Security
Headlines
HeadlinesLatestCVEs

Tag

#Security Vulnerability

CVE-2025-55232: Microsoft High Performance Compute (HPC) Pack Remote Code Execution Vulnerability

Customers should make sure the HPC Pack clusters are running in a trusted network secured by firewall rules especially for the TCP port 5999.

Microsoft Security Response Center
#vulnerability#microsoft#rce#Microsoft High Performance Compute Pack (HPC)#Security Vulnerability
CVE-2025-55228: Windows Graphics Component Remote Code Execution Vulnerability

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to execute code locally.

CVE-2025-53807: Windows Graphics Component Elevation of Privilege Vulnerability

**What privileges could be gained by an attacker who successfully exploited the vulnerability?** An attacker who successfully exploited this vulnerability could gain specific limited SYSTEM privileges.

CVE-2025-55316: Azure Connected Machine Agent Elevation of Privilege Vulnerability

\*\*What privileges could be gained by an attacker who successfully exploited this vulnerability? \*\* An attacker can deploy VM Extensions on compromised Servers

CVE-2025-55243: Microsoft OfficePlus Spoofing Vulnerability

Exposure of sensitive information to an unauthorized actor in Microsoft Office Plus allows an unauthorized attacker to perform spoofing over a network.

CVE-2025-53803: Windows Kernel Memory Information Disclosure Vulnerability

Generation of error message containing sensitive information in Windows Kernel allows an authorized attacker to disclose information locally.

CVE-2025-53802: Windows Bluetooth Service Elevation of Privilege Vulnerability

**What privileges could be gained by an attacker who successfully exploited this vulnerability?** An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.

CVE-2025-53800: Windows Graphics Component Elevation of Privilege Vulnerability

**What privileges could be gained by an attacker who successfully exploited this vulnerability?** An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.