Microsoft Releases Windows 11 Cumulative Updates (KB5063878, KB5063875) August 2025 with New Features
Microsoft Releases Windows 11 Cumulative Updates (KB5063878, KB5063875) August 2025 with New Features Microsoft has released the Windows 11 August 2025 Cumulative Updates, KB5063878 for version 24H2 and KB5063875 for versions 22H2 and 23H2, delivering critical stability fixes and new features released … Read more Published Date: Aug 12, 2025 (2 hours, 30 minutes ago) Vulnerabilities has […]
Researchers Spot XZ Utils Backdoor in Dozens of Docker Hub Images, Fueling Supply Chain Risks
Researchers Spot XZ Utils Backdoor in Dozens of Docker Hub Images, Fueling Supply Chain Risks Aug 12, 2025Ravie LakshmananMalware / Container Security New research has uncovered Docker images on Docker Hub that contain the infamous XZ Utils backdoor, more than a year after the discovery of t … Read more Published Date: Aug 12, 2025 […]
CVE-2025-53793 – Azure Stack Authentication Bypass
The following table lists the changes that have been made to the CVE-2025-53793 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 12, 2025 Action […]
CVE-2025-53789 – Windows StateRepository API Local Privilege Escalation
The following table lists the changes that have been made to the CVE-2025-53789 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 12, 2025 Action […]
CVE-2025-53788 – Windows Subsystem for Linux TOCTOU Privilege Escalation
The following table lists the changes that have been made to the CVE-2025-53788 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 12, 2025 Action […]
CVE-2025-53784 – Microsoft Office Word Use After Free Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-53784 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 12, 2025 Action […]
CVE-2025-53783 – Microsoft Teams Heap Buffer Overflow Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-53783 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 12, 2025 Action […]
CVE-2025-53781 – Azure Virtual Machines Information Exposure Vulnerability
The following table lists the changes that have been made to the CVE-2025-53781 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 12, 2025 Action […]
CVE-2025-53779 – Microsoft Windows Kerberos Path Traversal Privilege Escalation
The following table lists the changes that have been made to the CVE-2025-53779 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 12, 2025 Action […]
CVE-2025-53772 – Web Deploy Untrusted Data Deserialization Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-53772 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 12, 2025 Action […]