{"id":5584,"date":"2025-08-14T02:39:03","date_gmt":"2025-08-14T02:39:03","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=5584"},"modified":"2025-08-14T02:39:04","modified_gmt":"2025-08-14T02:39:04","slug":"august-patch-tuesday-contains-blasts-from-the-latest-previous-sophos-information","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=5584","title":{"rendered":"August Patch Tuesday contains blasts from the (latest) previous \u2013 Sophos Information"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>Microsoft on Tuesday introduced 109 patches affecting 16 product households. Eighteen of the addressed points are thought-about by Microsoft to be of Important severity, and 31 have a CVSS base rating of 8.0 or increased, together with a \u201cexcellent\u201d 10.0 affecting Azure. None are recognized to be underneath energetic exploit within the wild, although two Home windows points (CVE-2025-53786 and CVE-2025-53779) are already publicly disclosed.<\/p>\n<p>At patch time, 9 CVEs are judged extra prone to be exploited within the subsequent 30 days by the corporate\u2019s estimation. Varied of this month\u2019s points are amenable to direct detection by Sophos protections, and we embody data on these in a desk beneath. As well as, eight CVEs included on this month\u2019s set, largely involving cloud-centric product households resembling Azure and 365, are already patched \u2013 together with the CVSS-10 merchandise talked about above. We now have included data on all eight in Appendix D. Curiously, two of these had been truly patched a full month in the past, within the July cycle, however a clerical mix-up left that data out of Microsoft\u2019s July launch supplies. We embody these two in our August depend. Advisory data on ten Edge fixes was additionally included on this month\u2019s launch, and could be seen in Appendix D.<\/p>\n<p>We&#8217;re as at all times together with on the finish of this submit further appendices itemizing all Microsoft\u2019s patches sorted by severity, by predicted exploitability timeline and CVSS Base rating, and by product household. One other appendix covers advisory-style updates and the listing of points mentioned on this month\u2019s launch supplies however mitigated previous to the discharge, and one other gives breakout of the patches affecting the varied Home windows Server platforms nonetheless in assist.<\/p>\n<p><strong>By the numbers<\/strong><\/p>\n<ul>\n<li>Whole CVEs: 109<\/li>\n<li>Publicly disclosed: 2*<\/li>\n<li>Exploit detected: 0<\/li>\n<li>Severity\n<ul>\n<li>Important: 18<\/li>\n<li>Essential: 90<\/li>\n<li>Average: 1<\/li>\n<\/ul>\n<\/li>\n<li>Affect\n<ul>\n<li>Elevation of Privilege: 44<\/li>\n<li>Distant Code Execution: 35<\/li>\n<li>Data Disclosure: 18<\/li>\n<li>Spoofing: 7<\/li>\n<li>Denial of Service: 4<\/li>\n<li>Tampering: 1<\/li>\n<\/ul>\n<\/li>\n<li>CVSS Base rating 10.0: 1<\/li>\n<li>CVSS Base rating 9.0 or better: 5<\/li>\n<li>CVSS Base rating 8.0 or better: 31<\/li>\n<\/ul>\n<p>* Microsoft\u2019s official launch materials states that only one vulnerability, CVE-2025-53779, is publicly disclosed by their requirements. Nonetheless, CVE-2025-53786 was publicly demonstrated at Black Hat final week and has been very broadly mentioned since then, with a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2025\/08\/06\/microsoft-releases-guidance-high-severity-vulnerability-cve-2025-53786-hybrid-exchange-deployments\">CISA Emergency Directive<\/a> issued. We embody it in our tally for completeness.<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/08\/pt2508-fig01.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-962353\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/08\/pt2508-fig01.png\" alt=\"A bar chart showing the impact and severity of bugs addressed in the August 2025 Patch Tuesday; described in article text\" width=\"640\" height=\"410\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/08\/pt2508-fig01.png 839w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/08\/pt2508-fig01.png?resize=300,192 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/08\/pt2508-fig01.png?resize=768,492 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\"\/><\/a><\/p>\n<p><em>Determine 1: Elevation of Privilege vulnerabilities outpace Distant Code Execution flaws for the second month in a row, however RCE points account for extra Important-severity patches<\/em><\/p>\n<p><strong>Merchandise<\/strong><\/p>\n<ul>\n<li>Home windows: 65*<\/li>\n<li>365: 16**<\/li>\n<li>Workplace: 16<\/li>\n<li>Azure: 7***<\/li>\n<li>SQL: 6<\/li>\n<li>Trade: 5<\/li>\n<li>Excel: 4<\/li>\n<li>SharePoint: 4<\/li>\n<li>Phrase: 3<\/li>\n<li>Dynamics 365: 2<\/li>\n<li>PowerPoint: 1<\/li>\n<li>Groups: 1<\/li>\n<li>Visible Studio: 1<\/li>\n<li>Net Deploy: 1<\/li>\n<li>Home windows Safety App: 1<\/li>\n<li>Home windows Subsystem for Linux (WSL2): 1<\/li>\n<\/ul>\n<p>* As talked about, the discharge data states that two of those had been patched with the July launch; we embody these two within the August counts right here and all through this submit.<\/p>\n<p>** Consists of two Important-severity patches for Microsoft 365 Copilot\u2019s Enterprise Chat.<\/p>\n<p>*** The discharge data notes that 4 of the Azure vulnerabilities have already been mitigated.<\/p>\n<p>As is our customized for this listing, CVEs that apply to a couple of product household are counted as soon as for every household they have an effect on. We observe, by the best way, that CVE names don\u2019t at all times mirror affected product households carefully. Specifically, some CVEs names within the Workplace household could point out merchandise that don\u2019t seem within the listing of merchandise affected by the CVE, and vice versa.<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/08\/pt2508-fig02.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-962354\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/08\/pt2508-fig02.png\" alt=\"A bar chart showing the product families addressed in the August 2025 Patch Tuesday; described in article text\" width=\"640\" height=\"452\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/08\/pt2508-fig02.png 830w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/08\/pt2508-fig02.png?resize=300,212 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/08\/pt2508-fig02.png?resize=768,542 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\"\/><\/a><\/p>\n<p><em>Determine 2: Home windows patches 5 Important-severity patches in August, however so do Azure and Workplace \u2013 and 365 has all of them beat with six<\/em><\/p>\n<p><strong>Notable August updates<\/strong><\/p>\n<p>Along with the problems mentioned above, quite a lot of particular gadgets advantage consideration.<\/p>\n<p><strong>CVE-2025-50165 \u2014 Home windows Graphics Element Distant Code Execution Vulnerability<br \/>CVE-2025-53766 \u2014 GDI+ Distant Code Execution Vulnerability<\/strong><\/p>\n<p>It\u2019s a tricky month for Home windows graphics-related componentry, as these two vulnerabilities weigh in with 9.8 CVSS Base scores. CVE-2025-50165 requires no person interplay, and could be exploited by an uninitialized operate pointer being known as when decoding a malicious JPEG, which may very well be embedded in a doc, a Net web page, or what you&#8217;ll. It impacts strictly the latest variations of Home windows (Win 11 2H24, Server 2025). Equally, CVE-2025-53766 may very well be triggered with out person interplay, ought to an attacker handle to add paperwork containing a specifically crafted metafile to an internet service. (Alternately, they might craft a doc containing the metafile, ship it to an unwary person, and get them to open it.) Unusually, this CVE impacts each Home windows and Workplace.