Security Vulnerabilities
- CVEs Published In August 2025
Improper authentication in Azure Stack allows an unauthorized attacker to disclose information over a network.
Improper authentication in Windows NTLM allows an authorized attacker to elevate privileges over a network.
Relative path traversal in Windows Kerberos allows an authorized attacker to elevate privileges over a network.
Exposure of sensitive information to an unauthorized actor in Azure Virtual Machines allows an authorized attacker to disclose information over a network.
Heap-based buffer overflow in Microsoft Teams allows an unauthorized attacker to execute code over a network.
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.
Exposure of private personal information to an unauthorized actor in Azure Stack allows an authorized attacker to disclose information locally.
Heap-based buffer overflow in Windows GDI+ allows an unauthorized attacker to execute code over a network.
External control of file name or path in Windows Security App allows an authorized attacker to perform spoofing locally.