Security
Headlines
HeadlinesLatestCVEs

Latest News

CVE-2025-53783: Microsoft Teams Remote Code Execution Vulnerability

Heap-based buffer overflow in Microsoft Teams allows an unauthorized attacker to execute code over a network.

Microsoft Security Response Center
#vulnerability#microsoft#rce#buffer_overflow#auth#Microsoft Teams#Security Vulnerability
CVE-2025-53728: Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability

Exposure of sensitive information to an unauthorized actor in Microsoft Dynamics 365 (on-premises) allows an unauthorized attacker to disclose information over a network.

CVE-2025-53726: Windows Push Notifications Apps Elevation of Privilege Vulnerability

**What privileges could be gained by an attacker who successfully exploited the vulnerability?** An attacker could use this vulnerability to elevate privileges from a Low Integrity Level in a contained ("sandboxed") execution environment to a Medium Integrity Level. Please refer to AppContainer isolation and Mandatory Integrity Control for more information.

CVE-2025-53725: Windows Push Notifications Apps Elevation of Privilege Vulnerability

**What privileges could be gained by an attacker who successfully exploited the vulnerability?** An attacker could use this vulnerability to elevate privileges from a Low Integrity Level in a contained ("sandboxed") execution environment to a Medium Integrity Level. Please refer to AppContainer isolation and Mandatory Integrity Control for more information.

CVE-2025-53724: Windows Push Notifications Apps Elevation of Privilege Vulnerability

Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally.

CVE-2025-53155: Windows Hyper-V Elevation of Privilege Vulnerability

**How could an attacker exploit this vulnerability?** An authenticated attacker could create a crafted vhdx file and can call the vhdmp api with vhdx as one of the arguments.

CVE-2025-53154: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

**What privileges could be gained by an attacker who successfully exploited the vulnerability?** An attacker who successfully exploited this vulnerability could gain administrator privileges.