<\/p>\n<p><strong>CVE-2025-49712 \u2014 Microsoft SharePoint Distant Code Execution Vulnerability<\/strong><\/p>\n<p>As most Microsoft observers know properly, there was <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/en-us\/2025\/07\/21\/sharepoint-toolshell-vulnerabilities-being-exploited-in-the-wild\/\">loads to say<\/a> between the July and August Patch Tuesday releases about SharePoint. This challenge, nonetheless, appears unrelated to ToolShell, although it\u2019s pretty disagreeable all by itself, permitting any authenticated attacker to execute code over the community with little prior information of the community required.<\/p>\n<p><strong>CVE-2025-53731, CVE-2025-53733, CVE-2025-53740, CVE-2025-53784 \u2013 4 365\/Workplace points<\/strong><\/p>\n<p>Preview Pane is a vector for all 4 of those vulnerabilities.<\/p>\n<p><strong>CVE-2025-53774, CVE-2025-53787 \u2014 Microsoft 365 Copilot BizChat Data Disclosure Vulnerability<\/strong><\/p>\n<p>These identically titled information-disclosure vulnerabilities, each Important-severity, are talked about in Microsoft\u2019s abstract data for August, however the firm notes that each have already been mitigated. Nonetheless, CVE-2025-53787 specifically didn&#8217;t go quietly, and web commenters had <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/windowsforum.com\/threads\/microsoft-patch-alerts-for-cve-2025-53787-safeguarding-business-ai-chat-features.376293\/\">issues to say<\/a> concerning the future implications of bugs of this nature. (It\u2019s fascinating to notice that earlier data from Microsoft, as per the WindowsForum submit, thought-about the problem to be Essential in severity; the discharge on Tuesday categorised it as Important.)<\/p>\n<p><strong>CVE-2025-53786 \u2014 Microsoft Trade Server Hybrid Deployment Elevation of Privilege Vulnerability<\/strong><\/p>\n<p>As famous above, this Essential-severity EoP challenge bought loads of consideration at Black Hat and from CISA earlier this month. It\u2019s a bug to be taken severely, and Microsoft states that they consider it\u2019s one of many vulnerabilities extra prone to be exploited throughout the first 30 days post-release. However the story of how this patch arrived at launch is an fascinating one from a disclosure standpoint. The finder, Dirk-jan Mollema\u00a0with\u00a0Outsider Safety, labored with Microsoft to type out the problem previous to his Black Hat presentation. In flip, Microsoft credit his discover of their launch supplies, an indication that the disclosure was well-coordinated. The difficulty itself pertains to an April hotfix for hybrid Trade deployments.<\/p>\n<p><strong>CVE-2024-53772 \u2014 Net Deploy Distant Code Execution Vulnerability<\/strong><\/p>\n<p>Net Deploy, for these not conversant in <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.iis.net\/downloads\/microsoft\/web-deploy\">the instrument<\/a>, is used to deploy Net purposes and Internet sites to IIS servers. It can seemingly be acquainted to customers of Visible Studio.<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/08\/pt2508-fig03.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-962355\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/08\/pt2508-fig03.png\" alt=\"A bar chart showing the impact and severity of bugs addressed in the 2025 Patch Tuesday releases; described in article text\" width=\"640\" height=\"410\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/08\/pt2508-fig03.png 850w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/08\/pt2508-fig03.png?resize=300,192 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/08\/pt2508-fig03.png?resize=768,492 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\"\/><\/a><\/p>\n<p><em>Determine 3: Distant Code Execution points proceed to steer all different varieties in 2025\u2019s Patch Tuesday releases, however Elevation of Privilege points are shut behind \u2013 266 to 257, by our depend. In the meantime, Spoofing picks up its first Important-severity case in August, and the primary non-advisory Average-severity patch of the 12 months is famous<\/em><\/p>\n<p><strong>Sophos protections<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"151\"><strong>CVE<\/strong><\/td>\n<td width=\"265\"><strong>Sophos Intercept X\/Endpoint IPS<\/strong><\/td>\n<td width=\"186\"><strong>Sophos XGS Firewall<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"151\">CVE-2025-49743<\/td>\n<td width=\"265\">Exp\/2549743-A<\/td>\n<td width=\"186\">Exp\/2549743-A<\/td>\n<\/tr>\n<tr>\n<td width=\"151\">CVE-2025-50167<\/td>\n<td width=\"265\">Exp\/2550167-A<\/td>\n<td width=\"186\">Exp\/2550167-A<\/td>\n<\/tr>\n<tr>\n<td width=\"151\">CVE-2025-50168<\/td>\n<td width=\"265\">Exp\/2550168-A<\/td>\n<td width=\"186\">Exp\/2550168-A<\/td>\n<\/tr>\n<tr>\n<td width=\"151\">CVE-2025-50177<\/td>\n<td width=\"265\">SID:2311472,2311473<\/td>\n<td width=\"186\">SID:2311472,2311473<\/td>\n<\/tr>\n<tr>\n<td width=\"151\">CVE-2025-53132<\/td>\n<td width=\"265\">Exp\/2553132-A<\/td>\n<td width=\"186\">Exp\/2553132-A<\/td>\n<\/tr>\n<tr>\n<td width=\"151\">CVE-2025-53147<\/td>\n<td width=\"265\">Exp\/2553147-A<\/td>\n<td width=\"186\">Exp\/2553147-A<\/td>\n<\/tr>\n<tr>\n<td width=\"151\">CVE-2025-53778<\/td>\n<td width=\"265\">SID:2311491<\/td>\n<td width=\"186\">SID:2311491<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>As you&#8217;ll be able to each month, when you don\u2019t wish to wait to your system to tug down Microsoft\u2019s updates itself, you&#8217;ll be able to obtain them manually from the Home windows Replace Catalog web site. Run the <strong>winver.exe <\/strong>instrument to find out which construct of Home windows 10 or 11 you\u2019re working, then obtain the Cumulative Replace package deal to your particular system\u2019s structure and construct quantity.<\/p>\n<p><strong>Appendix A: Vulnerability Affect and Severity<\/strong><\/p>\n<p>It is a listing of August patches sorted by affect, then sub-sorted by severity. Every listing is additional organized by CVE.<\/p>\n<p><strong>Elevation of Privilege (44 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-24999<\/td>\n<td width=\"470\">Microsoft SQL Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53767<\/td>\n<td width=\"470\">Azure OpenAI Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53778<\/td>\n<td width=\"470\">Home windows NTLM Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53792<\/td>\n<td width=\"470\">Azure Portal Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Essential severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-47954<\/td>\n<td width=\"470\">Microsoft SQL Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-49743<\/td>\n<td width=\"470\">Home windows Graphics Element Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-49758<\/td>\n<td width=\"470\">Microsoft SQL Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-49759<\/td>\n<td width=\"470\">Microsoft SQL Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-49761<\/td>\n<td width=\"470\">Home windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-49762<\/td>\n<td width=\"470\">Home windows Ancillary Perform Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-50153<\/td>\n<td width=\"470\">Desktop Home windows Supervisor Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-50155<\/td>\n<td width=\"470\">Home windows Push Notifications Apps Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-50159<\/td>\n<td width=\"470\">Distant Entry Level-to-Level Protocol (PPP) EAP-TLS Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-50161<\/td>\n<td width=\"470\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-50167<\/td>\n<td width=\"470\">Home windows Hyper-V Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-50168<\/td>\n<td width=\"470\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-50170<\/td>\n<td width=\"470\">Home windows Cloud Information Mini Filter Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-50173<\/td>\n<td width=\"470\">Home windows Installer Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53132<\/td>\n<td width=\"470\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53133<\/td>\n<td width=\"470\">Home windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53134<\/td>\n<td width=\"470\">Home windows Ancillary