reports of the exploit being advertised for sale for $220,000 on a dark forum.</p>
<p><a href="https://t.me/avleonovrus/3080">На русском</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://avleonov.com/2026/03/12/1638-about-elevation-of-privilege-windows-rds-cve-202/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>March Microsoft Patch Tuesday</title>
		<link>https://avleonov.com/2026/03/11/1637-march-microsoft-patch-tuesday/</link>
					<comments>https://avleonov.com/2026/03/11/1637-march-microsoft-patch-tuesday/#respond</comments>
		
		<dc:creator><![CDATA[Alexander Leonov]]></dc:creator>
		<pubDate>Wed, 11 Mar 2026 19:20:14 +0000</pubDate>
				<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Vulristics]]></category>
		<category><![CDATA[DotNet]]></category>
		<category><![CDATA[Excel]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Office]]></category>
		<category><![CDATA[PatchTuesday]]></category>
		<category><![CDATA[PrintSpooler]]></category>
		<category><![CDATA[SharePoint]]></category>
		<category><![CDATA[SQLServer]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://avleonov.com/2026/03/11/1637-march-microsoft-patch-tuesday/</guid>

					<description><![CDATA[March Microsoft Patch Tuesday. A total of 79 vulnerabilities, about one and a half times more than in February. What&#8217;s truly unusual is that this time there were no vulnerabilities with signs of exploitation in the wild or a public exploit! 🤔 At least not yet. 😏 The following vulnerabilities can be highlighted: 🔹 RCE [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><center><a href="https://avleonov.com/wp-content/uploads/2026/03/photo_904@11-03-2026_22-20-14.jpg"><img decoding="async" fetchpriority="high" class="aligncenter wp-image-65 " src="https://avleonov.com/wp-content/uploads/2026/03/photo_904@11-03-2026_22-20-14.jpg" alt="March Microsoft Patch Tuesday"width="425" height="425"/></a></center></p>
<p>
<b>March Microsoft Patch Tuesday. </b>A total of 79 vulnerabilities, about one and a half times more than <a href="https://avleonov.com/2026/02/11/1631-february-microsoft-patch-tuesday/">in February</a>. What&#8217;s truly unusual is that this time there were no vulnerabilities with signs of exploitation in the wild or a public exploit! 🤔 At least not yet. 😏</p>
<p>The following vulnerabilities can be highlighted:</p>
<p>🔹 <b>RCE</b> &#8211; Print Spooler (CVE-2026-23669), Office (CVE-2026-26110, CVE-2026-26113), Excel (CVE-2026-26107, CVE-2026-26108, CVE-2026-26109, CVE-2026-26112), SharePoint Server (CVE-2026-26106, CVE-2026-26114)<br />🔹 <b>EoP</b> &#8211; SQL Server (CVE-2026-21262, CVE-2026-26115, CVE-2026-26116), Windows Kernel (CVE-2026-24287, CVE-2026-24289, CVE-2026-26132), Windows Win32k (CVE-2026-24285), SMB Server (CVE-2026-24294, CVE-2026-26128), Windows Graphics Component (CVE-2026-23668), .NET (CVE-2026-26131)<br />🔹 <b>DoS</b> &#8211; .NET (CVE-2026-26127)</p>
<p>🗒 <a href="https://avleonov.com/vulristics_reports/ms_patch_tuesday_march2026_report_with_comments_ext_img.html">Full Vulristics report</a></p>
<p><a href="https://t.me/avleonovrus/3078">На русском</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://avleonov.com/2026/03/11/1637-march-microsoft-patch-tuesday/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>About Remote Code Execution &#8211; Windows Shell (CVE-2026-21510) vulnerability</title>
		<link>https://avleonov.com/2026/03/10/1636-about-remote-code-execution-windows-shell-cve-20/</link>
					<comments>https://avleonov.com/2026/03/10/1636-about-remote-code-execution-windows-shell-cve-20/#respond</comments>
		
		<dc:creator><![CDATA[Alexander Leonov]]></dc:creator>
		<pubDate>Mon, 09 Mar 2026 22:59:52 +0000</pubDate>
				<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[LNK]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[SmartScreen]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[WindowsShell]]></category>
		<guid isPermaLink="false">https://avleonov.com/2026/03/10/1636-about-remote-code-execution-windows-shell-cve-20/</guid>

