CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network. |
Use after free in Desktop Windows Manager allows an authorized attacker to elevate privileges locally. |
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally. |
Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network. |
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network. |
Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. |
Improper validation of syntactic correctness of input in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network. |
Improper handling of additional special element in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network. |
Improper input validation in Microsoft Exchange Server allows an authorized attacker to perform tampering over a network. |
Untrusted pointer dereference in Windows MBT Transport driver allows an authorized attacker to elevate privileges locally. |
Improper authorization in Microsoft PC Manager allows an unauthorized attacker to elevate privileges over a network. |
Improper access control in Azure Databricks allows an unauthorized attacker to elevate privileges over a network. |
On April 18th 2025, Microsoft announced Exchange Server Security Changes for Hybrid Deployments and accompanying non-security Hot Fix. Microsoft made these changes in the general interest of improving the security of hybrid Exchange deployments. Following further investigation, Microsoft identified specific security implications tied to the guidance and configuration steps outlined in the April announcement. Microsoft is issuing CVE-2025-53786 to document a vulnerability that is addressed by taking the steps documented with the April 18th announcement. Microsoft strongly recommends reading the information, installing the April 2025 (or later) Hot Fix and implementing the changes in your Exchange Server and hybrid environment. |
Exposure of sensitive information to an unauthorized actor in Azure Virtual Machines allows an authorized attacker to disclose information over a network. |
Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to execute code locally. |
Deserialization of untrusted data in Web Deploy allows an authorized attacker to execute code over a network. |
Improper access control in SQL Server allows an authorized attacker to elevate privileges over a network. |
Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally. |
Server-side request forgery (ssrf) in Microsoft Office SharePoint allows an authorized attacker to elevate privileges over a network. |