Perform Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53135<\/td>\n<td width=\"470\">DirectX Graphics Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53137<\/td>\n<td width=\"470\">Home windows Ancillary Perform Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53140<\/td>\n<td width=\"470\">Home windows Kernel Transaction Supervisor Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53141<\/td>\n<td width=\"470\">Home windows Ancillary Perform Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53142<\/td>\n<td width=\"470\">Microsoft Brokering File System Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53147<\/td>\n<td width=\"470\">Home windows Ancillary Perform Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53149<\/td>\n<td width=\"470\">Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53151<\/td>\n<td width=\"470\">Home windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53154<\/td>\n<td width=\"470\">Home windows Ancillary Perform Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53155<\/td>\n<td width=\"470\">Home windows Hyper-V Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53718<\/td>\n<td width=\"470\">Home windows Ancillary Perform Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53721<\/td>\n<td width=\"470\">Home windows Related Gadgets Platform Service Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53723<\/td>\n<td width=\"470\">Home windows Hyper-V Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53724<\/td>\n<td width=\"470\">Home windows Push Notifications Apps Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53725<\/td>\n<td width=\"470\">Home windows Push Notifications Apps Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53726<\/td>\n<td width=\"470\">Home windows Push Notifications Apps Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53727<\/td>\n<td width=\"470\">Microsoft SQL Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53729<\/td>\n<td width=\"470\">Microsoft Azure File Sync Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53760<\/td>\n<td width=\"470\">Microsoft SharePoint Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53786<\/td>\n<td width=\"470\">Microsoft Trade Server Hybrid Deployment Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53788<\/td>\n<td width=\"470\">Home windows Subsystem for Linux (WSL2) Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53789<\/td>\n<td width=\"470\">Home windows StateRepository API Server file Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Average severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53779<\/td>\n<td width=\"470\">Home windows Kerberos Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Distant Code Execution (35 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-48807<\/td>\n<td width=\"470\">Microsoft SQL Server Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-50165<\/td>\n<td width=\"470\">Home windows Graphics Element Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-50176<\/td>\n<td width=\"470\">DirectX Graphics Kernel Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-50177<\/td>\n<td width=\"470\">Microsoft Message Queuing (MSMQ) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53731<\/td>\n<td width=\"470\">Microsoft Workplace Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53733<\/td>\n<td width=\"470\">Microsoft Phrase Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53740<\/td>\n<td width=\"470\">Microsoft Workplace Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53766<\/td>\n<td width=\"470\">GDI+ Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53784<\/td>\n<td width=\"470\">Microsoft Phrase Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-48807<\/td>\n<td width=\"470\">Microsoft SQL Server Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Essential severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-49712<\/td>\n<td width=\"470\">Microsoft SharePoint Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-49757<\/td>\n<td width=\"470\">Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-50160<\/td>\n<td width=\"470\">Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-50162<\/td>\n<td width=\"470\">Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-50163<\/td>\n<td width=\"470\">Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-50164<\/td>\n<td width=\"470\">Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-50169<\/td>\n<td width=\"470\">Home windows SMB Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53131<\/td>\n<td width=\"470\">Home windows Media Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53143<\/td>\n<td width=\"470\">Microsoft Message Queuing (MSMQ) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53144<\/td>\n<td width=\"470\">Microsoft Message Queuing (MSMQ) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53145<\/td>\n<td width=\"470\">Microsoft Message Queuing (MSMQ) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53152<\/td>\n<td width=\"470\">Desktop Home windows Supervisor Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53720<\/td>\n<td width=\"470\">Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53730<\/td>\n<td width=\"470\">Microsoft Workplace Visio Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53732<\/td>\n<td width=\"470\">Microsoft Workplace Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53734<\/td>\n<td width=\"470\">Microsoft Workplace Visio Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53735<\/td>\n<td width=\"470\">Microsoft Excel Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53737<\/td>\n<td width=\"470\">Microsoft Excel Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53738<\/td>\n<td width=\"470\">Microsoft Phrase Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53739<\/td>\n<td width=\"470\">Microsoft Excel Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53741<\/td>\n<td width=\"470\">Microsoft Excel Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53759<\/td>\n<td width=\"470\">Microsoft Excel Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53761<\/td>\n<td width=\"470\">Microsoft PowerPoint Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53772<\/td>\n<td width=\"470\">Net Deploy Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53773<\/td>\n<td width=\"470\">GitHub Copilot and Visible Studio Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53783<\/td>\n<td width=\"470\">Microsoft Groups Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Data Disclosure (18 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53774<\/td>\n<td width=\"470\">Microsoft 365 Copilot BizChat Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53781<\/td>\n<td width=\"470\">Azure Digital Machines Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53787<\/td>\n<td width=\"470\">Microsoft 365 Copilot BizChat Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53793<\/td>\n<td width=\"470\">Azure Stack Hub Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Essential severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-33051<\/td>\n<td width=\"470\">Microsoft Trade Server Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-50156<\/td>\n<td width=\"470\">Home windows Routing and Distant Entry Service (RRAS) Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-50157<\/td>\n<td width=\"470\">Home windows Routing and Distant Entry Service (RRAS) Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-50158<\/td>\n<td width=\"470\">Home windows NTFS Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-50166<\/td>\n<td width=\"470\">Home windows Distributed Transaction Coordinator (MSDTC) Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53136<\/td>\n<td width=\"470\">NT OS Kernel Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53138<\/td>\n<td width=\"470\">Home windows Routing and Distant Entry Service (RRAS) Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53148<\/td>\n<td width=\"470\">Home windows Routing and Distant Entry Service (RRAS) Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53153<\/td>\n<td width=\"470\">Home windows