Description
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to bypass security restrictions, obtain sensitive information, gain privileges, cause denial of service, execute arbitrary code, spoof user interface.
Below is a complete list of vulnerabilities:
- A security feature bypass vulnerability in MapUrlToZone can be exploited remotely to bypass security restrictions.
- An information disclosure vulnerability in Microsoft Message Queuing can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Digital Media can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Windows HTML Platforms can be exploited remotely to bypass security restrictions.
- A denial of service vulnerability in Windows Connected Devices Platform Service (Cdpsvc) can be exploited remotely to cause denial of service.
- A security feature bypass vulnerability in Windows Kerberos can be exploited remotely to bypass security restrictions.
- An information disclosure vulnerability in Windows Kerberos can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Windows Telephony Service can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows PrintWorkflowUserSvc can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Kernel Memory can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Hyper-V NT Kernel Integration VSP can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Windows Virtualization-Based Security (VBS) can be exploited remotely to bypass security restrictions.
- An information disclosure vulnerability in Windows BitLocker can be exploited remotely to obtain sensitive information.
- A spoofing vulnerability in Windows NTLM can be exploited remotely to spoof user interface.
- An information disclosure vulnerability in Windows Cryptographic can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in Windows Remote Desktop Gateway (RD Gateway) can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows Web Threat Defense User Service can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Virtualization-Based Security (VBS) Enclave can be exploited remotely to gain privileges.
- A denial of service vulnerability in Microsoft Message Queuing (MSMQ) can be exploited remotely to cause denial of service.
- A security feature bypass vulnerability in Secure Boot can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Microsoft Digest Authentication can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Event Tracing can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows Security Account Manager (SAM) can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Search Service can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Internet Explorer can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft Brokering File System can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows COM Server can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in GDI+ can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Reliable Multicast Transport Driver (RMCAST) can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Direct Show can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Active Directory Domain Services can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Smart Card Reader can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Recovery Environment Agent can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows Virtual Trusted Platform Module can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Windows Line Printer Daemon (LPD) Service can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows upnphost.dll can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Windows Remote Desktop Services can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
- A spoofing vulnerability in Windows SmartScreen can be exploited remotely to spoof user interface.
- A denial of service vulnerability in Windows Kerberos can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows App Package Installer can be exploited remotely to gain privileges.
- A spoofing vulnerability in Windows Themes can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Windows OLE can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows MapUrlToZone can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows CSC Service can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in BranchCache can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in SPNEGO Extended Negotiation (NEGOEX) Security Mechanism can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft COM for Windows can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows NTLM V1 can be exploited remotely to gain privileges.
- Security vulnerability in composition area can be exploited to bypass security restrictions.
- An information disclosure vulnerability in Windows WLAN AutoConfig Service can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Microsoft DWM Core Library can be exploited remotely to gain privileges.
- A denial of service vulnerability in IP Helper can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows Geolocation Service can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows CSC Service can be exploited remotely to gain privileges.
- A spoofing vulnerability in Active Directory Federation Server can be exploited remotely to spoof user interface.
- A security feature bypass vulnerability in Secure Boot can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in Windows Remote Desktop Services can be exploited remotely to cause denial of service.
Original advisories
- CVE-2025-21220
- CVE-2025-21327
- CVE-2025-21328
