Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
More Stories
USN-7508-1: Open VM Tools vulnerability
It was discovered that Open VM Tools incorrectly handled certain file operations. An attacker in a guest could use this...
firefox-138.0.3-1.fc40
FEDORA-2025-cc8d7b6c6d Packages in this update: firefox-138.0.3-1.fc40 Update description: New upstream update (138.0.3) Update to latest upstream (138.0) Read More
USN-7506-4: Linux kernel (Xenial HWE) vulnerabilities
Demi Marie Obenour and Simon Gaiser discovered that several Xen para- virtualization device frontends did not properly restrict the access...
xen-4.19.2-4.fc42
FEDORA-2025-b3d59fca78 Packages in this update: xen-4.19.2-4.fc42 Update description: x86: Indirect Target Selection [XSA-469, CVE-2024-28956] Read More
perl-Mojolicious-9.39-1.fc41
FEDORA-2025-c38fd06bec Packages in this update: perl-Mojolicious-9.39-1.fc41 Update description: Mojolicious versions from 0.999922 through 9.39 for Perl uses a hard coded...
perl-Mojolicious-9.39-1.fc40
FEDORA-2025-0e7fe5534f Packages in this update: perl-Mojolicious-9.39-1.fc40 Update description: Mojolicious versions from 0.999922 through 9.39 for Perl uses a hard coded...