Kategorie: Allgemein

CVE-2025-53773 GitHub Copilot and Visual Studio Remote Code Execution Vulnerability

Improper neutralization of special elements used in a command (‚command injection‘) in GitHub Copilot and Visual Studio allows an unauthorized attacker to execute code locally.

CVE-2025-53149 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability

Heap-based buffer overflow in Kernel Streaming WOW Thunk Service Driver allows an authorized attacker to elevate privileges locally.

CVE-2025-24999 Microsoft SQL Server Elevation of Privilege Vulnerability

Improper access control in SQL Server allows an authorized attacker to elevate privileges over a network.

CVE-2025-53147 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

CVE-2025-50162 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.

CVE-2025-50161 Win32k Elevation of Privilege Vulnerability

Heap-based buffer overflow in Windows Win32K – GRFX allows an authorized attacker to elevate privileges locally.

CVE-2025-53144 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability

Access of resource using incompatible type (‚type confusion‘) in Windows Message Queuing allows an authorized attacker to execute code over a network.

CVE-2025-53142 Microsoft Brokering File System Elevation of Privilege Vulnerability

Use after free in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally.

CVE-2025-25006 Microsoft Exchange Server Spoofing Vulnerability

Improper handling of additional special element in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.

CVE-2025-49707 Azure Virtual Machines Spoofing Vulnerability

Improper access control in Azure Virtual Machines allows an authorized attacker to perform spoofing locally.