A critical vulnerability (CVE-2025-32463) in Linux sudo versions 1.9.14 to 1.9.17 allows local attackers to escalate privileges to root using…
Read More »privilege escalation
A critical privilege escalation vulnerability (CVE-2025-41244) in Broadcom's VMware software has been actively exploited since October 2024, allowing attackers to…
Read More »A critical vulnerability (CVE-2025-42957) in SAP S/4HANA allows attackers to execute unauthorized code and gain administrative control. Despite a patch…
Read More »Google has released a security update addressing over 100 Android vulnerabilities, including two actively exploited flaws that could compromise devices…
Read More »A critical vulnerability (CVE-2025-25256) in Fortinet's FortiSIEM platform allows unauthenticated attackers to execute arbitrary code, prompting urgent patching efforts due…
Read More »A security flaw in KernelSU 0.5.7 allows attackers to bypass authentication and gain root access on Android devices by exploiting…
Read More »EntraGoat is an open-source tool that simulates real-world vulnerabilities in Microsoft Entra ID environments, enabling hands-on learning without affecting live…
Read More »A critical Microsoft Exchange vulnerability (CVE-2025-53786, CVSS 8.0) threatens hybrid cloud environments, enabling privilege escalation across on-premises and cloud systems…
Read More »Microsoft warns of a critical Exchange Server vulnerability (CVE-2025-53786) allowing privilege escalation in hybrid cloud environments due to a shared…
Read More »A security flaw in Azure Machine Learning (AML) allows attackers with basic storage access to escalate privileges, execute malicious code,…
Read More »Linux administrators must urgently patch two new Sudo vulnerabilities (CVE-2025-32462 and CVE-2025-32463), which allow local attackers to escalate privileges and…
Read More »A critical security flaw (CVE-2025-49144) in Notepad++ versions up to 8.8.1 could allow attackers to execute malicious code with SYSTEM-level…
Read More »Federal agencies are urgently patching a critical Linux kernel vulnerability (CVE-2023-0386) that allows attackers to gain root access via OverlayFS,…
Read More »Two critical Linux vulnerabilities (CVE-2025-6018 and CVE-2025-6019) allow attackers to gain full system control by chaining exploits, affecting major distributions…
Read More »