Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: Microsoft says that some USB printers will start printing random text after installing Windows updates released since late January 2025. [...]
Source: BleepingComputer
March 12th, 2025 (about 1 month ago)
🚨 Marked as known exploited on April 10th, 2025 (10 days ago).
Description: Microsoft on Tuesday released security updates to address 57 security vulnerabilities in its software, including a whopping six zero-days that it said have been actively exploited in the wild. Of the 56 flaws, six are rated Critical, 50 are rated Important, and one is rated Low in severity. Twenty-three of the addressed vulnerabilities are remote code execution bugs and 22 relate to privilege
Source: TheHackerNews
March 12th, 2025 (about 1 month ago)
Description: How to report emails to the NCSC's Suspicious Email Reporting Service (SERS) using the 'Report Phishing' add-in for Microsoft Outlook 365.
Source: NCSC Alerts and Advisories
March 12th, 2025 (about 1 month ago)
Description: Microsoft has released its monthly security update for March of 2025 which includes 57 vulnerabilities affecting a range of products, including 6 that Microsoft marked as “critical”. 
Source: Cisco Talos Blog
March 11th, 2025 (about 1 month ago)
Description: The number of zero-day vulnerabilities getting patched in Microsoft's March update is the company's second-largest ever.
Source: Dark Reading
March 11th, 2025 (about 1 month ago)
Description: Improper isolation or compartmentalization in Azure PromptFlow allows an unauthorized attacker to execute code over a network. References https://nvd.nist.gov/vuln/detail/CVE-2025-24986 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24986 https://github.com/microsoft/promptflow/commit/5f4a41ab4cb15607ade7f26138b0b863b4e4eb0a https://github.com/microsoft/promptflow/commit/625061724c51533d28fe6e0e3014b1042afdb07f https://github.com/advisories/GHSA-gprr-v9f2-px3c

CVSS: MEDIUM (6.5)

EPSS Score: 0.09%

Source: Github Advisory Database (PIP)
March 11th, 2025 (about 1 month ago)
Description: Improper isolation or compartmentalization in Azure PromptFlow allows an unauthorized attacker to execute code over a network. References https://nvd.nist.gov/vuln/detail/CVE-2025-24986 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24986 https://github.com/microsoft/promptflow/commit/5f4a41ab4cb15607ade7f26138b0b863b4e4eb0a https://github.com/microsoft/promptflow/commit/625061724c51533d28fe6e0e3014b1042afdb07f https://github.com/advisories/GHSA-gprr-v9f2-px3c

CVSS: MEDIUM (6.5)

EPSS Score: 0.09%

Source: Github Advisory Database (PIP)
March 11th, 2025 (about 1 month ago)
🚨 Marked as known exploited on April 10th, 2025 (10 days ago).
Description: Microsoft has released its March 2025 Patch Tuesday security updates, addressing 57 vulnerabilities across its product lineup, including six zero-day flaws that were actively exploited in the wild. The update covers security issues affecting Windows, Microsoft Office, Azure, and other components. Microsoft fixes 6 zero-day vulnerabilities Among the most critical fixes in this month’s update … The post Microsoft March 2025 ‘Patch Tuesday’ Updates Fix Six Actively Exploited Flaws appeared first on CyberInsider.
Source: CyberInsider
March 11th, 2025 (about 1 month ago)
Description: Microsoft Security Advisory CVE-2025-24070: .NET Elevation of Privilege Vulnerability Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in ASP.NET Core 9.0 , ASP.NET Core 8.0, and ASP.NET Core 2.3. This advisory also provides guidance on what developers can do to update their applications to address this vulnerability. A vulnerability exists in ASP.NET Core applications calling RefreshSignInAsync with an improperly authenticated user parameter that could allow an attacker to sign into another user's account, resulting in Elevation of Privilege. Announcement Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/348 Mitigation factors Microsoft has not identified any mitigating factors for this vulnerability. Affected software Any ASP.NET Core 9.0 application running on ASP.NET Core 9.0.2 or earlier. Any ASP.NET Core application running on ASP.NET Core 8.0.13 or earlier. Any ASP.NET Core 2.x application consuming the package Microsoft.AspNetCore.Identity version 2.3.0 or earlier. Affected Packages The vulnerability affects any Microsoft .NET Core project if it uses any of affected packages versions listed below Package name Affected version Patched version Microsoft.AspNetCore.Identity 2.3.0 2.3.1 ASP.NET Core 9 Package name Affected version Patched version Microsoft.AspNetCore.App.Runtime.linux-arm >= 9.0.0, <= 9.0.2 9.0.3 Microsoft.AspNetCore.App.Runtime.linux-...

CVSS: HIGH (7.0)

EPSS Score: 0.16%

Source: Github Advisory Database (Nuget)
March 11th, 2025 (about 1 month ago)
Description: Microsoft Security Advisory CVE-2025-24070: .NET Elevation of Privilege Vulnerability Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in ASP.NET Core 9.0 , ASP.NET Core 8.0, and ASP.NET Core 2.3. This advisory also provides guidance on what developers can do to update their applications to address this vulnerability. A vulnerability exists in ASP.NET Core applications calling RefreshSignInAsync with an improperly authenticated user parameter that could allow an attacker to sign into another user's account, resulting in Elevation of Privilege. Announcement Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/348 Mitigation factors Microsoft has not identified any mitigating factors for this vulnerability. Affected software Any ASP.NET Core 9.0 application running on ASP.NET Core 9.0.2 or earlier. Any ASP.NET Core application running on ASP.NET Core 8.0.13 or earlier. Any ASP.NET Core 2.x application consuming the package Microsoft.AspNetCore.Identity version 2.3.0 or earlier. Affected Packages The vulnerability affects any Microsoft .NET Core project if it uses any of affected packages versions listed below Package name Affected version Patched version Microsoft.AspNetCore.Identity 2.3.0 2.3.1 ASP.NET Core 9 Package name Affected version Patched version Microsoft.AspNetCore.App.Runtime.linux-arm >= 9.0.0, <= 9.0.2 9.0.3 Microsoft.AspNetCore.App.Runtime.linux-...

CVSS: HIGH (7.0)

EPSS Score: 0.16%

Source: Github Advisory Database (Nuget)
March 11th, 2025 (about 1 month ago)