{"uuid": "21966f16-34d7-4168-823a-f999fb5d486a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4428", "type": "published-proof-of-concept", "source": "https://t.me/TopCyberTechNews/492", "content": "Top Security News for Today\n\nAuthenticated Remote Code Execution in Netwrix Password Secure (CVE-2025-26817)  \nhttps://www.reddit.com/r/netsec/comments/1kslcpa/authenticated_remote_code_execution_in_netwrix/\n\nEXP-401 (OSEE)\uff1a\u7528\u4e94\u5929\u8ab2\u7a0b\u8a13\u7df4\u901a\u900f\u5341\u5e74\u7684\u77e5\u8b58\u9ad4  \nhttps://devco.re/blog/2025/05/22/exp-401-osee-five-days-to-master-a-decade-of-knowledge/\n\nThe Voter Experience  \nhttps://www.schneier.com/blog/archives/2025/05/the-voter-experience.html\n\nHow to Enumerate and Exploit CefSharp Thick Clients Using CefEnum  \nhttps://www.reddit.com/r/netsec/comments/1kskq0k/how_to_enumerate_and_exploit_cefsharp_thick/\n\nAutomating MS-RPC vulnerability research  \nhttps://www.reddit.com/r/netsec/comments/1ksp4m2/automating_msrpc_vulnerability_research/\n\nLive Forensic Collection from Ivanti EPMM Appliances (CVE-2025-4427 &amp; CVE-2025-4428)  \nhttps://www.reddit.com/r/netsec/comments/1ksufxv/live_forensic_collection_from_ivanti_epmm/\n\nOops: DanaBot Malware Devs Infected Their Own PCs  \nhttps://krebsonsecurity.com/2025/05/oops-danabot-malware-devs-infected-their-own-pcs/\n\nCVE-2025-32756: Write-Up of a Buffer Overflow in Various Fortinet Products  \nhttps://www.reddit.com/r/netsec/comments/1kszzx6/cve202532756_writeup_of_a_buffer_overflow_in/\n\nFollow Top Cyber News at https://t.me/TopCyberTechNews Feel free to DM me at https://twitter.com/ShayaFeedman", "creation_timestamp": "2025-05-23T09:30:19.000000Z"}