Technology ❯ Cybersecurity ❯ Threats
Zero-Day Exploits Buffer Overflow Exploitation Techniques Exploits Denial of Service CVE-2025-59287 User Privilege Escalation Exploitation Privilege Escalation Keyloggers Untrusted Data Deserialization CVE-2025-30023 Malicious Git Hooks CVE-2025-42944 RediShell ViewState Deserialization CVE-2025-54253 Cross-Site Scripting CVE-2026-20952 Authentication Bypass CVE-2026-20841 SmarterMail Vulnerabilities Code Injection Malicious Exploits Outlook Exploits API Security CVE-2026-21858 Exploit CVE-2024-28986 Vulnerabilities in Routers
Repository configuration in AI tooling created an execution layer exploitable for RCE, enabling API key theft.