Security
Headlines
HeadlinesLatestCVEs

Source

Microsoft Security Response Center

CVE-2025-59291: Confidential Azure Container Instances Elevation of Privilege Vulnerability

External control of file name or path in Azure Compute Gallery allows an authorized attacker to elevate privileges over a network.

Microsoft Security Response Center
#vulnerability#auth#Confidential Azure Container Instances#Security Vulnerability
CVE-2025-59290: Windows Bluetooth Service Elevation of Privilege Vulnerability

**What privileges could be gained by an attacker who successfully exploited this vulnerability?** An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.

CVE-2025-59295: Windows URL Parsing Remote Code Execution Vulnerability

**According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?** The user would have to click a specially crafted button for the attacker to successfully exploit the vulnerability.

CVE-2025-59294: Windows Taskbar Live Preview Information Disclosure Vulnerability

**What type of information could be disclosed by this vulnerability?** The type of information that could be disclosed if an attacker successfully exploited this vulnerability is secrets or privileged information belonging to the user of the affected application.

CVE-2025-59292: Azure Compute Gallery Elevation of Privilege Vulnerability

External control of file name or path in Azure Compute Gallery allows an authorized attacker to elevate privileges over a network.

CVE-2025-59288: Playwright Spoofing Vulnerability

Improper verification of cryptographic signature in GitHub allows an unauthorized attacker to perform spoofing over an adjacent network.

CVE-2025-59284: Windows NTLM Spoofing Vulnerability

Exposure of sensitive information to an unauthorized actor in Windows NTLM allows an unauthorized attacker to perform spoofing locally.

CVE-2025-54132: GitHub CVE-2025-54132: Arbitrary Image Fetch in Mermaid Diagram Tool

Ai command injection in Visual Studio allows an authorized attacker to disclose information over a network.