Routing and Distant Entry Service (RRAS) Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53156<\/td>\n<td width=\"470\">Home windows Storage Port Driver Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53719<\/td>\n<td width=\"470\">Home windows Routing and Distant Entry Service (RRAS) Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53728<\/td>\n<td width=\"470\">Microsoft Dynamics 365 (On-Premises) Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53736<\/td>\n<td width=\"470\">Microsoft Phrase Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53765<\/td>\n<td width=\"470\">Azure Stack Hub Data Disclosure Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00a0<\/p>\n<p><strong>Spoofing (7 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-49707<\/td>\n<td width=\"470\">Azure Digital Machines Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Essential severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-25006<\/td>\n<td width=\"470\">Microsoft Trade Server Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-25007<\/td>\n<td width=\"470\">Microsoft Trade Server Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-49745<\/td>\n<td width=\"470\">Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-50154<\/td>\n<td width=\"470\">Microsoft Home windows File Explorer Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-50171<\/td>\n<td width=\"470\">Distant Desktop Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53769<\/td>\n<td width=\"470\">Home windows Safety App Spoofing Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00a0<\/p>\n<p><strong>Denial of Service (4 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Essential severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-49751<\/td>\n<td width=\"470\">Home windows Hyper-V Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-50172<\/td>\n<td width=\"470\">DirectX Graphics Kernel Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53716<\/td>\n<td width=\"470\">Native Safety Authority Subsystem Service (LSASS) Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53722<\/td>\n<td width=\"470\">Home windows Distant Desktop Providers\u00a0Denial of Service Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00a0<\/p>\n<p><strong>Tampering (1 CVE)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Essential severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-25005<\/td>\n<td width=\"470\">Microsoft Trade Server Tampering Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00a0<\/p>\n<p><strong>Appendix B: Exploitability and CVSS<\/strong><\/p>\n<p>It is a listing of the August CVEs judged by Microsoft to be extra prone to be exploited within the wild throughout the first 30 days post-release. (No CVE amongst this month\u2019s patches is thought to be already exploited within the wild, in order that listing doesn\u2019t seem this month.) The listing is additional organized by CVE.<\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Exploitation extra seemingly throughout the subsequent 30 days<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-49743<\/td>\n<td width=\"470\">Home windows Graphics Element Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-50167<\/td>\n<td width=\"470\">Home windows Hyper-V Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-50168<\/td>\n<td width=\"470\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-50177<\/td>\n<td width=\"470\">Microsoft Message Queuing (MSMQ) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53132<\/td>\n<td width=\"470\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53147<\/td>\n<td width=\"470\">Home windows Ancillary Perform Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53156<\/td>\n<td width=\"470\">Home windows Storage Port Driver Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53778<\/td>\n<td width=\"470\">Home windows NTLM Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"131\">CVE-2025-53786<\/td>\n<td width=\"470\">Microsoft Trade Server Hybrid Deployment Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00a0<\/p>\n<p>It is a listing of August\u2019s CVEs with a Microsoft-assessed CVSS Base rating of 8.0 or increased. They&#8217;re organized by rating and additional sorted by CVE. For extra data on how CVSS works, please see our sequence on <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/en-us\/2024\/12\/27\/prioritizing-patching-a-deep-dive-into-frameworks-and-tools-part-1-cvss\/\">patch prioritization schema<\/a>.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"47\"><strong>CVSS Base<\/strong><\/td>\n<td width=\"76\"><strong>CVSS Temporal<\/strong><\/td>\n<td width=\"123\"><strong>CVE<\/strong><\/td>\n<td width=\"356\"><strong>Title<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"47\">10.0<\/td>\n<td width=\"76\">8.7<\/td>\n<td width=\"123\">CVE-2025-53767<\/td>\n<td width=\"356\">Azure OpenAI Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">9.8<\/td>\n<td width=\"76\">8.5<\/td>\n<td width=\"123\">CVE-2025-50165<\/td>\n<td width=\"356\">Home windows Graphics Element Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">9.8<\/td>\n<td width=\"76\">8.5<\/td>\n<td width=\"123\">CVE-2025-53766<\/td>\n<td width=\"356\">GDI+ Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">9.1<\/td>\n<td width=\"76\">7.9<\/td>\n<td width=\"123\">CVE-2025-50171<\/td>\n<td width=\"356\">Distant Desktop Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">9.1<\/td>\n<td width=\"76\">7.9<\/td>\n<td width=\"123\">CVE-2025-53792<\/td>\n<td width=\"356\">Azure Portal Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">8.8<\/td>\n<td width=\"76\">7.7<\/td>\n<td width=\"123\">CVE-2025-24999<\/td>\n<td width=\"356\">Microsoft SQL Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">8.8<\/td>\n<td width=\"76\">7.7<\/td>\n<td width=\"123\">CVE-2025-47954<\/td>\n<td width=\"356\">Microsoft SQL Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">8.8<\/td>\n<td width=\"76\">7.7<\/td>\n<td width=\"123\">CVE-2025-49712<\/td>\n<td width=\"356\">Microsoft SharePoint Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">8.8<\/td>\n<td width=\"76\">7.7<\/td>\n<td width=\"123\">CVE-2025-49757<\/td>\n<td width=\"356\">Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">8.8<\/td>\n<td width=\"76\">7.7<\/td>\n<td width=\"123\">CVE-2025-49758<\/td>\n<td width=\"356\">Microsoft SQL Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">8.8<\/td>\n<td width=\"76\">7.7<\/td>\n<td width=\"123\">CVE-2025-49759<\/td>\n<td width=\"356\">Microsoft SQL Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">8.8<\/td>\n<td width=\"76\">7.7<\/td>\n<td width=\"123\">CVE-2025-50163<\/td>\n<td width=\"356\">Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">8.8<\/td>\n<td width=\"76\">7.7<\/td>\n<td width=\"123\">CVE-2025-53131<\/td>\n<td width=\"356\">Home windows Media Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">8.8<\/td>\n<td width=\"76\">7.7<\/td>\n<td width=\"123\">CVE-2025-53143<\/td>\n<td width=\"356\">Microsoft Message Queuing (MSMQ) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">8.8<\/td>\n<td width=\"76\">7.7<\/td>\n<td width=\"123\">CVE-2025-53144<\/td>\n<td width=\"356\">Microsoft Message Queuing (MSMQ) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">8.8<\/td>\n<td width=\"76\">7.7<\/td>\n<td width=\"123\">CVE-2025-53145<\/td>\n<td width=\"356\">Microsoft Message Queuing (MSMQ) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">8.8<\/td>\n<td width=\"76\">7.7<\/td>\n<td width=\"123\">CVE-2025-53727<\/td>\n<td width=\"356\">Microsoft SQL Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">8.8<\/td>\n<td width=\"76\">7.7<\/td>\n<td width=\"123\">CVE-2025-53772<\/td>\n<td width=\"356\">Net Deploy Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">8.8<\/td>\n<td width=\"76\">7.7<\/td>\n<td width=\"123\">CVE-2025-53778<\/td>\n<td width=\"356\">Home windows NTLM Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">8.4<\/td>\n<td width=\"76\">7.3<\/td>\n<td width=\"123\">CVE-2025-53731<\/td>\n<td width=\"356\">Microsoft