// LIVE
HOLEConditional Impls
RADARA new 'work from home' age? Governments across Asia order employees to stay home
OPSSupply-chain attack using invisible code hits GitHub and other repositories
RADARTitle: Meta’s massive undersea cable project has been put on hold by regional ho
RADAR'Are you freaking crazy?' Bot harasses woman, gets led away by cops
OPSCredential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others
HOLEOpenClaw and the Dream of Free Labour
INTELMeta Platforms: Lobbying, Dark Money, and the App Store Accountability Act
OPSMajor SocksEscort proxy network powered by Linux malware taken down by FBI and o
HOLEThe Plumbing of Everyday Magic
INTELShow HN: Algorithms and Data Structures in TypeScript – Free Book (~400 Pages)
INTELThe Download: how AI is used for military targeting, and the Pentagon’s war on C
CVEnpm cli Local Privilege Escalation Vulnerability (CVE-2026-0775)
CVEZDI-26-044: Windows Desktop Window Manager Use-After-Free Privilege Escalation V
CVEJanuary 2026 Patch Tuesday - Critical Vulnerabilities Addressed
HOLEConditional Impls
RADARA new 'work from home' age? Governments across Asia order employees to stay home
OPSSupply-chain attack using invisible code hits GitHub and other repositories
RADARTitle: Meta’s massive undersea cable project has been put on hold by regional ho
RADAR'Are you freaking crazy?' Bot harasses woman, gets led away by cops
OPSCredential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others
HOLEOpenClaw and the Dream of Free Labour
INTELMeta Platforms: Lobbying, Dark Money, and the App Store Accountability Act
OPSMajor SocksEscort proxy network powered by Linux malware taken down by FBI and o
HOLEThe Plumbing of Everyday Magic
INTELShow HN: Algorithms and Data Structures in TypeScript – Free Book (~400 Pages)
INTELThe Download: how AI is used for military targeting, and the Pentagon’s war on C
CVEnpm cli Local Privilege Escalation Vulnerability (CVE-2026-0775)
CVEZDI-26-044: Windows Desktop Window Manager Use-After-Free Privilege Escalation V
CVEJanuary 2026 Patch Tuesday - Critical Vulnerabilities Addressed
nsysops@ops-intel:~$ ls -lt --range live
OPS INTEL
209 items · ARIA-monitored · page 5 of 42
209
TOTAL
CRITICAL
HIGH
ACTIONABLE
WALLBOARD ↗
AUTO-APPROVED TODAY
LLM STATUS
CRITICAL (page) 2
HIGH (page) 2
MEDIUM (page) 1
LOW (page) 0
HIGH 95% confidence cve

Fortinet FortiSandbox SSRF RCE Vulnerability (ZDI-26-048)

Critical remote code execution vulnerability in Fortinet's FortiSandbox requires authentication. CVE-2025-67685, CVSS score of 8.8. Includes severity, confidenc

['Lack of input validation in HTTP requests allows malicious actors to disclose sensitive data and control server processes']

Fortinet usersNetwork administratorsSecurity professionals
action items (2)
  • Review system configurations for FortiSandbox installations
  • Update systems to the latest version with patched SSRF vulnerability

Zero Day Initiative · 2026-02-27T04:30

HIGH 90% confidence cve

ZDI-26-047: Hancom Office DOC Parsing Type Confusion RCE Vulnerability

Hancom Office DOC File Parsing Type Confusion Remote Code Execution Vulnerability. Exploits require user interaction. Includes severity, confidence, and actiona

['Allows remote attackers to execute arbitrary code with user interaction']

Hancom Office UsersEnterprise Networks
action items (2)
  • Apply security patches
  • Monitor network for suspicious activity

Zero Day Initiative · 2026-02-27T04:30

CRITICAL 95% confidence cve

ZDI-26-046: Cisco Snort Vulnerability Allows Remote Code Execution

Cisco Snort is vulnerable to a Use-After-Free Remote Code Execution flaw that can be exploited without requiring authentication. Includes severity, confidence,

['Lack of proper memory management in _bnfa_search_csparse_nfa function', 'Attackers can manipulate the application state to trigger UAF and execute arbitrary code remotely']

Network SecurityIntrusion Detection Systems
action items (2)
  • Review system configurations for any direct exposure of Snort services
  • Monitor logs for suspicious activities and apply security updates promptly

Zero Day Initiative · 2026-02-27T04:30

MEDIUM 95% confidence cve

ZDI-26-045: Cisco Snort OOB Read Info Disclosure Vulnerability

Affected installations of Cisco Snort are vulnerable to remote attackers disclosing sensitive information. No auth required. Includes severity, confidence, and

['Exploit may result in unauthorized access to sensitive information', 'No user interaction required to trigger the vulnerability']

Cisco Snort users and administrators
action items (2)
  • Deploy updates for Cisco Snort to address CVE-2026-20027
  • Monitor network traffic for signs of exploitation attempts

Zero Day Initiative · 2026-02-27T04:29

CRITICAL 95% confidence cve

ZDI-26-050: GIMP ICO File Parsing Heap-based Buffer Overflow RCE

ZDI warns of a critical vulnerability in GIMP's ICO file parsing. A heap-based buffer overflow could lead to remote code execution. Includes severity, confidenc

['Remote code execution possible when users open malicious files', 'Exploits require user interaction but no authentication']

LinuxmacOSWindows
action items (2)
  • Immediately patch all systems running vulnerable versions of GIMP
  • Monitor for suspicious activity related to ICO files

Zero Day Initiative · 2026-02-27T04:28