Dirty Frag exposes Linux systems to root escalation through chained kernel flaws, impacting Ubuntu, RHEL, Fedora, and others.
Dirty Frag is a newly disclosed Linux local privilege escalation vulnerability affecting kernel networking and ...
A new Linux zero-day exploit, named Dirty Frag, allows local attackers to gain root privileges on most major Linux ...
A high-severity Linux vulnerability, “Copy Fail” (CVE-2026-31431), enables root privilege escalation across cloud ...
A newly uncovered Linux kernel flaw shows how a low-complexity exploit can bypass traditional defenses and escalate privileges across shared environments, reinforcing the need for faster patch cycles ...
Google LLC’s Mandiant has published details of a critical privilege escalation vulnerability found in Microsoft Corp.’s Azure Kubernetes service that, though patched by Microsoft, could have allowed ...
A mis-scoped Agent ID Administrator role in Entra ID allowed users to take ownership of unrelated service principals, enabling potential privilege escalation and tenant-wide impact.
A GCP Cloud Run known as "ImageRunner" would have enabled privilege escalation for threat actors who obtained low-level credentials had Google not addressed the vulnerability in January. Tenable on ...
Several big-name Linux and BSD operating systems are vulnerable to an exploit that gives untrusted users powerful root privileges. The critical flaw in the X.org server—the open-source implementation ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results