Microsoft Windows Installer Service Link Following Local Privilege Escalation Vulnerability (CVE-2025-21373)
CVE-2025-21373 – This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows.
Read MoreArticles on SystemTek’s website that relate to cyber security.
CVE-2025-21373 – This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows.
Read MoreCVE-2025-21404 – This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Edge.
Read MoreCVE number = CVE-2025-0690 The read command is used to read the keyboard input from the user, while reads it
Read MoreA vulnerability (CVE-2025-20153) in the email filtering mechanism of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to bypass the configured rules and allow emails that should have been denied to flow through an affected device.
Read MoreThe Qualys Threat Research Unit (TRU) has discovered two vulnerabilities in OpenSSH. The first, identified as CVE-2025-26465, enables an active machine-in-the-middle attack on the OpenSSH client when the VerifyHostKeyDNS option is turned on. The second, CVE-2025-26466, impacts both the OpenSSH client and server, allowing a pre-authentication denial-of-service attack.
Read MoreCVE-2025-23359 – This vulnerability allows remote attackers to escalate privileges on affected installations of NVIDIA Container Toolkit.
Read MoreCVE-2025-1391 – A flaw was found in the Keycloak organization feature, which allows the incorrect assignment of an organization to a user if their username or email matches the organization’s domain pattern.
Read MoreCVE number = CVE-2025-21103 Dell NetWorker Management Console, version(s) 19.11 through 19.11.0.3 & Versions prior to 19.10.0.7 contain(s) an improper
Read MoreCVE number = CVE-2025-0113 A problem with the network isolation mechanism of the Palo Alto Networks Cortex XDR Broker VM
Read MoreCVE-2025-23359 – NVIDIA Container Toolkit for Linux contains a Time-of-Check Time-of-Use (TOCTOU) vulnerability when used with default configuration, where a crafted container image could gain access to the host file system.
Read More