Workplace Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">8.4<\/td>\n<td width=\"76\">7.3<\/td>\n<td width=\"123\">CVE-2025-53733<\/td>\n<td width=\"356\">Microsoft Phrase Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">8.4<\/td>\n<td width=\"76\">7.3<\/td>\n<td width=\"123\">CVE-2025-53740<\/td>\n<td width=\"356\">Microsoft Workplace Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">8.4<\/td>\n<td width=\"76\">7.3<\/td>\n<td width=\"123\">CVE-2025-53784<\/td>\n<td width=\"356\">Microsoft Phrase Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">8.2<\/td>\n<td width=\"76\">7.1<\/td>\n<td width=\"123\">CVE-2025-53787<\/td>\n<td width=\"356\">Microsoft 365 Copilot BizChat Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">8.1<\/td>\n<td width=\"76\">7.1<\/td>\n<td width=\"123\">CVE-2025-50177<\/td>\n<td width=\"356\">Microsoft Message Queuing (MSMQ) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">8.0<\/td>\n<td width=\"76\">7.0<\/td>\n<td width=\"123\">CVE-2025-50160<\/td>\n<td width=\"356\">Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">8.0<\/td>\n<td width=\"76\">7.0<\/td>\n<td width=\"123\">CVE-2025-50162<\/td>\n<td width=\"356\">Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">8.0<\/td>\n<td width=\"76\">7.0<\/td>\n<td width=\"123\">CVE-2025-50164<\/td>\n<td width=\"356\">Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">8.0<\/td>\n<td width=\"76\">7.0<\/td>\n<td width=\"123\">CVE-2025-53132<\/td>\n<td width=\"356\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">8.0<\/td>\n<td width=\"76\">7.0<\/td>\n<td width=\"123\">CVE-2025-53720<\/td>\n<td width=\"356\">Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"47\">8.0<\/td>\n<td width=\"76\">7.0<\/td>\n<td width=\"123\">CVE-2025-53786<\/td>\n<td width=\"356\">Microsoft Trade Server Hybrid Deployment Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00a0<\/p>\n<p><strong>Appendix C: Merchandise Affected<\/strong><\/p>\n<p>It is a listing of August\u2019s patches sorted by product household, then sub-sorted by severity. Every listing is additional organized by CVE. Patches which might be shared amongst a number of product households are listed a number of instances, as soon as for every product household. Sure vital points for which advisories have been issued are coated in Appendix D, and points affecting Home windows Server are additional sorted in Appendix E. All CVE titles are correct as made accessible by Microsoft; for additional data on why sure merchandise could seem in titles and never product households (or vice versa), please seek the advice of Microsoft.<\/p>\n<p><strong>Home windows (65 CVEs)<\/strong><\/p>\n<table width=\"601\">\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-50165<\/td>\n<td width=\"469\">Home windows Graphics Element Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-50176<\/td>\n<td width=\"469\">DirectX Graphics Kernel Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-50177<\/td>\n<td width=\"469\">Microsoft Message Queuing (MSMQ) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53766<\/td>\n<td width=\"469\">GDI+ Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53778<\/td>\n<td width=\"469\">Home windows NTLM Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\"><strong>Essential severity<\/strong><\/td>\n<td width=\"469\"\/>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-49743<\/td>\n<td width=\"469\">Home windows Graphics Element Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-49751<\/td>\n<td width=\"469\">Home windows Hyper-V Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-49757<\/td>\n<td width=\"469\">Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-49761<\/td>\n<td width=\"469\">Home windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-49762<\/td>\n<td width=\"469\">Home windows Ancillary Perform Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-50153<\/td>\n<td width=\"469\">Desktop Home windows Supervisor Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-50154<\/td>\n<td width=\"469\">Microsoft Home windows File Explorer Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-50155<\/td>\n<td width=\"469\">Home windows Push Notifications Apps Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-50156<\/td>\n<td width=\"469\">Home windows Routing and Distant Entry Service (RRAS) Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-50157<\/td>\n<td width=\"469\">Home windows Routing and Distant Entry Service (RRAS) Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-50158<\/td>\n<td width=\"469\">Home windows NTFS Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-50159<\/td>\n<td width=\"469\">Distant Entry Level-to-Level Protocol (PPP) EAP-TLS Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-50160<\/td>\n<td width=\"469\">Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-50161<\/td>\n<td width=\"469\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-50162<\/td>\n<td width=\"469\">Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-50163<\/td>\n<td width=\"469\">Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-50164<\/td>\n<td width=\"469\">Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-50166<\/td>\n<td width=\"469\">Home windows Distributed Transaction Coordinator (MSDTC) Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-50167<\/td>\n<td width=\"469\">Home windows Hyper-V Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-50168<\/td>\n<td width=\"469\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-50169<\/td>\n<td width=\"469\">Home windows SMB Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-50170<\/td>\n<td width=\"469\">Home windows Cloud Information Mini Filter Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-50171<\/td>\n<td width=\"469\">Distant Desktop Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-50172<\/td>\n<td width=\"469\">DirectX Graphics Kernel Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-50173<\/td>\n<td width=\"469\">Home windows Installer Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53131<\/td>\n<td width=\"469\">Home windows Media Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53132<\/td>\n<td width=\"469\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53133<\/td>\n<td width=\"469\">Home windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53134<\/td>\n<td width=\"469\">Home windows Ancillary Perform Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53135<\/td>\n<td width=\"469\">DirectX Graphics Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53136<\/td>\n<td width=\"469\">NT OS Kernel Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53137<\/td>\n<td width=\"469\">Home windows Ancillary Perform Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53138<\/td>\n<td width=\"469\">Home windows Routing and Distant Entry Service (RRAS) Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53140<\/td>\n<td width=\"469\">Home windows Kernel Transaction Supervisor Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53141<\/td>\n<td width=\"469\">Home windows Ancillary Perform Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53142<\/td>\n<td width=\"469\">Microsoft Brokering File System Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53143<\/td>\n<td width=\"469\">Microsoft Message Queuing (MSMQ) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53144<\/td>\n<td width=\"469\">Microsoft Message Queuing (MSMQ) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53145<\/td>\n<td width=\"469\">Microsoft Message Queuing (MSMQ) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53147<\/td>\n<td width=\"469\">Home windows Ancillary Perform Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53148<\/td>\n<td width=\"469\">Home windows Routing and Distant Entry Service (RRAS) Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53149<\/td>\n<td width=\"469\">Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53151<\/td>\n<td width=\"469\">Home windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53152<\/td>\n<td width=\"469\">Desktop