Security Vulnerabilities
- CVEs Published In December 2025
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
Use after free in Windows Shell allows an authorized attacker to elevate privileges locally.
Integer underflow (wrap or wraparound) in Windows Hyper-V allows an authorized attacker to deny service over a network.
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
Out-of-bounds write in Azure Monitor Agent allows an authorized attacker to execute code over a network.
Relative path traversal in Microsoft Office Access allows an unauthorized attacker to execute code locally.