News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

CVE-2025-47981 RCE in the Windows SPNEGO Extended Negotiation (NEGOEX) : Pentesting | Torhoo darknet markets

CVE-2025-47981 is a critical security vulnerability in Windows systems, likely affecting versions from Windows 10 (1607) onward and various Windows Server editions

no public exploits being available as of July 12 ,2025

Overview

CVE-2025-47981 is a critical remote code execution (RCE) vulnerability in the Windows SPNEGO Extended Negotiation (NEGOEX) Security Mechanism. It allows an unauthenticated attacker to execute code remotely by sending a crafted message, potentially leading to full system control.

Risk Level

With a CVSSv3 score of 9.8, it’s considered highly severe and classified as "wormable," meaning it could spread automatically across networks

This vulnerability likely affects Windows 10 (version 1607 and later), Windows 11, and various Windows Server versions (2008 R2 SP1 through 2025), especially systems with a specific default-enabled group policy.

Patch and Mitigation :

Microsoft released patches as part of the July 2025 Patch Tuesday update on July 8, 2025. Applying these updates is essential. If patching isn’t immediately possible, disabling the group policy "Network security: Allow PKU2U authentication requests to computer

Current Exploitation Status

As of July 12, 2025, there are no reports of public exploits, but the high likelihood of exploitation suggests attackers may be developing them, given its critical nature.


Technical Details:

Vulnerability Type: Heap-based buffer overflow (CWE-122), enabling remote code execution.

Affected Component: The SPNEGO Extended Negotiation (NEGOEX) Security Mechanism, part of Windows authentication protocols.

CVSS Scoring:

CVSSv3 Score: 9.8 (Critical)

CVSS 4.0 Severity: Not yet provided by NVD as of July 12, 2025.

Attack Vector: Remote, network-based, with no authentication needed, making it highly exploitable over services like SMB (port 445/TCP), RDP (port 3389/TCP), HTTP/S (ports 80, 443/TCP), and SMTP (port 25/TCP).

Sources and References:

https://nvd.nist.gov/vuln/detail/CVE-2025-47981
https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-47981
https://www.wiz.io/vulnerability-database/cve/cve-2025-47981
https://www.cert.at/de/warnungen/2025/7/kritische-sicherheitslucke-cve-2025-47981-in-windows-spnego-update-dringend-empfohlen
https://www.helpnetsecurity.com/2025/07/09/microsoft-fixes-critical-wormable-windows-flaw-cve-2025-47981/
https://zeropath.com/blog/windows-spnego-cve-2025-47981-rce
Completely irrelevant to the topic. Your Flair is fucking
⋆༺☠︎ คฬєร๏๓є ☠︎︎༻⋆

Back to your regular comments now.
/u/amicursed
1 points
1 week ago
yo change my fucking flair why the fuck
there is a pussy in my flair ?
It's called the "Whiny Cunt" Flair. You got it because you deserved it.
/u/amicursed
1 points
1 week ago
i'm not happy btw
And you're still whining about it.
/u/amicursed
1 points
1 week ago
I have a doubt only mods can change users flair if they subscribed to sub right so if i unsubscribe then flair should disappear isn't it ?
/u/amicursed
1 points
1 week ago
/u/beelzebub kindly remove my shit flair from opsec and dreadmoments sub it's irritating to even use this profile
so kindly remove it or i have report this to admins
Please show me where the naughty mod touched you.
/u/amicursed
1 points
1 week ago
opsec , dreadmoments etc u moderate
i don't need flair at all remove completely
/u/amicursed
1 points
1 week ago
then put that flair urself if u like it that much
/u/Cyberjagu 📢 💀⃤
1 points
1 week ago
ahhahahha thank you comrade ! what flair would you like on this sub ?
I'm never likely to comment in this sub again. Thanks for the offer. I don't think it's worth it.
/u/Cyberjagu 📢 💀⃤
1 points
1 week ago
damn you made me sad

⠀⠀⠀⠀⢀⡤⠖⠋⠉⠉⠉⠉⠙⠲⣦⣀⠀⠀⠀⠀⠀
⠀⠀⠀⡴⠋⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⠻⣦⡀⠀⠀⠀
⠀⠀⡼⢁⡠⢼⠁⠀⢱⢄⣀⠀⠀⠀⠀⠀⠎⢿⡄⠀⠀
⠀⣸⠁⠀⣧⣼⠀⠀⣧⣼⠉⠀⠀⠀⠀⠀⠐⢬⣷⠀⠀
⡼⣿⢀⠀⣿⡟⠀⠀⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⢹⣧⠀
⣇⢹⠀⠁⠈⠀⠉⠃⠈⠃⠀⠀⠀⠀⠀⠀⠀⠀⡰⢸⡇
⠙⢿⣧⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⣏⣈⣉⣤⠿⠁
⠀⣠⣾⣿⠤⡀⠀⠀⠀⠀⠀⢀⣤⣶⣿⣿⣿⣿⣅⠀⠀
⢰⣧⣿⣿⣿⣦⣉⡐⠒⠒⢲⣿⣿⣿⣿⣿⣿⣶⣿⣧⠀
⠘⠿⢿⣿⣿⣿⡿⠿⠛⠿⠿⠿⣿⣿⣿⣿⣿⣿⡿⠟⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠉⠉
My normal Flair in most subs is a warning.I am the 𝕻𝖗i𝖓𝖈eof𝕷ie𝖘
/u/mr_asur P
1 points
1 week ago
Prince of ?
Lies. It's a biblical thing. Satan is referred to as the Prince of Lies.
/u/BitterBlotter
2 points
1 week ago
"wormable"
What a nice term.
/u/Cyberjagu 📢 💀⃤
1 points
1 week ago
it's still better than worms in the butt XD
/u/BitterBlotter
1 points
1 week ago
True that :D
/u/amicursed
1 points
1 week ago
I really like if there is a vul in windows but many ppl don't know abt it ...
/u/Cyberjagu 📢 💀⃤
1 points
1 week ago
i agree ppl want to spread executables from raas operators but don't want to know and learn this all sad ;(

and exploit devs these days 📈📈📈📈📈
/u/killy0urselfnigg4
1 points
1 week ago
if someone already have an honeypot on windows contact me
i am ready to help you build the exploit and give you a % of what inside the victim if you can reach them even better