Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: A Unique Way to Primary Key

      July 22, 2025

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      The best CRM software with email marketing in 2025: Expert tested and reviewed

      July 22, 2025

      This multi-port car charger can power 4 gadgets at once – and it’s surprisingly cheap

      July 22, 2025

      I’m a wearables editor and here are the 7 Pixel Watch 4 rumors I’m most curious about

      July 22, 2025

      8 ways I quickly leveled up my Linux skills – and you can too

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025
      Recent

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025

      Zero Trust & Cybersecurity Mesh: Your Org’s Survival Guide

      July 22, 2025

      Execute Ping Commands and Get Back Structured Data in PHP

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025
      Recent

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025

      “I don’t think I changed his mind” — NVIDIA CEO comments on H20 AI GPU sales resuming in China following a meeting with President Trump

      July 22, 2025

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Microsoft Patch Tuesday April 2025: One Zero-Day, 11 High-Risk Flaws

    Microsoft Patch Tuesday April 2025: One Zero-Day, 11 High-Risk Flaws

    April 8, 2025
    Microsoft Patch Tuesday April 2025: One Zero-Day, 11 High-Risk Flaws

    Microsoft Patch Tuesday April 2025

    Microsoft Patch Tuesday for April 2025 included fixes for 135 vulnerabilities in all, including one actively exploited zero-day and an additional 11 high-risk vulnerabilities.

    In all, Patch Tuesday April 2025 included 126 Microsoft vulnerabilities and nine Chrome/Microsoft Edge vulnerabilities.

    The zero-day is a 7.8-rated Windows Common Log File System Driver use-after-free vulnerability that the U.S. Cybersecurity and Infrastructure Security Agency (CISA) promptly added to its Known Exploited Vulnerabilities (KEV) catalog. The vulnerability, CVE-2025-29824, could allow an attacker to elevate privileges locally. Microsoft revealed that the vulnerability has been exploited in ransomware attacks.

    The single zero-day vulnerability marks a significant decline from the six reported in March. So far this year, Microsoft has reported 405 vulnerabilities in its Patch Tuesday reports, including 12 actively exploited zero days.

    Patch Tuesday April 2025 High-Risk Vulnerabilities

    The 11 vulnerabilities labeled “Exploitation More Likely” range in severity from 5.4 (a Windows Mark of the Web Security Feature Bypass vulnerability) to 8.8 (a SharePoint Remote Code Execution vulnerability), and another four are rated 8.1.

    The high-risk vulnerabilities include:

    • CVE-2025-29794: SharePoint Remote Code Execution (RCE) Vulnerability (8.8)
    • CVE-2025-29793: Microsoft SharePoint Remote Code Execution Vulnerability (7.2)
    • CVE-2025-26663: Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability (8.1)
    • CVE-2025-26670: LDAP Client Remote Code Execution Vulnerability (8.1)
    • CVE-2025-27480: Windows Remote Desktop Services Remote Code Execution Vulnerability (8.1)
    • CVE-2025-27482: Windows Remote Desktop Services Remote Code Execution Vulnerability (8.1)
    • CVE-2025-27727: Windows Installer Elevation of Privilege Vulnerability (7.8)
    • CVE-2025-29792: Microsoft Office Elevation of Privilege Vulnerability (7.3)
    • CVE-2025-29809: Windows Kerberos Security Feature Bypass Vulnerability (7.1)
    • CVE-2025-29812: DirectX Graphics Kernel Elevation of Privilege Vulnerability (7.8)
    • CVE-2025-27472: Windows Mark of the Web Security Feature Bypass Vulnerability (5.4)

    Other Vendors Issuing Patches

    The second Tuesday of the month is a day when other IT vendors issue patches too, and April 2025 is no exception. Among the other vendors and projects issuing patches within the last day were:

    • Android
    • Fortinet
    • Ivanti
    • SAP

     

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleThe AI Fix #45: The Turing test falls to GPT-4.5
    Next Article Fortinet Urges FortiSwitch Upgrades to Patch Critical Admin Password Change Flaw

    Related Posts

    Development

    GPT-5 is Coming: Revolutionizing Software Testing

    July 22, 2025
    Development

    Win the Accessibility Game: Combining AI with Human Judgment

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Our pledge to help improve the accessibility of open source software at scale

    News & Updates

    Boolformer: Symbolic Regression of Logic Functions with Transformers

    Machine Learning

    Best home automation systems 2025: I’m a smart home reviewer and these are the top ones

    News & Updates

    CVE-2025-48908 – “Ability Auto Startup Service Vulnerability in Foundation Process”

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-6693 – RT-Thread Device Memory Corruption Vulnerability

    June 26, 2025

    CVE ID : CVE-2025-6693

    Published : June 26, 2025, 1:15 p.m. | 1 hour, 49 minutes ago

    Description : A vulnerability, which was classified as critical, was found in RT-Thread up to 5.1.0. This affects the function sys_device_open/sys_device_read/sys_device_control/sys_device_init/sys_device_close/sys_device_write of the file components/drivers/core/device.c. The manipulation leads to memory corruption. It is possible to launch the attack on the local host. The vendor was contacted early about this disclosure but did not respond in any way.

    Severity: 7.8 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    ‘Tientallen Nederlandse Citrix-servers bevatten kritieke kwetsbaarheden’

    June 30, 2025

    Insyde UEFI Flaw (CVE-2025-4275): Secure Boot Bypass Allows Rootkits & Undetectable Malware

    June 11, 2025

    Upgrade your Amazon DynamoDB global tables to the current version

    June 4, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.