Home windows Supervisor Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53153<\/td>\n<td width=\"469\">Home windows Routing and Distant Entry Service (RRAS) Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53154<\/td>\n<td width=\"469\">Home windows Ancillary Perform Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53155<\/td>\n<td width=\"469\">Home windows Hyper-V Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53156<\/td>\n<td width=\"469\">Home windows Storage Port Driver Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53716<\/td>\n<td width=\"469\">Native Safety Authority Subsystem Service (LSASS) Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53718<\/td>\n<td width=\"469\">Home windows Ancillary Perform Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53719<\/td>\n<td width=\"469\">Home windows Routing and Distant Entry Service (RRAS) Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53720<\/td>\n<td width=\"469\">Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53721<\/td>\n<td width=\"469\">Home windows Related Gadgets Platform Service Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53722<\/td>\n<td width=\"469\">Home windows Distant Desktop Providers\u00a0Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53723<\/td>\n<td width=\"469\">Home windows Hyper-V Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53724<\/td>\n<td width=\"469\">Home windows Push Notifications Apps Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53725<\/td>\n<td width=\"469\">Home windows Push Notifications Apps Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53726<\/td>\n<td width=\"469\">Home windows Push Notifications Apps Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53789<\/td>\n<td width=\"469\">Home windows StateRepository API Server file Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Average severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53779<\/td>\n<td width=\"469\">Home windows Kerberos Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>365 (16 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53731<\/td>\n<td width=\"469\">Microsoft Workplace Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53733<\/td>\n<td width=\"469\">Microsoft Phrase Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53740<\/td>\n<td width=\"469\">Microsoft Workplace Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53774<\/td>\n<td width=\"469\">Microsoft 365 Copilot BizChat Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53784<\/td>\n<td width=\"469\">Microsoft Phrase Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53787<\/td>\n<td width=\"469\">Microsoft 365 Copilot BizChat Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Essential severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53730<\/td>\n<td width=\"469\">Microsoft Workplace Visio Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53734<\/td>\n<td width=\"469\">Microsoft Workplace Visio Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53735<\/td>\n<td width=\"469\">Microsoft Excel Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53736<\/td>\n<td width=\"469\">Microsoft Phrase Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53737<\/td>\n<td width=\"469\">Microsoft Excel Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53738<\/td>\n<td width=\"469\">Microsoft Phrase Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53739<\/td>\n<td width=\"469\">Microsoft Excel Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53741<\/td>\n<td width=\"469\">Microsoft Excel Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53759<\/td>\n<td width=\"469\">Microsoft Excel Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53761<\/td>\n<td width=\"469\">Microsoft PowerPoint Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00a0<\/p>\n<p><strong>Workplace (16 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53731<\/td>\n<td width=\"469\">Microsoft Workplace Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53733<\/td>\n<td width=\"469\">Microsoft Phrase Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53740<\/td>\n<td width=\"469\">Microsoft Workplace Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53766<\/td>\n<td width=\"469\">GDI+ Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53784<\/td>\n<td width=\"469\">Microsoft Phrase Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Essential severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53730<\/td>\n<td width=\"469\">Microsoft Workplace Visio Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53732<\/td>\n<td width=\"469\">Microsoft Workplace Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53734<\/td>\n<td width=\"469\">Microsoft Workplace Visio Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53735<\/td>\n<td width=\"469\">Microsoft Excel Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53736<\/td>\n<td width=\"469\">Microsoft Phrase Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53737<\/td>\n<td width=\"469\">Microsoft Excel Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53738<\/td>\n<td width=\"469\">Microsoft Phrase Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53739<\/td>\n<td width=\"469\">Microsoft Excel Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53741<\/td>\n<td width=\"469\">Microsoft Excel Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53759<\/td>\n<td width=\"469\">Microsoft Excel Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53761<\/td>\n<td width=\"469\">Microsoft PowerPoint Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00a0<\/p>\n<p><strong>Azure (7 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-49707<\/td>\n<td width=\"469\">Azure Digital Machines Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53767<\/td>\n<td width=\"469\">Azure OpenAI Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53781<\/td>\n<td width=\"469\">Azure Digital Machines Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53792<\/td>\n<td width=\"469\">Azure Portal Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53793<\/td>\n<td width=\"469\">Azure Stack Hub Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Essential severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53729<\/td>\n<td width=\"469\">Microsoft Azure File Sync Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53765<\/td>\n<td width=\"469\">Azure Stack Hub Data Disclosure Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00a0<\/p>\n<p><strong>SQL (6 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-24999<\/td>\n<td width=\"469\">Microsoft SQL Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-48807<\/td>\n<td width=\"469\">Microsoft SQL Server Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Essential severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-47954<\/td>\n<td width=\"469\">Microsoft SQL Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-49758<\/td>\n<td width=\"469\">Microsoft SQL Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-49759<\/td>\n<td width=\"469\">Microsoft SQL Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53727<\/td>\n<td width=\"469\">Microsoft SQL Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00a0<\/p>\n<p><strong>Trade (5 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Essential severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-25005<\/td>\n<td width=\"469\">Microsoft Trade Server Tampering Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-25006<\/td>\n<td width=\"469\">Microsoft Trade Server Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-25007<\/td>\n<td width=\"469\">Microsoft Trade Server Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-33051<\/td>\n<td width=\"469\">Microsoft Trade Server Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53786<\/td>\n<td width=\"469\">Microsoft Trade Server Hybrid Deployment Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00a0<\/p>\n<p><strong>Excel (4 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Essential severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53735<\/td>\n<td