Description
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, bypass security restrictions, execute arbitrary code, read local files, cause denial of service.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Host Process for Windows Tasks can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Customer Experience Improvement Program (CEIP) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Administrator Protection can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Bluetooth RFCOM Protocol Driver can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Speech Recognition can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Microsoft Wireless Provisioning System can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kerberos can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Multimedia Class Scheduler Service (MMCSS) Driver can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows Speech Recognition can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows License Manager can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Transport Driver Interface (TDI) Translation Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.
- A denial of service vulnerability in Storvsp.sys Driver can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows OLE can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Smart Card Reader can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Broadcast DVR User Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in DirectX Graphics Kernel can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Microsoft Streaming Service Proxy can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows WLAN Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Remote Desktop Services can be exploited remotely to gain privileges.
- A remote code execution vulnerability in GDI+ can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows Hyper-V can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Speech Runtime can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Client-Side Caching can be exploited remotely to gain privileges.
- A denial of service vulnerability in DirectX Graphics Kernel can be exploited remotely to cause denial of service.
Original advisories
- CVE-2025-59512
- CVE-2025-60721
- CVE-2025-59513
- CVE-2025-59508
- CVE-2025-60718
- CVE-2025-62218
- CVE-2025-60704
- CVE-2025-60707
- CVE-2025-60715
- CVE-2025-59509
- CVE-2025-59510
- CVE-2025-62209
- CVE-2025-60720
- CVE-2025-62217
- CVE-2025-60708
- CVE-2025-62215
- CVE-2025-60714
- CVE-2025-59505
- CVE-2025-62452
- CVE-2025-60713
- CVE-2025-60717
- CVE-2025-60719
- CVE-2025-59506
- CVE-2025-60709
- CVE-2025-59515
- CVE-2025-59514
- CVE-2025-59511
- CVE-2025-60716
- CVE-2025-62213
- CVE-2025-60703
- CVE-2025-62208
- CVE-2025-60724
- CVE-2025-60706
- CVE-2025-62219
- CVE-2025-59507
- CVE-2025-60705
- CVE-2025-60723
Related products
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
- Microsoft-Windows-Server-2022
- Microsoft-Windows-Server-2025
CVE list
- CVE-2025-59505 critical
- CVE-2025-59506 high
- CVE-2025-59507 high
- CVE-2025-59508 high
- CVE-2025-59509 high
- CVE-2025-59510 high
- CVE-2025-59511 critical
- CVE-2025-59512 critical
- CVE-2025-59513 high
- CVE-2025-59514 critical
- CVE-2025-59515 high
- CVE-2025-60703 critical
- CVE-2025-60704 critical
- CVE-2025-60705 critical
- CVE-2025-60706 high
- CVE-2025-60707 critical
- CVE-2025-60708 high
- CVE-2025-60709 critical
- CVE-2025-60710 critical
- CVE-2025-60713 critical
- CVE-2025-60714 critical
- CVE-2025-60715 critical
- CVE-2025-60716 high
- CVE-2025-60717 high
- CVE-2025-60718 critical
- CVE-2025-60719 high
- CVE-2025-60720 critical
- CVE-2025-60721 critical
- CVE-2025-60723 high
- CVE-2025-60724 critical
- CVE-2025-62208 high
- CVE-2025-62209 high
- CVE-2025-62213 high
- CVE-2025-62215 high
- CVE-2025-62217 high
- CVE-2025-62218 high
- CVE-2025-62219 high
- CVE-2025-62452 critical
KB list
- 5066836
- 5066586
- 5066791
- 5066835
- 5066793
- 5066837
- 5066780
- 5066782
- 5068791
- 5068861
- 5068787
- 5068840
- 5068779
- 5068966
- 5068781
- 5068864
- 5068865
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!