Jump to content
Microsoft Windows Bulletin Board

Windows Security

Active Members
  • Posts

    1215
  • Joined

  • Last visited

    Never

Everything posted by Windows Security

  1. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.View the full article
  2. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.View the full article
  3. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.View the full article
  4. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.View the full article
  5. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information. Google is aware of reports that an exploit for CVE-2025-24201 exists in the wild.View the full article
  6. In the Security Updates table added Windows Server 2022, 23H2 Edition (Server Core installation) as it is affected by this vulnerability. Microsoft recommends that customers install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.View the full article
  7. Protection mechanism failure in Windows Mark of the Web (MOTW) allows an unauthorized attacker to bypass a security feature locally.View the full article
  8. Use after free in DNS Server allows an unauthorized attacker to execute code over a network.View the full article
  9. Heap-based buffer overflow in Windows Kernel-Mode Drivers allows an authorized attacker to elevate privileges locally.View the full article
  10. Heap-based buffer overflow in Windows Telephony Server allows an unauthorized attacker to execute code over a network.View the full article
  11. Incorrect conversion between numeric types in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.View the full article
  12. Heap-based buffer overflow in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally.View the full article
  13. Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.View the full article
  14. External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.View the full article
  15. Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to disclose information with a physical attack.View the full article
  16. Use after free in Microsoft Local Security Authority Server (lsasrv) allows an authorized attacker to elevate privileges locally.View the full article
  17. Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network.View the full article
  18. Improper privilege management in Azure Agent Installer allows an authorized attacker to elevate privileges locally.View the full article
  19. Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.View the full article
  20. Heap-based buffer overflow in Role: Windows Hyper-V allows an authorized attacker to elevate privileges locally.View the full article
  21. Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.View the full article
  22. Uncontrolled search path element in Visual Studio allows an authorized attacker to elevate privileges locally.View the full article
  23. Improper link resolution before file access ('link following') in Microsoft Windows allows an authorized attacker to elevate privileges locally.View the full article
  24. Use after free in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally.View the full article
  25. Heap-based buffer overflow in Role: Windows Hyper-V allows an authorized attacker to elevate privileges locally.View the full article
×
×
  • Create New...