Security
Headlines
HeadlinesLatestCVEs

Latest News

CVE-2025-59494: Azure Monitor Agent Elevation of Privilege Vulnerability

Improper access control in Azure Monitor Agent allows an authorized attacker to elevate privileges locally.

Microsoft Security Response Center
#vulnerability#auth#Azure Monitor Agent#Security Vulnerability
CVE-2025-59295: Windows URL Parsing Remote Code Execution Vulnerability

**According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?** The user would have to click a specially crafted button for the attacker to successfully exploit the vulnerability.

CVE-2025-59294: Windows Taskbar Live Preview Information Disclosure Vulnerability

**What type of information could be disclosed by this vulnerability?** The type of information that could be disclosed if an attacker successfully exploited this vulnerability is secrets or privileged information belonging to the user of the affected application.

CVE-2025-59292: Azure Compute Gallery Elevation of Privilege Vulnerability

External control of file name or path in Azure Compute Gallery allows an authorized attacker to elevate privileges over a network.

CVE-2025-59288: Playwright Spoofing Vulnerability

Improper verification of cryptographic signature in GitHub allows an unauthorized attacker to perform spoofing over an adjacent network.

CVE-2025-59284: Windows NTLM Spoofing Vulnerability

Exposure of sensitive information to an unauthorized actor in Windows NTLM allows an unauthorized attacker to perform spoofing locally.

CVE-2025-59280: Windows SMB Client Tampering Vulnerability

Improper authentication in Windows SMB Server allows an authorized attacker to perform tampering over a network.

CVE-2025-59277: Windows Authentication Elevation of Privilege Vulnerability

**How could an attacker exploit this vulnerability?** To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.