Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

7 total results found

Critical Zero-day Vulnerabilities in VMware ESXi, Workstation, and Fusion

Broadcom has addressed three exploited vulnerabilities that, when chained, can allow an attacker to access the hypervisor through a running virtual machine

Year
2025
Severity
High
Threat type
Insecure software

Exploited Unauthenticated RCE Vulnerability CVE-2023-6548 in Citrix NetScaler ADC and NetScaler Gateway

New intelligence shows that exploitation of this RCE vulnerability does not require authentication

Year
2024
Severity
High
Threat type
Insecure software

Critical Veeam Backup & Replication Vulnerability Under Active Exploitation

Successful exploitation of CVE-2024-40711 could lead to remote code execution

Year
2024
Severity
High
Threat type
Insecure software

Exploited Critical Vulnerability CVE-2024-47575 in Fortinet FortiManager

This critical vulnerability could lead to unauthenticated arbitrary code execution

Year
2024
Severity
High
Threat type
Insecure software

Exploitation of Critical Vulnerabilities in VMware vCenter Server and Cloud Foundation

Exploitation reported for critical vulnerabilities CVE-2024-38812 and CVE-2024-38813

Year
2024
Severity
High
Threat type
Insecure software

Exploitation of critical path traversal vulnerability (CVE-2024-41713) and 0-day path traversal vulnerability (CVE-2024-55550) in Mitel MiCollab

Evidence of chained exploitation of path traversal vulnerabilities affecting Mitel MiCollab following public release of proof-of-concept code  

Year
2024
Severity
High
Threat type
Insecure software

Broadcom has addressed three exploited vulnerabilities that, when chained, can allow an attacker to access the hypervisor through a running virtual machine Threat ID: CC-4627 Threat Severity

Critical Zero-day Vulnerabilities in VM...

Threat ID:CC-4627 Threat Severity:High Published:4 March 2025 4:11 PM Summary Broadcom has addressed three exploited vulnerabilities that, when chained, can allow an attacker to access the hypervisor through a running virtual machine Affec...

Year
2025
Severity
High
Threat type
Insecure software