Описание
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, bypass security restrictions, obtain sensitive information, spoof user interface, cause denial of service.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Hyper-V Discrete Device Assignment (DDA) can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in BitLocker can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Windows Virtualization-Based Security (VBS) Enclave can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Imaging Component can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Universal Plug and Play (UPnP) Device Host can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Microsoft Brokering File System can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Graphics Component can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in Windows SmartScreen can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Workspace Broker can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Win32 Kernel Subsystem can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows KDC Proxy Service (KPSSVC) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Media can be exploited remotely to gain privileges.
- A tampering vulnerability in Windows StateRepository API Server file can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in NTFS can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Transport Driver Interface (TDI) Translation Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Virtualization-Based Security (VBS) can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Secure Kernel Mode can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Shell can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Capability Access Management Service (camsvc) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Input Method Editor (IME) can be exploited remotely to gain privileges.
- Denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Microsoft PC Manager can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Transport Driver Interface (TDI) Translation Driver can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Notification can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows User-Mode Driver Framework Host can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Microsoft Virtual Hard Disk can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows TCP/IP Driver can be exploited remotely to gain privileges.
- Denial of service vulnerability in Windows Netlogon can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows AppX Deployment Service can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Miracast Wireless Display can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows GDI can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Windows Server Setup and Boot Event Collection can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Simple Search and Discovery Protocol (SSDP) Service can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Cryptographic Services can be exploited remotely to obtain sensitive information.
- A spoofing vulnerability in Windows Storage can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Microsoft Windows QoS Scheduler Driver can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows Kerberos can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Fast FAT File System Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Credential Security Support Provider Protocol (CredSSP) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Kernel Streaming WOW Thunk Service Driver can be exploited remotely to gain privileges.
- A spoofing vulnerability in Windows SMB Server can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Windows Event Tracing can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Microsoft Virtual Hard Disk can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft MPEG-2 Video Extension can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in Remote Desktop Licensing Service can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Connected Devices Platform Service can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Update Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in HID Class Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Search Service can be exploited remotely to gain privileges.
- A spoofing vulnerability in Remote Desktop can be exploited remotely to spoof user interface.
- Denial of service vulnerability in Windows Performance Recorder (WPR) can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Universal Print Management Service can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Hyper-V can be exploited remotely to obtain sensitive information.
