VMware has fixed critical security flaws in Cloud Foundation, vCenter Server, and vSphere ESXi. These flaws could be used for privilege escalation and remote code execution.
Apple has issued an urgent security advisory about 3 critical zero-day vulnerabilities—CVE-2025-24200, CVE-2025-24201, and CVE-2025-24085—that are being actively exploited in...
Canon has announced a critical security vulnerability, CVE-2025-1268, in printer drivers for its production printers, multifunction printers, and laser printers....
Cybersecurity researcher Jeremiah Fowler recently revealed a sensitive data exposure involving the Australian fintech company Vroom by YouX, previously known...
Multiple heap-overflow vulnerabilities in the implementation of the DCE/RPC protocol that could allow an unauthorized individual with network access to vCenter Server to achieve remote code execution by exploiting a specifically crafted network packet.
Multiple sudo misconfiguration vulnerabilities in VMware vCenter that an authenticated local user with non-administrative privileges could exploit to obtain root permissions.
QiAnXin LegendSec researchers Hao Zheng and Zibo Li found and reported CVE-2024-37079 and CVE-2024-37080. Matei “Mal” Badanoiu from Deloitte Romania discovered CVE-2024-37081.
The issues in vCenter Server versions 7.0 and 8.0 have been fixed in versions 7.0 U3r, 8.0 U1e, and 8.0 U2d.
Although there are no reports of the vulnerabilities being exploited, it’s important for users to quickly apply the patches due to their critical nature.