7.8
CVE-2025-47985 - Windows Event Tracing Elevation of Privilege Vulnerability
Untrusted pointer dereference in Windows Event Tracing allows an authorized attacker to elevate privileges locally.
7.5
CVE-2025-47984 - Windows GDI Information Disclosure Vulnerability
Protection mechanism failure in Windows GDI allows an unauthorized attacker to disclose information over a network.
7.8
CVE-2025-47976 - Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
Use after free in Windows SSDP Service allows an authorized attacker to elevate privileges locally.
8
CVE-2025-47972 - Windows Input Method Editor (IME) Elevation of Privilege Vulnerability
Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Input Method Editor (IME) allows an authorized attacker to elevate privileges over a network.
7.8
CVE-2025-47971 - Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability
Buffer over-read in Virtual Hard Disk (VHDX) allows an unauthorized attacker to elevate privileges locally.
6
CVE-2025-21195 - Azure Service Fabric Runtime Elevation of Privilege Vulnerability
Improper link resolution before file access ('link following') in Service Fabric allows an authorized attacker to elevate privileges locally.
7.8
CVE-2025-47159 - Windows Virtualization-Based Security (VBS) Elevation of Privilege Vulnerability
Protection mechanism failure in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally.
8.1
CVE-2025-33054 - Remote Desktop Spoofing Vulnerability
Insufficient UI warning of dangerous operations in Remote Desktop Client allows an unauthorized attacker to perform spoofing over a network.
5.5
CVE-2025-26636 - Windows Kernel Information Disclosure Vulnerability
Processor optimization removal or modification of security-critical code in Windows Kernel allows an authorized attacker to disclose information locally.
6.5
CVE-2025-53512 - Sensitive log retrieval in Juju
The /log endpoint on a Juju controller lacked sufficient authorization checks, allowing unauthorized users to access debug messages that could contain sensitive information.