CVE-2025-26635 Windows Hello Security Feature Bypass Vulnerability
Published April 8, 2025
Weak authentication in Windows Hello allows an authorized attacker to bypass a security feature over a network.
Published April 8, 2025
Weak authentication in Windows Hello allows an authorized attacker to bypass a security feature over a network.
Published April 8, 2025
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
Published April 8, 2025
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
Published April 8, 2025
Use after free in Windows Win32K – GRFX allows an unauthorized attacker to elevate privileges over a network.
Published April 8, 2025
Improper privilege management in Microsoft AutoUpdate (MAU) allows an authorized attacker to elevate privileges locally.
Published April 8, 2025
Concurrent execution using shared resource with improper synchronization (‘race condition’) in Windows Secure Channel allows an authorized attacker to elevate privileges locally.
Published April 8, 2025
Uncontrolled resource consumption in Windows LDAP – Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.
Published April 8, 2025
Integer overflow or wraparound in Windows USB Print Driver allows an authorized attacker to elevate privileges locally.
Published April 8, 2025
Incomplete list of disallowed inputs in Microsoft Office OneNote allows an unauthorized attacker to bypass a security feature locally.
Published April 8, 2025
Out-of-bounds read in Windows NTFS allows an unauthorized attacker to disclose information locally.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.