CVE-2025-29809 Windows Kerberos Security Feature Bypass Vulnerability
Published April 8, 2025
Insecure storage of sensitive information in Windows Kerberos allows an authorized attacker to bypass a security feature locally.
Published April 8, 2025
Insecure storage of sensitive information in Windows Kerberos allows an authorized attacker to bypass a security feature locally.
Published April 8, 2025
Use after free in Windows Shell allows an unauthorized attacker to execute code locally.
Published April 8, 2025
Use after free in RPC Endpoint Mapper Service allows an authorized attacker to elevate privileges locally.
Published April 8, 2025
Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.
Published April 8, 2025
Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.
Published April 8, 2025
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
Published April 8, 2025
Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.
Published April 8, 2025
Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally.
Published April 8, 2025
Improper link resolution before file access (‘link following’) in Windows Installer allows an authorized attacker to elevate privileges locally.
Published April 8, 2025
Improper access control in Windows Defender Application Control (WDAC) allows an unauthorized attacker to bypass a security feature locally.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.