MSRC Reports
58 subscribers
2.57K links
Microsoft Security Response Center Reports
(Unofficial).

Reports usually come in bursts, because that's just how Microsoft releases them.
Download Telegram
CVE-2025-62556 Microsoft Excel Remote Code Execution Vulnerability

Microsoft is announcing the availability of the security updates for Microsoft Office for Mac. Customers running affected Mac software should install the update for their product to be protected from this vulnerability. Customers running other Microsoft Office software do not need to take any action. See the [Release Notes](https://go.microsoft.com/fwlink/p/?linkid=831049) for more information and download links.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62556
CVE-2025-62555 Microsoft Word Remote Code Execution Vulnerability

Microsoft is announcing the availability of the security updates for Microsoft Office for Mac. Customers running affected Mac software should install the update for their product to be protected from this vulnerability. Customers running other Microsoft Office software do not need to take any action. See the [Release Notes](https://go.microsoft.com/fwlink/p/?linkid=831049) for more information and download links.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62555
CVE-2025-62554 Microsoft Office Remote Code Execution Vulnerability

Microsoft is announcing the availability of the security updates for Microsoft Office for Mac. Customers running affected Mac software should install the update for their product to be protected from this vulnerability. Customers running other Microsoft Office software do not need to take any action. See the [Release Notes](https://go.microsoft.com/fwlink/p/?linkid=831049) for more information and download links.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62554
CVE-2025-62564 Microsoft Excel Remote Code Execution Vulnerability

Microsoft is announcing the availability of the security updates for Microsoft Office for Mac. Customers running affected Mac software should install the update for their product to be protected from this vulnerability. Customers running other Microsoft Office software do not need to take any action. See the [Release Notes](https://go.microsoft.com/fwlink/p/?linkid=831049) for more information and download links.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62564
CVE-2025-62562 Microsoft Outlook Remote Code Execution Vulnerability

Microsoft is announcing the availability of the security updates for Microsoft Office for Mac. Customers running affected Mac software should install the update for their product to be protected from this vulnerability. Customers running other Microsoft Office software do not need to take any action. See the [Release Notes](https://go.microsoft.com/fwlink/p/?linkid=831049) for more information and download links.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62562
CVE-2025-62561 Microsoft Excel Remote Code Execution Vulnerability

Microsoft is announcing the availability of the security updates for Microsoft Office for Mac. Customers running affected Mac software should install the update for their product to be protected from this vulnerability. Customers running other Microsoft Office software do not need to take any action. See the [Release Notes](https://go.microsoft.com/fwlink/p/?linkid=831049) for more information and download links.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62561
CVE-2025-2296 Un-verified kernel bypass Secure Boot mechanism in direct boot mode

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-2296
CVE-2025-68258 comedi: multiq3: sanitize config options in multiq3_attach()

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-68258
CVE-2025-68188 tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check()

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-68188
CVE-2025-68217 Input: pegasus-notetaker - fix potential out-of-bounds access

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-68217
CVE-2025-68281 ASoC: SDCA: bug fix while parsing mipi-sdca-control-cn-list

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-68281
CVE-2025-68222 pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-68222
CVE-2025-68220 net: ethernet: ti: netcp: Standardize knav_dma_open_channel to return NULL on error

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-68220
CVE-2025-68256 staging: rtl8723bs: fix out-of-bounds read in rtw_get_ie() parser

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-68256
CVE-2025-68227 mptcp: Fix proto fallback detection with BPF

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-68227
CVE-2025-68236 scsi: ufs: ufs-qcom: Fix UFS OCP issue during UFS power down (PC=3)

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-68236
CVE-2025-68265 nvme: fix admin request_queue lifetime

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-68265
CVE-2025-58098 Apache HTTP Server: Server Side Includes adds query string to #exec cmd=...

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58098
CVE-2025-66471 urllib3 Streaming API improperly handles highly compressed data

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66471
CVE-2025-66200 Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66200
CVE-2025-12385 Improper validation of tag size in Text component parser

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12385