CVE-2025-24071 Microsoft Windows File Explorer Spoofing Vulnerability
Published March 11, 2025
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
Published March 11, 2025
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
Published March 11, 2025
Improper link resolution before file access (‘link following’) in Microsoft Windows allows an authorized attacker to elevate privileges locally.
Published March 11, 2025
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
Published March 11, 2025
Use after free in Microsoft Office Access allows an unauthorized attacker to execute code locally.
Published March 11, 2025
Heap-based buffer overflow in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally.
Published March 11, 2025
Uncontrolled search path element in Visual Studio allows an authorized attacker to elevate privileges locally.
Published March 11, 2025
Weak authentication in ASP.NET Core & Visual Studio allows an unauthorized attacker to elevate privileges over a network.
Published March 11, 2025
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
Published March 11, 2025
Heap-based buffer overflow in Windows Kernel-Mode Drivers allows an authorized attacker to elevate privileges locally.
Published March 11, 2025
Uncontrolled search path element in Visual Studio allows an authorized attacker to elevate privileges locally.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.