width=\"469\">Microsoft Excel Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53737<\/td>\n<td width=\"469\">Microsoft Excel Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53739<\/td>\n<td width=\"469\">Microsoft Excel Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53741<\/td>\n<td width=\"469\">Microsoft Excel Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>SharePoint (4 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53733<\/td>\n<td width=\"469\">Microsoft Phrase Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Essential severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-49712<\/td>\n<td width=\"469\">Microsoft SharePoint Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53736<\/td>\n<td width=\"469\">Microsoft Phrase Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53760<\/td>\n<td width=\"469\">Microsoft SharePoint Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Phrase (3 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53733<\/td>\n<td width=\"469\">Microsoft Phrase Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Essential severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53736<\/td>\n<td width=\"469\">Microsoft Phrase Data Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53738<\/td>\n<td width=\"469\">Microsoft Phrase Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00a0<\/p>\n<p><strong>Dynamics 365 (2 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Essential severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-49745<\/td>\n<td width=\"469\">Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53728<\/td>\n<td width=\"469\">Microsoft Dynamics 365 (On-Premises) Data Disclosure Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00a0<\/p>\n<p><strong>PowerPoint (1 CVE)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Essential severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53761<\/td>\n<td width=\"469\">Microsoft PowerPoint Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00a0<\/p>\n<p><strong>Groups (1 CVE)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Essential severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53783<\/td>\n<td width=\"469\">Microsoft Groups Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00a0<\/p>\n<p><strong>Visible Studio (1 CVE)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Essential severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53773<\/td>\n<td width=\"469\">GitHub Copilot and Visible Studio Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00a0<\/p>\n<p><strong>Net Deploy (1 CVE)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Essential severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53772<\/td>\n<td width=\"469\">Net Deploy Distant Code Execution Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00a0<\/p>\n<p><strong>Home windows Safety App (1 CVE)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Essential severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53769<\/td>\n<td width=\"469\">Home windows Safety App Spoofing Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00a0<\/p>\n<p><strong>Home windows Subsystem for Linux (WSL2) (1 CVE)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Essential severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2025-53788<\/td>\n<td width=\"469\">Home windows Subsystem for Linux (WSL2) Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00a0<\/p>\n<p><strong>Appendix D: Advisories and Different Merchandise<\/strong><\/p>\n<p>There are 10 Edge-related advisories in August\u2019s launch, all however two of which originated outdoors Microsoft.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"123\">CVE-2025-8576<\/td>\n<td width=\"384\">Chromium: CVE-2025-8576 Use after free in Extensions<\/td>\n<\/tr>\n<tr>\n<td width=\"123\">CVE-2025-8577<\/td>\n<td width=\"384\">Chromium: CVE-2025-8577 Inappropriate implementation in Image In Image<\/td>\n<\/tr>\n<tr>\n<td width=\"123\">CVE-2025-8578<\/td>\n<td width=\"384\">Chromium: CVE-2025-8578 Use after free in Forged<\/td>\n<\/tr>\n<tr>\n<td width=\"123\">CVE-2025-8579<\/td>\n<td width=\"384\">Chromium: CVE-2025-8579 Inappropriate implementation in Gemini Stay in Chrome<\/td>\n<\/tr>\n<tr>\n<td width=\"123\">CVE-2025-8580<\/td>\n<td width=\"384\">Chromium: CVE-2025-8580 Inappropriate implementation in Filesystems<\/td>\n<\/tr>\n<tr>\n<td width=\"123\">CVE-2025-8581<\/td>\n<td width=\"384\">Chromium: CVE-2025-8581 Inappropriate implementation in Extensions<\/td>\n<\/tr>\n<tr>\n<td width=\"123\">CVE-2025-8582<\/td>\n<td width=\"384\">Chromium: CVE-2025-8582 Inadequate validation of untrusted enter in DOM<\/td>\n<\/tr>\n<tr>\n<td width=\"123\">CVE-2025-8583<\/td>\n<td width=\"384\">Chromium: CVE-2025-8583 Inappropriate implementation in Permissions<\/td>\n<\/tr>\n<tr>\n<td width=\"123\">CVE-2025-49736<\/td>\n<td width=\"384\">Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"123\">CVE-2025-49755<\/td>\n<td width=\"384\">Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>As well as, eight of CVEs seem on this month\u2019s Patch Tuesday data solely to guarantee the general public that they&#8217;ve already been mitigated, whether or not as a part of the conventional course of cloud enterprise or (within the case of two Home windows patches) as a part of final month\u2019s patch assortment, although they had been unnamed in that launch. Since this month\u2019s CVSS 10.0 CVE is amongst these eight, we&#8217;re itemizing these right here with their CVE, title, affect, severity, and CVSS base rating.<\/p>\n<p>\u00a0<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"120\">CVE-2025-48807<\/td>\n<td width=\"201\">Microsoft SQL Server Distant Code Execution Vulnerability<\/td>\n<td width=\"151\">Distant Code Execution<\/td>\n<td width=\"85\">Important<\/td>\n<td width=\"44\">7.5<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">CVE-2025-49707<\/td>\n<td width=\"201\">Azure Digital Machines Spoofing Vulnerability<\/td>\n<td width=\"151\">Spoofing<\/td>\n<td width=\"85\">Important<\/td>\n<td width=\"44\">7.9<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">CVE-2025-53767<\/td>\n<td width=\"201\">Azure OpenAI Elevation of Privilege Vulnerability<\/td>\n<td width=\"151\">Elevation of Privilege<\/td>\n<td width=\"85\">Important<\/td>\n<td width=\"44\">10.0<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">CVE-2025-53774<\/td>\n<td width=\"201\">Microsoft 365 Copilot BizChat Data Disclosure Vulnerability<\/td>\n<td width=\"151\">Data Disclosure<\/td>\n<td width=\"85\">Important<\/td>\n<td width=\"44\">6.5<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">CVE-2025-53781<\/td>\n<td width=\"201\">Azure Digital Machines Data Disclosure Vulnerability<\/td>\n<td width=\"151\">Data Disclosure<\/td>\n<td width=\"85\">Important<\/td>\n<td width=\"44\">7.7<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">CVE-2025-53787<\/td>\n<td width=\"201\">Microsoft 365 Copilot BizChat Data Disclosure Vulnerability<\/td>\n<td width=\"151\">Data Disclosure<\/td>\n<td width=\"85\">Important<\/td>\n<td width=\"44\">8.2<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">CVE-2025-53789<\/td>\n<td width=\"201\">Home windows StateRepository API Server file Elevation of Privilege Vulnerability<\/td>\n<td width=\"151\">Elevation of Privilege<\/td>\n<td width=\"85\">Essential<\/td>\n<td width=\"44\">7.8<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">CVE-2025-53792<\/td>\n<td width=\"201\">Azure Portal Elevation of Privilege Vulnerability<\/td>\n<td width=\"151\">Elevation of Privilege<\/td>\n<td width=\"85\">Important<\/td>\n<td width=\"44\">9.1<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00a0<\/p>\n<p>There have been no Adobe advisories included within the August launch.