CVE-2025-24991 Windows NTFS Information Disclosure Vulnerability

Out-of-bounds read in Windows NTFS allows an authorized attacker to disclose information locally.


CVE-2025-24054 NTLM Hash Disclosure Spoofing Vulnerability

External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.


CVE-2025-24987 Windows USB Video Class System Driver Elevation of Privilege Vulnerability

Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to elevate privileges with a physical attack.


CVE-2025-24985 Windows Fast FAT File System Driver Remote Code Execution Vulnerability

Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally.


CVE-2025-24051 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.


CVE-2025-24986 Azure Promptflow Remote Code Execution Vulnerability

Improper isolation or compartmentalization in Azure PromptFlow allows an unauthorized attacker to execute code over a network.


CVE-2025-24984 Windows NTFS Information Disclosure Vulnerability

Insertion of sensitive information into log file in Windows NTFS allows an unauthorized attacker to disclose information with a physical attack.


CVE-2025-24050 Windows Hyper-V Elevation of Privilege Vulnerability

Heap-based buffer overflow in Role: Windows Hyper-V allows an authorized attacker to elevate privileges locally.


CVE-2025-24083 Microsoft Office Remote Code Execution Vulnerability

Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally.


CVE-2022-30170 Windows Credential Roaming Service Elevation of Privilege Vulnerability

In the Security Updates table added Windows Server 2022, 23H2 Edition (Server Core installation) as it is affected by this vulnerability. Microsoft recommends that customers install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

AbuseIPDB Contributor Badge