Learn languages naturally with fresh, real content!

Popular Topics
Explore By Region
Microsoft issued December 2025 updates for 54 flaws, including two actively exploited zero-days affecting Windows, Office, and GitHub Copilot.
Microsoft released December 2025 updates addressing 54 vulnerabilities, including two actively exploited zero-days.
CVE-2025-62221, a Windows Cloud Files driver flaw, allows attackers to gain SYSTEM-level access with local code execution and is already in use.
CVE-2025-54100 bypasses Windows’ Mark of the Web protection, enabling malicious code execution before file saves, primarily affecting PowerShell 5.1, which now requires user prompts.
A flaw in GitHub Copilot for JetBrains (CVE-2025-64671) could allow arbitrary command execution via AI code suggestions.
Two Office vulnerabilities (CVE-2025-62554, CVE-2025-62557) enable remote code execution just by previewing malicious emails or files.
The batch excludes browser and open-source patches, previously addressed in December.
PowerShell 7 is unaffected; users of PowerShell 5.1 should use the -UseBasicParsing parameter to avoid script issues.
Organizations are urged to prioritize patching due to active exploitation and high-risk potential.
Microsoft emitió actualizaciones de diciembre de 2025 para 54 fallas, incluidos dos días cero explotados activamente que afectan a Windows, Office y GitHub Copilot.