					<description><![CDATA[About Remote Code Execution &#8211; Windows Shell (CVE-2026-21510) vulnerability. A vulnerability from the February Microsoft Patch Tuesday. The Windows Shell is the primary interface through which users interact with the Windows operating system. It includes visible elements such as the Desktop, Taskbar, and the Start Menu. Protection Mechanism Failure (CWE-693) allows an attacker to execute [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><center><a href="https://avleonov.com/wp-content/uploads/2026/03/photo_903@10-03-2026_01-59-52.jpg"><img decoding="async" fetchpriority="high" class="aligncenter wp-image-65 " src="https://avleonov.com/wp-content/uploads/2026/03/photo_903@10-03-2026_01-59-52.jpg" alt="About Remote Code Execution - Windows Shell (CVE-2026-21510) vulnerability"width="425" height="425"/></a></center></p>
<p>
<b>About Remote Code Execution &#8211; Windows Shell (CVE-2026-21510) vulnerability.</b> A vulnerability from the <a href="https://avleonov.com/2026/02/11/1631-february-microsoft-patch-tuesday/">February Microsoft Patch Tuesday</a>. The <a href="https://en.wikipedia.org/wiki/Windows_shell">Windows Shell</a> is the primary interface through which users interact with the Windows operating system. It includes visible elements such as the Desktop, Taskbar, and the Start Menu. Protection Mechanism Failure (<a href="https://cwe.mitre.org/data/definitions/693.html">CWE-693</a>) allows an attacker to execute arbitrary code on the system by bypassing the Windows SmartScreen mechanism and Windows Shell warnings. To exploit the vulnerability, an attacker needs to convince a user to open a specially crafted shortcut file (.LNK) or follow a malicious link.</p>
<p>👾 Microsoft reports exploitation in the wild. The vulnerability has been listed in the CISA KEV <a href="https://www.cisa.gov/news-events/alerts/2026/02/10/cisa-adds-six-known-exploited-vulnerabilities-catalog">since February 10</a>.</p>
<p>💬 Microsoft classified the vulnerability as <b>Security Feature Bypass</b>, however it seems more appropriate to classify it as <b>Remote Code Execution</b>.</p>
<p>🛠 No public exploits are available yet.</p>
<p><a href="https://t.me/avleonovrus/3074">На русском</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://avleonov.com/2026/03/10/1636-about-remote-code-execution-windows-shell-cve-20/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>About Remote Code Execution &#8211; Microsoft Word (CVE-2026-21514) vulnerability</title>
		<link>https://avleonov.com/2026/03/03/1635-about-remote-code-execution-microsoft-word-cve-2/</link>
					<comments>https://avleonov.com/2026/03/03/1635-about-remote-code-execution-microsoft-word-cve-2/#respond</comments>
		
		<dc:creator><![CDATA[Alexander Leonov]]></dc:creator>
		<pubDate>Mon, 02 Mar 2026 22:04:57 +0000</pubDate>
				<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Office]]></category>
		<category><![CDATA[OLE]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://avleonov.com/2026/03/03/1635-about-remote-code-execution-microsoft-word-cve-2/</guid>

