Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: A Unique Way to Primary Key

      July 22, 2025

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      The best CRM software with email marketing in 2025: Expert tested and reviewed

      July 22, 2025

      This multi-port car charger can power 4 gadgets at once – and it’s surprisingly cheap

      July 22, 2025

      I’m a wearables editor and here are the 7 Pixel Watch 4 rumors I’m most curious about

      July 22, 2025

      8 ways I quickly leveled up my Linux skills – and you can too

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025
      Recent

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025

      Zero Trust & Cybersecurity Mesh: Your Org’s Survival Guide

      July 22, 2025

      Execute Ping Commands and Get Back Structured Data in PHP

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025
      Recent

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025

      “I don’t think I changed his mind” — NVIDIA CEO comments on H20 AI GPU sales resuming in China following a meeting with President Trump

      July 22, 2025

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Microsoft Patch Tuesday June 2025: One Zero-Day, Nine High-risk Flaws Fixed

    Microsoft Patch Tuesday June 2025: One Zero-Day, Nine High-risk Flaws Fixed

    June 11, 2025

    Microsoft Patch Tuesday June 2025

    Microsoft’s Patch Tuesday updates for June 2025 include fixes for an actively exploited zero-day vulnerability and nine additional flaws at high risk of exploitation.

    In all, the Microsoft Patch Tuesday June 2025 release note included fixes for 68 vulnerabilities, plus three non-Microsoft CVEs affecting Windows Secure Boot and Chromium-based Edge.

    The highest-rated vulnerability included in the update – a 9.8-severity Power Automate Elevation of Privilege vulnerability (CVE-2025-47966) – was fixed earlier this month.

    Microsoft Patch Tuesday June 2025: Zero-Day, High-risk Flaws

    The exploited zero-day – CVE-2025-33053, an 8.8-rated Web Distributed Authoring and Versioning (WebDAV) Remote Code Execution vulnerability – was reported by Check Point researchers, who discovered the flaw being used in an attempted cyberattack against a defense company in Turkey.

    In the attack, the advanced persistent threat (APT) group Stealth Falcon used a .url file that exploited the zero-day vulnerability to execute malware from a threat actor-controlled WebDAV server, the researchers said.

    The nine vulnerabilities designated “Exploitation More Likely” by Microsoft include:

    • CVE-2025-32713, a 7.8-rated Windows Common Log File System Driver Elevation of Privilege vulnerability. It’s the third straight Patch Tuesday with at least one high-risk CLFS vulnerability, following the April and May updates.
    • CVE-2025-32714, a 7.8-rated Windows Installer Elevation of Privilege vulnerability
    • CVE-2025-32717, an 8.4-severity Microsoft Word Remote Code Execution vulnerability
    • CVE-2025-33070, an 8.1-rated Windows Netlogon Elevation of Privilege vulnerability
    • CVE-2025-33071, an 8.1-severity Windows Kerberos Key Distribution Center Proxy Service (KPSSVC) Remote Code Execution vulnerability
    • CVE-2025-47162, an 8.4-rated Microsoft Office Remote Code Execution vulnerability (Heap-based Buffer Overflow)
    • CVE-2025-47164, which is also an 8.4-rated Microsoft Office Remote Code Execution vulnerability (Use After Free)
    • CVE-2025-47167, another 8.4-severity Microsoft Office Remote Code Execution vulnerability (Type Confusion)
    • CVE-2025-47962, a 7.8-rated Windows SDK Elevation of Privilege vulnerability

    Other Vendors Issuing Patch Tuesday Fixes

    Microsoft isn’t the only vendor issuing fixes on the second Tuesday of each month, as many others have taken up the practice too.

    Other noteworthy patch announcements were issued by:

    • Ivanti, which patched three Ivanti Workspace Control flaws
    • SAP, which included a 9.6-severity NetWeaver Application Server for ABAP Missing Authorization Check vulnerability (CVE-2025-42989)
    • Fortinet, which fixed an OS Command Injection vulnerability

     

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleBreaking Down Apple’s Liquid Glass: The Tech, The Hype, and The Reality
    Next Article 295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager

    Related Posts

    Development

    GPT-5 is Coming: Revolutionizing Software Testing

    July 22, 2025
    Development

    Win the Accessibility Game: Combining AI with Human Judgment

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Microsoft Recall Returns: Security Improves but Issues Remain

    Development

    CVE-2025-34049 – OptiLink ONT1GEW Command Injection

    Common Vulnerabilities and Exposures (CVEs)

    How can we build human values into AI?

    Artificial Intelligence

    Novo is a legal tech startup that helps personal injury law firms automate their most time-consuming tasks using AI.

    Web Development

    Highlights

    CVE-2024-7586 – GitLab EE Webhook Deletion Audit Log Authentication Credentials Disclosure

    June 20, 2025

    CVE ID : CVE-2024-7586

    Published : June 20, 2025, 2:15 p.m. | 28 minutes ago

    Description : An issue was discovered in GitLab EE affecting all versions starting from 17.0 prior to 17.0.6, starting from 17.1 prior to 17.1.4, and starting from 17.2 prior to 17.2.2, where webhook deletion audit log preserved auth credentials.

    Severity: 4.1 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-27457 – RealVNC Unencrypted Communication Information Disclosure

    July 3, 2025

    Stealth Falcon APT Exploits Microsoft RCE Zero-Day in Mideast

    June 10, 2025

    Navigating the Future of B2B Distribution with Rupa Amin

    July 11, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.