code execution

Winsage
August 14, 2025
Microsoft has addressed 67 vulnerabilities in its supported Windows versions, including Windows 10, Windows 11, and Windows Server. Users on Windows 7 and Windows 8.1 have not received updates for some time. Upgrading to Windows 11 24H2 is recommended for continued protection. Two critical remote code execution (RCE) vulnerabilities are CVE-2025-53766, affecting the Graphics Device Interface API, and CVE-2025-50165, impacting the Windows Graphics Component. Both can be exploited by visiting a specially crafted website. Three critical vulnerabilities in Hyper-V include CVE-2025-48807, which allows code execution from a guest system to the host; CVE-2025-53781, which poses a data leak risk; and CVE-2025-49707, a spoofing vulnerability. Additionally, 12 vulnerabilities in the Routing and Remote Access Service (RRAS) have been addressed, with half classified as RCE vulnerabilities and the other half as data leaks. CVE-2025-53779, affecting Kerberos for Windows Server 2025, could allow an attacker to gain administrator rights under specific conditions, but is classified as medium risk.
Winsage
August 13, 2025
Check Point Research identified six new vulnerabilities in Microsoft Windows, including one classified as critical. These vulnerabilities could lead to system crashes, arbitrary code execution, or expose sensitive data. Check Point reported these issues to Microsoft, resulting in patches released on August 12th. One significant vulnerability is in a Rust-based Windows kernel component, which can cause total system crashes. Two other vulnerabilities, CVE-2025-30388 and CVE-2025-53766, allow for arbitrary code execution when users interact with specially crafted files. Additionally, CVE-2025-47984 can leak memory contents over the network, posing risks of sensitive information exposure. Check Point's security solutions already protect its customers from these threats, and users are encouraged to apply the August Patch Tuesday updates promptly.
Winsage
August 12, 2025
A series of vulnerabilities have been identified across various Microsoft platforms, categorized by severity. Critical Vulnerabilities: - CVE-2025-49707: Azure Virtual Machines Spoofing Vulnerability - CVE-2025-53781: Azure Virtual Machines Information Disclosure Vulnerability - CVE-2025-53793: Azure Stack Hub Information Disclosure Vulnerability - CVE-2025-50176: DirectX Graphics Kernel Remote Code Execution Vulnerability - CVE-2025-50165: Windows Graphics Component Remote Code Execution Vulnerability Important Vulnerabilities: - CVE-2025-53729: Microsoft Azure File Sync Elevation of Privilege Vulnerability - CVE-2025-53152: Desktop Windows Manager Remote Code Execution Vulnerability - CVE-2025-53732: Microsoft Office Remote Code Execution Vulnerability - CVE-2025-53740: Microsoft Office Remote Code Execution Vulnerability - CVE-2025-53738: Microsoft Word Remote Code Execution Vulnerability Windows Operating System Vulnerabilities: - CVE-2025-50170: Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability - CVE-2025-53131: Windows Media Remote Code Execution Vulnerability - CVE-2025-50158: Windows NTFS Information Disclosure Vulnerability
Winsage
August 6, 2025
Microsoft has integrated OpenAI’s GPT model, gpt-oss-20b, into its Windows AI Foundry platform, allowing Windows 11 users to access advanced AI capabilities from their desktops. The model is optimized for agentic tasks and is compatible with consumer PCs and laptops with a minimum of 16GB of VRAM. gpt-oss-20b is a text-only model with a 53% hallucination rate on OpenAI’s PersonQA benchmark. Microsoft plans to extend its availability to macOS and other devices, and both gpt-oss-20b and its predecessor will be accessible through Microsoft’s Azure AI Foundry and Amazon’s AWS.
Winsage
August 6, 2025
OpenAI has released a new, free, and open GPT model called gpt-oss-20b, which can run on personal computers. Microsoft is facilitating its integration for Windows users through the Windows AI Foundry, with plans to extend support to macOS. The model requires a PC or laptop with at least 16GB of VRAM and is optimized for code execution and tool utilization. Microsoft has pre-optimized the model for local inference, indicating potential future support for more devices. This is the first instance of an OpenAI model running locally on Windows, coinciding with Amazon's adoption of the new open-weight GPT-OSS models for its cloud services.
Winsage
August 4, 2025
Security researchers at Genians Security Center discovered a new variant of the RoKRAT malware linked to the North Korean APT37 threat group. This malware uses steganography to hide malicious payloads within JPEG files, allowing it to evade traditional antivirus detection. It is typically distributed through malicious shortcut files within ZIP archives, often disguised as legitimate documents. The malware employs a two-stage encrypted shellcode injection method, utilizing PowerShell and batch scripts to execute its payloads in memory. It collects system information, documents, and screenshots, exfiltrating data via compromised cloud APIs. The command and control accounts associated with the malware are linked to Russian email services. Variants of RoKRAT have evolved to include different injection methods and reference specific PDB paths. Indicators of compromise include various MD5 hashes associated with the malware.
Tech Optimizer
August 4, 2025
A significant PostgreSQL vulnerability, CVE-2025–1094, was identified during the investigation of another vulnerability, CVE-2024–12356, which was exploited in the BeyondTrust breach in December 2024. The breach involved unauthorized access to BeyondTrust's systems and was linked to the state-sponsored hacking group Silk Typhoon from China. The U.S. Treasury Department confirmed its network was compromised through a stolen BeyondTrust API key. CVE-2025–1094 is an SQL injection vulnerability that allows attackers to execute arbitrary SQL commands due to improper handling of invalid UTF-8 byte sequences. Rapid7 found that CVE-2024–12356's exploitation relied on CVE-2025–1094, and that CVE-2025–1094 could be exploited independently. BeyondTrust issued patches for these vulnerabilities, but the patch for CVE-2024–12356 did not directly address the underlying cause of CVE-2025–1094. The exploitation of these vulnerabilities underscores the need for timely patching and proactive security measures in organizations using PostgreSQL.
Search