Autor: Peter Leibling

CVE-2025-53768 Xbox IStorageService Elevation of Privilege Vulnerability

Use after free in Xbox allows an authorized attacker to elevate privileges locally.

CVE-2025-55326 Windows Connected Devices Platform Service (Cdpsvc) Remote Code Execution Vulnerability

Use after free in Connected Devices Platform Service (Cdpsvc) allows an unauthorized attacker to execute code over a network.

CVE-2025-58720 Windows Cryptographic Services Information Disclosure Vulnerability

Use of a cryptographic primitive with a risky implementation in Windows Cryptographic Services allows an authorized attacker to disclose information locally.

CVE-2025-55248 .NET, .NET Framework, and Visual Studio Information Disclosure Vulnerability

Inadequate encryption strength in .NET, .NET Framework, Visual Studio allows an authorized attacker to disclose information over a network.

CVE-2025-55331 Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability

Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally.

CVE-2025-59233 Microsoft Excel Remote Code Execution Vulnerability

Access of resource using incompatible type (‚type confusion‘) in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

CVE-2025-55328 Windows Hyper-V Elevation of Privilege Vulnerability

Concurrent execution using shared resource with improper synchronization (‚race condition‘) in Windows Hyper-V allows an authorized attacker to elevate privileges locally.

CVE-2025-59231 Microsoft Excel Remote Code Execution Vulnerability

Access of resource using incompatible type (‚type confusion‘) in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

CVE-2025-59228 Microsoft SharePoint Remote Code Execution Vulnerability

Improper input validation in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

CVE-2025-59244 NTLM Hash Disclosure Spoofing Vulnerability

External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network.