<\/p>\n<p><strong>Appendix E: Affected Home windows Server variations<\/strong><\/p>\n<p>It is a desk of the 66 CVEs within the August launch affecting Home windows Server variations 2008 by 2025. CVE-2025-48807 and CVE-2025-53789, the 2 CVEs that shipped in July however had been unnoticed of the official data final month as talked about above, are included right here. \u00a0The desk differentiates amongst main variations of the platform however doesn\u2019t go into deeper element (eg., Server Core). Important-severity points are marked in purple; an \u201cx\u201d signifies that the CVE doesn&#8217;t apply to that model. Directors are inspired to make use of this appendix as a place to begin to establish their particular publicity, as every reader\u2019s state of affairs, particularly because it considerations merchandise out of mainstream assist, will range. For particular Data Base numbers, please seek the advice of Microsoft.<\/p>\n<table width=\"427\">\n<tbody>\n<tr>\n<td width=\"116\"><strong>CVE<\/strong><\/td>\n<td width=\"34\"><strong>S-08<\/strong><\/td>\n<td width=\"33\"><strong>8r2<\/strong><\/td>\n<td width=\"34\"><strong>S-12<\/strong><\/td>\n<td width=\"34\"><strong>12r2<\/strong><\/td>\n<td width=\"34\"><strong>S-16<\/strong><\/td>\n<td width=\"34\"><strong>S-19<\/strong><\/td>\n<td width=\"34\"><strong>S-22<\/strong><\/td>\n<td width=\"37\"><strong>23h2<\/strong><\/td>\n<td width=\"34\"><strong>S-25<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-48807<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"37\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-49743<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-49751<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-49757<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-49761<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-49762<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-50153<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-50154<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-50155<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u00d7<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-50156<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-50157<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-50158<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-50159<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u00d7<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-50160<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-50161<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-50162<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-50163<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-50164<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-50165<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"37\">\u00d7<\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-50166<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-50167<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u00d7<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-50168<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-50169<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"37\">\u00d7<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-50170<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-50171<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-50172<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-50173<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-50176<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"37\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-50177<\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"33\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"37\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53131<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53132<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53133<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"37\">\u00d7<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53134<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53135<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53136<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53137<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53138<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53140<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53141<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53142<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53143<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53144<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53145<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53147<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53148<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53149<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53151<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53152<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53153<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53154<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53155<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u00d7<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53156<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53716<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53718<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53719<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53720<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53721<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53722<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53723<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u00d7<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53724<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u00d7<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53725<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u00d7<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53726<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u00d7<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53766<\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"33\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"37\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53778<\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"33\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"37\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<td width=\"34\"><span style=\"color: #ff0000\">\u25a0<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53779<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"37\">\u00d7<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<tr>\n<td width=\"116\">CVE-2025-53789<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"33\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u00d7<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<td width=\"37\">\u25a0<\/td>\n<td width=\"34\">\u25a0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00a0<\/p>\n<\/p><\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Microsoft on Tuesday introduced 109 patches affecting 16 product households. Eighteen of the addressed points are thought-about by Microsoft to be of Important severity, and 31 have a CVSS base rating of 8.0 or increased, together with a \u201cexcellent\u201d 10.0 affecting Azure. None are recognized to be underneath energetic exploit within the wild, although two [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":5586,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[4205,4687,2341,121,1077,120,1078],"class_list":["post-5584","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-august","tag-blasts","tag-includes","tag-news","tag-patch","tag-sophos","tag-tuesday"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/5584","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5584"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/5584\/revisions"}],"predecessor-version":[{"id":5585,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/5584\/revisions\/5585"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/5586"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5584"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5584"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5584"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-15 05:56:17 UTC -->