Inductive Automation’s Ignition platform is the subject of a fresh, high‑impact advisory that warns an authenticated administrator can upload a malicious project containing Python scripts (Jython) which the Ignition Gateway executes with the Gateway service account privileges — and on Windows...
Microsoft shipped a November patch that it said fixed a privilege‑escalation defect in Windows 11’s new Administrator Protection feature — but independent researchers say the remedy was incomplete, and public records show the exchange between Google’s Project Zero and Microsoft has not produced...
Security researchers have uncovered a two-stage threat targeting the Windows Remote Access Connection Manager (RasMan) that turns a patched but difficult-to-exploit elevation-of-privilege flaw into a practical, abuse-ready local code-execution vector — and a third-party vendor has already issued...
A high‑severity privilege‑escalation flaw in Panoramic Dental Imaging software (tracked as CVE‑2024‑22774) allows a local standard user to gain NT AUTHORITY\SYSTEM privileges through DLL hijacking in an unmanaged SDK component, forcing dental clinics and hospital imaging teams to treat every...
Microsoft’s security index added a new entry today: CVE-2025-64669, an Elevation of Privilege (EoP) vulnerability affecting Windows Admin Center that Microsoft classifies as improper access control and assigns a CVSS v3.1 base score of 7.8 (High). Background / Overview
Windows Admin Center (WAC)...
CISA’s decision to add two recently disclosed flaws — a WinRAR path‑traversal bug (CVE-2025-6218) and a Windows Cloud Files mini‑filter use‑after‑free (CVE-2025-62221) — to the Known Exploited Vulnerabilities (KEV) Catalog crystallizes a simple reality for defenders: time-to-fix is shrinking and...
CVE-2025-64679 — Windows DWM Core Library: what we know, why it matters, and what to do now
Summary — in one line
CVE-2025-64679 is a vendor‑recorded heap‑based buffer‑overflow in the Windows Desktop Window Manager (DWM) core library that can be abused by a local, authorized actor to escalate...
Microsoft’s security index added CVE-2025-64680 on December 9, 2025 — a high‑impact elevation‑of‑privilege flaw in the Windows Desktop Window Manager (DWM) Core Library that vendors and multiple public trackers classify as a heap‑based buffer overflow with a CVSS v3.1 base score of 7.8 (High)...
Microsoft’s security trackers and multiple independent feeds recorded CVE-2025-64661 as a Windows Shell elevation-of-privilege (EoP) vulnerability rooted in a race condition (concurrent execution using a shared resource with improper synchronization). The vulnerability is scored as High (CVSS...
Microsoft’s advisory for CVE-2025-62565 confirms a use‑after‑free bug in the Windows Shell (File Explorer) that can be triggered by an authorized local user to escalate privileges to SYSTEM; the vendor has recorded the issue in its Security Update Guide and independent trackers currently rate it...
Microsoft has recorded a local elevation-of-privilege bug in the Brokering File System (BFS) under the identifier CVE-2025-62569, a use‑after‑free (UAF) condition that Microsoft and multiple vulnerability trackers classify as a high‑severity, local-only threat requiring a low‑privilege starting...
Microsoft's December security update contains another reminder that old, system-level services can still be an attractive target for attackers: CVE-2025-62474 is an elevation of privilege vulnerability affecting the Windows Remote Access Connection Manager (RasMan) component, and system...
Microsoft has published a new high‑severity local Elevation‑of‑Privilege advisory: CVE‑2025‑62464, a buffer over‑read in the Windows Projected File System (ProjFS) that can allow an authorized local attacker to escalate to higher privileges on affected hosts. Public trackers assign a CVSS v3.1...
Microsoft’s December 9 Patch Tuesday closed out the year with another kernel-area elevation‑of‑privilege that targets the Windows Projected File System (ProjFS): CVE‑2025‑55233 is an out‑of‑bounds read in ProjFS that Microsoft has recorded in its Security Update Guide and which third‑party...
A Microsoft-tracked report identified as CVE-2025-62461 has been linked in some discussion threads to a Windows “Projected File System” (ProjFS) elevation-of-privilege issue, but exhaustive checks of vendor feeds and public vulnerability trackers show no authoritative technical advisory or KB...
Microsoft has published an advisory for CVE-2025-62455, a newly recorded elevation-of-privilege vulnerability in Microsoft Message Queuing (MSMQ) that affects installations where the MSMQ component is present and accessible; the vendor entry confirms the vulnerability identifier but offers only...
Microsoft has assigned CVE‑2025‑59517 to a newly disclosed elevation‑of‑privilege flaw in the Windows Storage VSP driver — the kernel‑mode component Hyper‑V uses to provide storage services to guest partitions. The bug is described as improper access control that allows an authorized local...
Microsoft has recorded a new kernel‑level vulnerability, CVE‑2025‑59516, in the Windows Storage Virtualization Service Provider (VSP) driver that can allow a local, authorized attacker to escalate privileges on affected hosts by invoking a missing authentication path in the driver—Microsoft’s...
Microsoft’s security advisory for CVE-2025-62573 identifies a use‑after‑free bug in the DirectX Graphics Kernel that can be abused by an authenticated local user to escalate privileges to SYSTEM, and administrators should treat the issue as a high‑impact kernel elevation‑of‑privilege (EoP) risk...
Microsoft’s security tracker has recorded CVE‑2025‑64658, a newly assigned elevation‑of‑privilege vulnerability tied to Windows File Explorer / the Windows Shell; the public details describe a race condition (CWE‑362) in the Shell that can allow an authorized local user to escalate privileges...