- Denial of service vulnerability in Windows Print Spooler can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Storage VSP Driver can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in SPNEGO Extended Negotiation (NEGOEX) Security Mechanism can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows Storage Port Driver can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows MBT Transport Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Connected Devices Platform Service can be exploited remotely to gain privileges.
Первичный источник обнаружения
- CVE-2025-49733
CVE-2025-48822
CVE-2025-48818
CVE-2025-48811
CVE-2025-47980
CVE-2025-48819
CVE-2025-49693
CVE-2025-49742
CVE-2025-49740
CVE-2025-49732
CVE-2025-49665
CVE-2025-49667
CVE-2025-49735
CVE-2025-49682
CVE-2025-49723
CVE-2025-49678
CVE-2025-49663
CVE-2025-49659
CVE-2025-49661
CVE-2025-47159
CVE-2025-48803
CVE-2025-36357
CVE-2025-48809
CVE-2025-49679
CVE-2025-49690
CVE-2025-49744
CVE-2025-47991
CVE-2025-47999
CVE-2025-49674
CVE-2025-47993
CVE-2025-49753
CVE-2025-49672
CVE-2025-49658
CVE-2025-49725
CVE-2025-48810
CVE-2025-49664
CVE-2025-48001
CVE-2025-47972
CVE-2025-49683
CVE-2025-48808
CVE-2025-49686
CVE-2025-49716
CVE-2025-48820
CVE-2025-49691
CVE-2025-47984
CVE-2025-48821
CVE-2025-48804
CVE-2025-49726
CVE-2025-49666
CVE-2025-47975
CVE-2025-48823
CVE-2025-49676
CVE-2025-49760
CVE-2025-48824
CVE-2025-49670
CVE-2025-48003
CVE-2025-26636
CVE-2025-49730
CVE-2025-48800
CVE-2025-47978
CVE-2025-49721
CVE-2025-49673
CVE-2025-47987
CVE-2025-49675
CVE-2025-48802
CVE-2025-49660
CVE-2025-49668
CVE-2025-49677
CVE-2025-47973
CVE-2025-49727
CVE-2025-48806
CVE-2025-47971
CVE-2025-48814
CVE-2025-48817
CVE-2025-49724
CVE-2025-48799
CVE-2025-48816
CVE-2025-48815
CVE-2025-48805
CVE-2025-36350
CVE-2025-49687
CVE-2025-49685
CVE-2025-47985
CVE-2025-49694
CVE-2025-47998
CVE-2025-49688
CVE-2025-49669
CVE-2025-33054
CVE-2025-47976
CVE-2025-49657
CVE-2025-49680
CVE-2025-47986
CVE-2025-48002
CVE-2025-49722
CVE-2025-47982
CVE-2025-49671
CVE-2025-47981
CVE-2025-49684
CVE-2025-49689
CVE-2025-49681
CVE-2025-47996
CVE-2025-48000
CVE-2025-49729
Связанные продукты
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
- Microsoft-Remote-Desktop
- Microsoft-Windows-Server-2022
Список CVE
- CVE-2025-49730 critical
- CVE-2025-47980 high
- CVE-2025-48819 high
- CVE-2025-49742 critical
- CVE-2025-49673 critical
- CVE-2025-49721 critical
- CVE-2025-49732 critical
- CVE-2025-49665 critical
- CVE-2025-49667 critical
- CVE-2025-49675 critical
- CVE-2025-49735 critical
- CVE-2025-47987 critical
- CVE-2025-49663 critical
- CVE-2025-49678 high
- CVE-2025-49660 critical
- CVE-2025-49668 critical
- CVE-2025-49659 critical
- CVE-2025-47973 critical
- CVE-2025-49661 critical
- CVE-2025-49727 high
- CVE-2025-48806 critical
- CVE-2025-47971 critical
- CVE-2025-48814 critical
- CVE-2025-48817 critical
- CVE-2025-48816 critical
- CVE-2025-49679 critical
- CVE-2025-48815 critical
- CVE-2025-48805 critical
- CVE-2025-49687 critical
- CVE-2025-49674 critical
- CVE-2025-47985 critical
- CVE-2025-47976 critical
- CVE-2025-47998 critical
- CVE-2025-49688 critical
- CVE-2025-49669 critical
- CVE-2025-49753 critical
- CVE-2025-49672 critical
- CVE-2025-49657 critical
- CVE-2025-49658 high
- CVE-2025-49664 high
- CVE-2025-47986 critical
- CVE-2025-49683 critical
- CVE-2025-49722 high
- CVE-2025-48001 high
- CVE-2025-48808 high
- CVE-2025-49686 critical
- CVE-2025-49716 high
- CVE-2025-47984 critical
- CVE-2025-48821 high
- CVE-2025-48804 high
- CVE-2025-47981 critical
- CVE-2025-49684 high
- CVE-2025-49681 high
- CVE-2025-47975 high
- CVE-2025-49689 critical
- CVE-2025-47996 critical
- CVE-2025-49676 critical
- CVE-2025-49671 high
- CVE-2025-48824 critical
- CVE-2025-49670 critical
- CVE-2025-49729 critical
- CVE-2025-49733 critical
- CVE-2025-48822 critical
- CVE-2025-48818 high
- CVE-2025-48811 high
- CVE-2025-49693 critical
- CVE-2025-49740 critical
- CVE-2025-49682 high
- CVE-2025-49723 critical
- CVE-2025-47159 critical
- CVE-2025-48803 high
- CVE-2025-36357 high
- CVE-2025-48809 high
- CVE-2025-49690 high
- CVE-2025-49744 high
- CVE-2025-47991 critical
- CVE-2025-47999 high
- CVE-2025-47993 critical
- CVE-2025-49725 critical
- CVE-2025-48810 high
- CVE-2025-47972 critical
- CVE-2025-48820 critical
- CVE-2025-49691 critical
- CVE-2025-49726 critical
- CVE-2025-49666 high
- CVE-2025-48823 high
- CVE-2025-49760 warning
- CVE-2025-48003 high
- CVE-2025-26636 high
- CVE-2025-48800 high
- CVE-2025-47978 high
- CVE-2025-48802 high
- CVE-2025-49677 high
- CVE-2025-49724 critical
- CVE-2025-48799 critical
- CVE-2025-36350 high
- CVE-2025-49685 high
- CVE-2025-49694 critical
- CVE-2025-33054 critical
- CVE-2025-49680 high
- CVE-2025-48002 high
- CVE-2025-47982 critical
- CVE-2025-48000 critical
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!