					<description><![CDATA[About Remote Code Execution &#8211; Microsoft Word (CVE-2026-21514) vulnerability. This vulnerability is from February Microsoft Patch Tuesday. Reliance on Untrusted Inputs in a Security Decision (CWE-807) in Microsoft Office Word allows an unauthenticated attacker to bypass OLE security features when opening a malicious file. The vulnerability is NOT exploitable via the Preview Pane. 👾 Microsoft [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><center><a href="https://avleonov.com/wp-content/uploads/2026/03/photo_902@03-03-2026_01-04-57.jpg"><img decoding="async" fetchpriority="high" class="aligncenter wp-image-65 " src="https://avleonov.com/wp-content/uploads/2026/03/photo_902@03-03-2026_01-04-57.jpg" alt="About Remote Code Execution - Microsoft Word (CVE-2026-21514) vulnerability"width="425" height="425"/></a></center></p>
<p>
<b>About Remote Code Execution &#8211; Microsoft Word (CVE-2026-21514) vulnerability.</b> This vulnerability is from <a href="https://avleonov.com/2026/02/11/1631-february-microsoft-patch-tuesday/">February Microsoft Patch Tuesday</a>. Reliance on Untrusted Inputs in a Security Decision (<a href="https://cwe.mitre.org/data/definitions/807.html">CWE-807</a>) in Microsoft Office Word allows an unauthenticated attacker to bypass OLE security features when opening a malicious file. The vulnerability is NOT exploitable via the Preview Pane.</p>
<p>👾 Microsoft reports that the vulnerability is being exploited in the wild. It has been listed in CISA KEV <a href="https://www.cisa.gov/news-events/alerts/2026/02/10/cisa-adds-six-known-exploited-vulnerabilities-catalog">since February 10</a>.</p>
<p>💬 Microsoft has classified the vulnerability as a <b>Security Feature Bypass</b>, but given that exploiting such vulnerabilities can lead to arbitrary code execution, it seems reasonable to classify it as <b>Remote Code Execution,</b> similar to the actively exploited <a href="https://avleonov.com/2026/01/27/1629-about-remote-code-execution---microsoft-office-cve/">CVE-2026-21509</a>.</p>
<p>🛠 No public exploits are available yet.</p>
<p><a href="https://t.me/avleonovrus/3048">На русском</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://avleonov.com/2026/03/03/1635-about-remote-code-execution-microsoft-word-cve-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>February Linux Patch Wednesday</title>
		<link>https://avleonov.com/2026/02/20/1634-february-linux-patch-wednesday/</link>
					<comments>https://avleonov.com/2026/02/20/1634-february-linux-patch-wednesday/#respond</comments>
		
		<dc:creator><![CDATA[Alexander Leonov]]></dc:creator>
		<pubDate>Fri, 20 Feb 2026 16:20:27 +0000</pubDate>
				<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Vulristics]]></category>
		<category><![CDATA[Chromium]]></category>
		<category><![CDATA[DiskCache]]></category>
		<category><![CDATA[Grafana]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[LinuxPatchWednesday]]></category>
		<category><![CDATA[MMonit]]></category>
		<category><![CDATA[MongoBleed]]></category>
		<category><![CDATA[MongoDB]]></category>
		<category><![CDATA[OpenSSL]]></category>
		<category><![CDATA[pgAdmin]]></category>
		<category><![CDATA[ProxmoxVE]]></category>
		<category><![CDATA[PyTorch]]></category>
		<category><![CDATA[Roundcube]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Wheel]]></category>
		<guid isPermaLink="false">https://avleonov.com/2026/02/20/1634-february-linux-patch-wednesday/</guid>

					<description><![CDATA[February Linux Patch Wednesday. In February, Linux vendors addressed 632 vulnerabilities &#8211; 1.5× fewer than in January, including 305 in the Linux Kernel. Two vulnerabilities show signs of in-the-wild exploitation: 🔻 RCE &#8211; Chromium (CVE-2026-2441)🔻 InfDisc &#8211; MongoDB &#8220;MongoBleed&#8221; (CVE-2025-14847) Public exploits are available or suspected for 56 more vulnerabilities. Notable ones include: 🔸 RCE [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><center><a href="https://avleonov.com/wp-content/uploads/2026/02/photo_901@20-02-2026_19-20-27.jpg"><img decoding="async" fetchpriority="high" class="aligncenter wp-image-65 " src="https://avleonov.com/wp-content/uploads/2026/02/photo_901@20-02-2026_19-20-27.jpg" alt="February Linux Patch Wednesday"width="425" height="425"/></a></center></p>
<p>
<b>February </b><b><a href="https://github.com/leonov-av/linux-patch-wednesday">Linux Patch Wednesday</a></b><b>. </b>In February, Linux vendors addressed 632 vulnerabilities &#8211; 1.5× fewer than <a href="https://avleonov.com/2026/01/25/1626-january-linux-patch-wednesday/">in January</a>, including 305 in the Linux Kernel. Two vulnerabilities show signs of in-the-wild exploitation:</p>
<p><b>🔻 RCE </b>&#8211; Chromium (CVE-2026-2441)<br />🔻 <b>InfDisc</b> &#8211; MongoDB &#8220;MongoBleed&#8221; (<a href="https://avleonov.com/2026/01/19/1622-about-information-disclosure---mongodb-mongobleed/">CVE-2025-14847</a>)</p>
<p>Public exploits are available or suspected for 56 more vulnerabilities. Notable ones include:</p>
<p>🔸 <b>RCE</b> &#8211; OpenSSL (CVE-2025-15467, CVE-2025-69421, CVE-2025-11187), pgAdmin (CVE-2025-12762, CVE-2025-13780), DiskCache (CVE-2025-69872), PyTorch (CVE-2026-24747), Wheel (CVE-2026-24049)<br />🔸 <b>AuthBypass</b> &#8211; M/Monit (CVE-2020-36968)<br />🔸 <b>EoP</b> &#8211; Grafana (CVE-2025-41115, CVE-2026-21721), M/Monit (CVE-2020-36969)<br />🔸 <b>AFR</b> &#8211; Proxmox Virtual Environment (CVE-2024-21545)<br />🔸 <b>SFB</b> &#8211; Chromium (CVE-2026-1504), Roundcube (CVE-2026-25916)</p>
<p>🗒 <a href="https://avleonov.com/vulristics_reports/linux_patch_wednesday_february2026_report_with_comments_ext_img.html">Full Vulristics report</a></p>
<p><a href="https://t.me/avleonovrus/3014">На русском</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://avleonov.com/2026/02/20/1634-february-linux-patch-wednesday/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>February &#8220;In the Trend of VM&#8221; (#24): vulnerabilities in Microsoft products</title>
		<link>https://avleonov.com/2026/02/13/1632-february-in-the-trend-of-vm-24-vulnerabilities-in/</link>
					<comments>https://avleonov.com/2026/02/13/1632-february-in-the-trend-of-vm-24-vulnerabilities-in/#respond</comments>
		
