Sunday, April 26, 2026
HomeTagsVulnerability

Tag: Vulnerability

Microsoft Entra ID Vulnerability Enables Privilege Escalation to Global Administrator

A critical vulnerability in Microsoft's Entra ID (formerly Azure Active Directory) that allows attackers to escalate privileges and impersonate any user with Global Administrator privileges. The privilege escalation technique leverages a fundamental weakness in how Microsoft's first-party applications handle authentication credentials. Attackers who compromise...

Oracle Cloud Code Editor 1-Click RCE Vulnerability Allows Remote Shell Access via Malicious File Upload

A critical Remote Code Execution (RCE) vulnerability in Oracle Cloud Infrastructure's (OCI) Code Editor that enabled attackers to silently hijack users' Cloud Shell environments through a single malicious webpage visit. The vulnerability, now remediated by Oracle, exploited a Cross-Site Request Forgery (CSRF) vulnerability that...

SharePoint RCE Vulnerability Exploited via Malicious XML in Web Part

A serious remote code execution vulnerability has been discovered in Microsoft SharePoint that allows attackers to execute arbitrary code through malicious XML payloads embedded within Web Part components. The vulnerability, which affects SharePoint version 15.0.5145.1000 and potentially others, exploits the deserialization process of WebPart...

Hackers Exploited CitrixBleed 2 Vulnerability Ahead of Public PoC Release

The vulnerability, designated CVE-2025-5777 and dubbed "CitrixBleed 2," represents a significant security concern for organizations relying on Citrix infrastructure. Cybersecurity researchers at GreyNoise have discovered that malicious actors began exploiting a critical vulnerability in Citrix NetScaler systems nearly two weeks before a public proof-of-concept became...

Cisco Intelligence Center Vulnerability Enables Remote File Upload Attacks

Cisco disclosed a critical weakness within the web-based management interface of its Unified Intelligence Center (CUIC) that can be exploited by authenticated remote attackers to upload arbitrary files. Tracked as CVE-2025-20274 and carrying a CVSS base score of 6.3, the flaw stems from insufficient...

Google’s AI ‘Big Sleep’ Identifies SQLite 0-Day Vulnerability in Active Use

Google's artificial intelligence-powered security tool Big Sleep has achieved a cybersecurity milestone by discovering and preventing the active exploitation of a critical zero-day vulnerability in SQLite, marking what the company believes is the first time an AI agent has directly thwarted real-world cyberattacks. This...