CVE Alert: CVE-2025-54112 – Microsoft – Windows 10 Version 1809
CVE-2025-54112 HIGHNo exploitation known Use after free in Microsoft Virtual Hard Drive allows an authorized attacker to elevate privileges locally....
CVE-2025-54112 HIGHNo exploitation known Use after free in Microsoft Virtual Hard Drive allows an authorized attacker to elevate privileges locally....
CVE-2025-54105 HIGHNo exploitation known Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Brokering File System allows...
CVE-2025-54103 HIGHNo exploitation known Use after free in Windows Management Services allows an unauthorized attacker to elevate privileges locally. CVSS...
CVE-2025-54102 HIGHNo exploitation known Use after free in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges...
CVE-2025-54091 HIGHNo exploitation known Integer overflow or wraparound in Windows Hyper-V allows an authorized attacker to elevate privileges locally. CVSS...
CVE-2025-54092 HIGHNo exploitation known Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Hyper-V allows an authorized...
CVE-2025-54098 HIGHNo exploitation known Improper access control in Windows Hyper-V allows an authorized attacker to elevate privileges locally. CVSS v3.1...
CVE-2025-54093 HIGHNo exploitation known Time-of-check time-of-use (toctou) race condition in Windows TCP/IP allows an authorized attacker to elevate privileges locally....
CVE-2025-54099 HIGHNo exploitation known Stack-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate...
Who, Me? Monday mornings see the resumption of endless coopetition between IT folks and those they strive to serve but...
When is an outage not an outage? According to Canonical's forum, it's when a 36-minute server disruption creates a multi-day...
AI upstart Anthropic has agreed to create a $1.5 billion fund it will use to compensate authors whose works it...
All work in IT departments will be done with the help of AI by 2030, according to analyst firm Gartner,...
Infosec in brief The US Cybersecurity and Infrastructure Security Agency (CISA) has said two flaws in routers made by Chinese...
The latest release candidate for Linux is out, but before its release, Linus Torvalds had something he wanted to get...
Microsoft's tussle with UK-based reseller ValueLicensing over the sale of secondhand licenses returns to the UK's Competition Appeal Tribunal this...
IBM-owned subsidiary Red Hat is docking a bunch of its back-office staff, along with the techies that support them, into...
Crims have added backdoors to at least 18 npm packages after developer Josh Junon inadvertently authorized a reset of the...
The Salesloft Drift breach that compromised "hundreds" of companies including Google, Palo Alto Networks, and Cloudflare, all started with miscreants...
Exclusive Sensitive info from hundreds of thousands of gym customers and staff – including names, financial details, and potentially biometric...
US courts have warned of delays as PACER, the system for accessing court documents, struggles to support users enrolling in...
Streaming platform Plex is warning some users to reset their passwords after suffering yet another breach.The popular media server provider,...
During the two-hour window on Monday in which hijacked npm versions were available for download, malware-laced packages reached one in...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...