Description
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, bypass security restrictions, execute arbitrary code, spoof user interface, cause denial of service.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Windows Authentication can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Microsoft Failover Cluster can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Remote Desktop Protocol can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Inbox COM Objects (Global Memory) can be exploited remotely to execute arbitrary code.
- A security bypass vulnerability in SecureBoot in IGEL OS before 11 can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Windows Remote Access Connection Manager can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Network Connection Status Indicator (NCSI) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Resilient File System (ReFS) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- A spoofing vulnerability in NTLM Hash Disclosure can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in DirectX Graphics Kernel can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows Local Session Manager (LSM) can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows NTFS can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Simple Search and Discovery Protocol (SSDP) Service can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows MapUrlToZone can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Windows Push Notification can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows COM+ Event System Service can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows WLAN AutoConfig Service can be exploited remotely to obtain sensitive information.
- A spoofing vulnerability in Microsoft Windows File Explorer can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Windows Error Reporting Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Agere Modem Driver can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in Windows Search Service can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Windows Server Update Service (WSUS) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Remote Desktop Services can be exploited remotely to gain privileges.
- A tampering vulnerability in Windows SMB Client can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Internet Information Services (IIS) Inbox COM Objects (Global Memory) can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows Active Directory Federation Services (ADFS) can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows SMB Server can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in PowerShell can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows URL Parsing can be exploited remotely to execute arbitrary code.
Original advisories
- CVE-2025-59188
- CVE-2025-58737
- CVE-2025-58733
- CVE-2025-47827
- CVE-2025-59230
- CVE-2025-59201
- CVE-2025-55687
- CVE-2025-59187
- CVE-2025-59244
- CVE-2025-55678
- CVE-2025-58736
- CVE-2025-58729
- CVE-2025-59242
- CVE-2025-55335
- CVE-2025-58718
- CVE-2025-58714
- CVE-2025-59196
- CVE-2025-59208
- CVE-2025-59209
- CVE-2025-58725
- CVE-2025-58732
- CVE-2025-58730
- CVE-2025-55695
- CVE-2025-59214
- CVE-2025-59277
- CVE-2025-55692
- CVE-2025-58739
- CVE-2025-24052
- CVE-2025-59259
- CVE-2025-55700
- CVE-2025-59253
- CVE-2025-55701
- CVE-2025-59287
- CVE-2025-59202
- CVE-2025-59280
- CVE-2025-59198
- CVE-2025-59185
- CVE-2025-24990
- CVE-2025-58735
- CVE-2025-58717
- CVE-2025-59205
- CVE-2025-59282
- CVE-2025-59190
- CVE-2025-59258
- CVE-2025-58726
- CVE-2025-59275
- CVE-2025-25004
- CVE-2025-59295
- CVE-2025-59211
Related products
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-Server-2008
CVE list
- CVE-2025-47827 warning
- CVE-2025-24052 critical
- CVE-2025-24990 critical
- CVE-2025-25004 high
- CVE-2025-55335 high
- CVE-2025-55678 high
- CVE-2025-55687 high
- CVE-2025-55692 critical
- CVE-2025-55695 high
- CVE-2025-55700 high
- CVE-2025-55701 critical
- CVE-2025-58714 critical
- CVE-2025-58717 high
- CVE-2025-58718 critical
- CVE-2025-58725 high
- CVE-2025-58726 critical
- CVE-2025-58729 high
- CVE-2025-58730 high
- CVE-2025-58732 high
- CVE-2025-58733 high
- CVE-2025-58735 high
- CVE-2025-58736 high
- CVE-2025-58737 high
- CVE-2025-58739 high
- CVE-2025-59185 high
- CVE-2025-59187 critical
- CVE-2025-59188 high
- CVE-2025-59190 high
- CVE-2025-59196 high
- CVE-2025-59198 warning
- CVE-2025-59201 critical
- CVE-2025-59202 high
- CVE-2025-59205 high
- CVE-2025-59208 high
- CVE-2025-59209 high
- CVE-2025-59211 high
- CVE-2025-59214 high
- CVE-2025-59230 critical
- CVE-2025-59242 critical
- CVE-2025-59244 high
- CVE-2025-59253 high
- CVE-2025-59258 high
- CVE-2025-59259 high
- CVE-2025-59275 critical
- CVE-2025-59277 critical
- CVE-2025-59278 critical
- CVE-2025-59280 warning
- CVE-2025-59282 high
- CVE-2025-59287 critical
- CVE-2025-59295 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!