Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
VMware’s Critical Flaw Fix Frenzy: Patch Now or Pay Later!
VMware has released updates to address critical flaws in Cloud Foundation, vCenter Server, and vSphere ESXi that could lead to privilege escalation and remote code execution. Users are urged to patch immediately to avoid potential exploits.

Hot Take:
Looks like VMware’s servers had more holes than Swiss cheese, but the good news is they’ve decided to play patchwork quilt and sew them up. Time to get patching, folks! Those hackers won’t wait for your coffee break.
Key Points:
- VMware released updates to fix critical flaws in Cloud Foundation, vCenter Server, and vSphere ESXi.
- Two vulnerabilities, CVE-2024-37079 and CVE-2024-37080, could allow remote code execution with CVSS scores of 9.8.
- Another vulnerability, CVE-2024-37081, allows local privilege escalation with a CVSS score of 7.8.
- These vulnerabilities have been patched in vCenter Server versions 7.0 U3r, 8.0 U1e, and 8.0 U2d.
- No known exploits in the wild yet, but users are urged to patch immediately due to the critical nature of the flaws.