- CVE-2025-21271
- CVE-2025-21269
- CVE-2025-21207
- CVE-2025-21299
- CVE-2025-21242
- CVE-2025-21282
- CVE-2025-21306
- CVE-2025-21255
- CVE-2025-21235
- CVE-2025-21341
- CVE-2025-21316
- CVE-2025-21252
- CVE-2025-21333
- CVE-2025-21340
- CVE-2025-21234
- CVE-2025-21273
- CVE-2025-21210
- CVE-2025-21217
- CVE-2025-21413
- CVE-2025-21336
- CVE-2025-21278
- CVE-2025-21343
- CVE-2025-21370
- CVE-2025-21230
- CVE-2025-21323
- CVE-2025-21248
- CVE-2025-21219
- CVE-2025-21213
- CVE-2025-21294
- CVE-2025-21274
- CVE-2025-21331
- CVE-2025-21313
- CVE-2025-21261
- CVE-2025-21319
- CVE-2025-21292
- CVE-2025-21265
- CVE-2025-21227
- CVE-2025-21233
- CVE-2025-21326
- CVE-2025-21317
- CVE-2025-21339
- CVE-2025-21372
- CVE-2025-21211
- CVE-2025-21189
- CVE-2025-21315
- CVE-2025-21335
- CVE-2025-21288
- CVE-2025-21338
- CVE-2025-21307
- CVE-2025-21287
- CVE-2025-21256
- CVE-2025-21246
- CVE-2025-21228
- CVE-2025-21250
- CVE-2025-21291
- CVE-2025-21240
- CVE-2025-21293
- CVE-2025-21244
- CVE-2025-21302
- CVE-2025-21214
- CVE-2025-21260
- CVE-2025-21303
- CVE-2025-21239
- CVE-2025-21312
- CVE-2025-21202
- CVE-2025-21251
- CVE-2025-21272
- CVE-2025-21284
- CVE-2025-21263
- CVE-2025-21224
- CVE-2025-21249
- CVE-2025-21320
- CVE-2025-21409
- CVE-2025-21241
- CVE-2025-21300
- CVE-2025-21229
- CVE-2025-21309
- CVE-2025-21321
- CVE-2025-21382
- CVE-2025-21318
- CVE-2025-21226
- CVE-2025-21314
- CVE-2025-21225
- CVE-2025-21238
- CVE-2025-21218
- CVE-2025-21310
- CVE-2025-21223
- CVE-2025-21324
- CVE-2025-21280
- CVE-2025-21232
- CVE-2025-21275
- CVE-2025-21389
- CVE-2025-21308
- CVE-2025-21298
- CVE-2025-21266
- CVE-2025-21276
- CVE-2025-21417
- CVE-2025-21374
- CVE-2025-21285
- CVE-2025-21270
- CVE-2025-21296
- CVE-2025-21295
- CVE-2025-21281
- CVE-2025-21297
- CVE-2025-21243
- CVE-2025-21311
- CVE-2025-21290
- CVE-2025-21268
- CVE-2024-7344
- CVE-2025-21258
- CVE-2025-21257
- CVE-2025-21289
- CVE-2025-21411
- CVE-2025-21304
- CVE-2025-21237
- CVE-2025-21286
- CVE-2025-21277
- CVE-2025-21334
- CVE-2025-21332
- CVE-2025-21231
- CVE-2025-21301
- CVE-2025-21378
- CVE-2025-21236
- CVE-2025-21193
- CVE-2025-21245
- CVE-2025-21215
- CVE-2025-21330
- CVE-2025-21305
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
- Microsoft-Windows-Server-2022
CVE list
- CVE-2025-21240 critical
- CVE-2025-21329 warning
- CVE-2025-21220 critical
- CVE-2025-21293 critical
- CVE-2025-21244 critical
- CVE-2025-21327 high
- CVE-2025-21302 critical
- CVE-2025-21214 warning
- CVE-2025-21328 warning
- CVE-2025-21260 high
- CVE-2025-21303 critical
- CVE-2025-21269 warning
- CVE-2025-21312 warning
- CVE-2025-21242 high
- CVE-2025-21282 critical
- CVE-2025-21251 critical
- CVE-2025-21306 critical
- CVE-2025-21255 high
- CVE-2025-21272 high
- CVE-2025-21341 high
- CVE-2025-21316 high
- CVE-2025-21245 critical
- CVE-2025-21263 high
- CVE-2025-21252 critical
- CVE-2025-21249 high
- CVE-2025-21320 high
- CVE-2025-21409 critical
- CVE-2025-21300 critical
- CVE-2025-21273 critical
- CVE-2025-21229 high
- CVE-2025-21210 warning
- CVE-2025-21309 critical
- CVE-2025-21217 high
- CVE-2025-21321 high
- CVE-2025-21318 high
- CVE-2025-21226 high
- CVE-2025-21413 critical
- CVE-2025-21336 high
- CVE-2025-21278 high
- CVE-2025-21238 critical
- CVE-2025-21218 critical
- CVE-2025-21310 high
- CVE-2025-21223 critical
- CVE-2025-21324 high
- CVE-2025-21232 high
- CVE-2025-21230 critical
- CVE-2025-21389 critical
- CVE-2025-21308 high
- CVE-2025-21298 critical
- CVE-2025-21266 critical
- CVE-2025-21276 critical
- CVE-2025-21213 warning
- CVE-2025-21294 critical
- CVE-2025-21274 high
- CVE-2025-21331 high
- CVE-2025-21261 high
- CVE-2025-21319 high
- CVE-2025-21417 critical
- CVE-2025-21374 high
- CVE-2025-21265 high
- CVE-2025-21285 critical
- CVE-2025-21227 high
- CVE-2025-21233 critical
- CVE-2025-21270 critical
- CVE-2025-21296 critical
- CVE-2025-21295 critical
- CVE-2025-21281 critical
- CVE-2025-21297 critical
- CVE-2025-21243 critical
- CVE-2025-21339 critical
- CVE-2025-21290 critical
- CVE-2025-21268 warning
- CVE-2024-7344 critical
- CVE-2025-21258 high
- CVE-2025-21289 critical
- CVE-2025-21411 critical
- CVE-2025-21211 high
- CVE-2025-21189 warning
- CVE-2025-21237 critical
- CVE-2025-21277 critical
- CVE-2025-21288 high
- CVE-2025-21338 critical
- CVE-2025-21307 critical
- CVE-2025-21287 critical
- CVE-2025-21286 critical
- CVE-2025-21256 high
- CVE-2025-21332 critical
- CVE-2025-21246 critical
- CVE-2025-21228 high
- CVE-2025-21231 critical
- CVE-2025-21250 critical
- CVE-2025-21378 critical
- CVE-2025-21236 critical
- CVE-2025-21215 warning
- CVE-2025-21305 critical
- CVE-2025-21271 critical
- CVE-2025-21207 critical
- CVE-2025-21299 high
- CVE-2025-21235 critical
- CVE-2025-21333 critical
- CVE-2025-21340 high
- CVE-2025-21234 critical
- CVE-2025-21343 critical
- CVE-2025-21370 critical
- CVE-2025-21323 high
- CVE-2025-21248 critical
- CVE-2025-21219 warning
- CVE-2025-21313 high
- CVE-2025-21292 critical
- CVE-2025-21326 critical
- CVE-2025-21317 high
- CVE-2025-21372 critical
- CVE-2025-21315 critical
- CVE-2025-21335 critical
- CVE-2025-21291 critical
- CVE-2025-21239 critical
- CVE-2025-21202 high
- CVE-2025-21284 high
- CVE-2025-21224 critical
- CVE-2025-21241 critical
- CVE-2025-21382 critical
- CVE-2025-21314 high
- CVE-2025-21225 high
- CVE-2025-21280 high
- CVE-2025-21275 critical
- CVE-2025-21311 critical
- CVE-2025-21257 high
- CVE-2025-21304 critical
- CVE-2025-21334 critical
- CVE-2025-21301 high
- CVE-2025-21193 high
- CVE-2025-21330 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!