Jump to content
Microsoft Windows Bulletin Board

Windows Security

Active Members
  • Posts

    1215
  • Joined

  • Last visited

    Never

Everything posted by Windows Security

  1. Insertion of sensitive information into log file in Windows NTFS allows an unauthorized attacker to disclose information with a physical attack.View the full article
  2. Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally.View the full article
  3. Out-of-bounds read in Windows NTFS allows an authorized attacker to disclose information locally.View the full article
  4. Buffer over-read in Windows NTFS allows an unauthorized attacker to disclose information locally.View the full article
  5. Heap-based buffer overflow in Windows NTFS allows an unauthorized attacker to execute code locally.View the full article
  6. Stack-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.View the full article
  7. Improper neutralization of special elements used in a command ('command injection') in Azure Command Line Integration (CLI) allows an unauthorized attacker to elevate privileges locally.View the full article
  8. Improper access control in Windows Cross Device Service allows an authorized attacker to elevate privileges locally.View the full article
  9. Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally.View the full article
  10. Relative path traversal in Remote Desktop Client allows an unauthorized attacker to execute code over a network.View the full article
  11. Heap-based buffer overflow in Windows Core Messaging allows an authorized attacker to elevate privileges over a network.View the full article
  12. Improper neutralization of special elements used in a command ('command injection') in Azure Arc allows an authorized attacker to elevate privileges locally.View the full article
  13. Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.View the full article
  14. Use after free in Microsoft Office Access allows an unauthorized attacker to execute code locally.View the full article
  15. Uncontrolled search path element in Visual Studio Code allows an authorized attacker to elevate privileges locally.View the full article
  16. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2025) for more information.View the full article
  17. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2025) for more information.View the full article
  18. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2025) for more information.View the full article
  19. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2025) for more information.View the full article
  20. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2025) for more information.View the full article
  21. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2025) for more information.View the full article
  22. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2025) for more information.View the full article
  23. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2025) for more information.View the full article
  24. This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2025) for more information.View the full article
  25. No cwe for this issue in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.View the full article
×
×
  • Create New...