		<dc:creator><![CDATA[Alexander Leonov]]></dc:creator>
		<pubDate>Thu, 12 Feb 2026 22:19:42 +0000</pubDate>
				<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[ALPC]]></category>
		<category><![CDATA[ASLR]]></category>
		<category><![CDATA[DWM]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Office]]></category>
		<category><![CDATA[OLE]]></category>
		<category><![CDATA[PositiveTechnologies]]></category>
		<category><![CDATA[TrendVulns]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://avleonov.com/2026/02/13/1632-february-in-the-trend-of-vm-24-vulnerabilities-in/</guid>

					<description><![CDATA[February &#8220;In the Trend of VM&#8221; (#24): vulnerabilities in Microsoft products. A traditional monthly roundup of trending vulnerabilities. This time, compact and all-Microsoft. 🗞 Post on Habr (rus)🗒 Digest on the PT website (rus) In total, two vulnerabilities: 🔻 RCE &#8211; Microsoft Office (CVE-2026-21509)🔻 InfDisc &#8211; Desktop Window Manager (CVE-2026-20805) 🟥 Trending Vulnerabilities Portal На [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><center><a href="https://avleonov.com/wp-content/uploads/2026/02/photo_900@13-02-2026_01-19-42.jpg"><img decoding="async" fetchpriority="high" class="aligncenter wp-image-65 " src="https://avleonov.com/wp-content/uploads/2026/02/photo_900@13-02-2026_01-19-42.jpg" alt="February In the Trend of VM (#24): vulnerabilities in Microsoft products"width="425" height="425"/></a></center></p>
<p>
<b>February &#8220;In the Trend of VM&#8221; (#24): vulnerabilities in Microsoft products. </b>A traditional monthly roundup of trending vulnerabilities. This time, compact and all-Microsoft.</p>
<p>🗞 <a href="https://habr.com/ru/companies/pt/articles/995362/">Post on Habr (rus)</a><br />🗒 <a href="https://ptsecurity.com/research/analytics/trending-vulnerability-digest-february-2026/">Digest on the PT website (rus)</a></p>
<p>In total, two vulnerabilities:</p>
<p>🔻 <b>RCE</b> &#8211; Microsoft Office (<a href="https://avleonov.com/2026/01/27/1629-about-remote-code-execution---microsoft-office-cve/">CVE-2026-21509</a>)<br />🔻 <b>InfDisc</b> &#8211; Desktop Window Manager (<a href="https://avleonov.com/2026/01/24/1624-about-information-disclosure---desktop-window-mana/">CVE-2026-20805</a>)</p>
<p>🟥 <a href="https://ptsecurity.com/research/trending-vulnerabilities/?utm_source=tg_leonov&#038;utm_medium=article&#038;utm_campaign=trending">Trending Vulnerabilities Portal</a></p>
<p><a href="https://t.me/avleonovrus/2993">На русском</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://avleonov.com/2026/02/13/1632-february-in-the-trend-of-vm-24-vulnerabilities-in/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
