Описание
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions, obtain sensitive information, spoof user interface, gain privileges.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Predictor can be exploited remotely to execute arbitrary code.
- A security bypass vulnerability in SecureBoot in IGEL OS before 11 can be exploited remotely to bypass security restrictions.
- An out of bounds read vulnerability in TCG TPM2.0 can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Agere Modem Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in PowerShell can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Microsoft Exchange Server can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows NTFS can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in DirectX Graphics Kernel can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Resilient File System (ReFS) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Error Reporting Service can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows WLAN AutoConfig Service can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Authentication can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows COM+ Event System Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows SMB Server can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows Local Session Manager (LSM) can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Inbox COM Objects (Global Memory) can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Remote Desktop Protocol can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Microsoft Windows File Explorer can be exploited remotely to spoof user interface.
- A spoofing vulnerability in NTLM Hash Disclosure can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Microsoft Failover Cluster can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in Windows Search Service can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Simple Search and Discovery Protocol (SSDP) Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Network Connection Status Indicator (NCSI) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Remote Desktop Services can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows MapUrlToZone can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Windows Push Notification can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Remote Access Connection Manager can be exploited remotely to gain privileges.
- A spoofing vulnerability in Microsoft Exchange Server can be exploited remotely to spoof user interface.
- An information disclosure vulnerability in Windows Active Directory Federation Services (ADFS) can be exploited remotely to obtain sensitive information.
- A tampering vulnerability in Windows SMB Client can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Internet Information Services (IIS) Inbox COM Objects (Global Memory) can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Server Update Service (WSUS) can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows URL Parsing can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Connected Devices Platform Service can be exploited remotely to gain privileges.
- A security bypass vulnerability in Windows Remote Desktop Protocol can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Windows Speech Runtime can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Bluetooth Service can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Xbox IStorageService can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows PrintWorkflowUserSvc can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Network Driver Interface Specification Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Windows Kernel can be exploited remotely to bypass security restrictions.
- An information disclosure vulnerability in Windows Taskbar Live Preview can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Windows Storage Management Provider can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows DWM Core Library can be exploited remotely to gain privileges.
- A spoofing vulnerability in Windows NTLM can be exploited remotely to spoof user interface.
- A security feature bypass vulnerability in Windows Hello can be exploited remotely to bypass security restrictions.
- An integer overflow vulnerability in Dolby Digital Plus audio decoder can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in NtQueryInformation Token function (ntifs.h) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Management Services can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Microsoft Brokering File System can be exploited remotely to gain privileges.
- A spoofing vulnerability in Virtual Secure Mode can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Windows Hyper-V can be exploited remotely to gain privileges.
- A denial of service vulnerability in Microsoft Graphics Component can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Desktop Windows Manager can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows ETL Channel can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Windows BitLocker can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Microsoft DWM Core Library can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows State Repository API Server File can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in Remote Procedure Call can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows Management Services can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Digital Media can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Software Protection Platform (SPP) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Storport.sys Driver can be exploited remotely to gain privileges.
- A spoofing vulnerability in Data Sharing Service can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Windows Connected Devices Platform Service (Cdpsvc) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft Graphics Component can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Cryptographic Services can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Virtualization-Based Security (VBS) Enclave can be exploited remotely to gain privileges.
Первичный источник обнаружения
- CVE-2025-59278
CVE-2025-59188
CVE-2025-58737
CVE-2025-58733
CVE-2025-47827
CVE-2025-59230
CVE-2025-59201
CVE-2025-55687
CVE-2025-59187
CVE-2025-59244
CVE-2025-55678
CVE-2025-58736
CVE-2025-58729
CVE-2025-59242
CVE-2025-55335
CVE-2025-58718
CVE-2025-58714
CVE-2025-59196
CVE-2025-59208
CVE-2025-59209
CVE-2025-58725
CVE-2025-58732
CVE-2025-58730
CVE-2025-55695
CVE-2025-59214
CVE-2025-59277
CVE-2025-55692
CVE-2025-58739
CVE-2025-24052
CVE-2025-59259
CVE-2025-55700
CVE-2025-59253
CVE-2025-55701
CVE-2025-59287
CVE-2025-59202
CVE-2025-59280
CVE-2025-59198
CVE-2025-59185
CVE-2025-24990
CVE-2025-58735
CVE-2025-58717
CVE-2025-59205
CVE-2025-59282
CVE-2025-59190
CVE-2025-59258
CVE-2025-58726
CVE-2025-59275
CVE-2025-25004
CVE-2025-59295
CVE-2025-59211
CVE-2016-9535
CVE-2025-59249
CVE-2025-59248
CVE-2025-53782
CVE-2025-2884
CVE-2025-58727
CVE-2025-55340
CVE-2025-58719
CVE-2025-58716
CVE-2025-55679
CVE-2025-59290
CVE-2025-55336
CVE-2025-58738
CVE-2025-53768
CVE-2025-55689
CVE-2025-55699
CVE-2025-55686
CVE-2025-55339
CVE-2025-55680
CVE-2025-55331
CVE-2025-55334
CVE-2025-59294
CVE-2025-55325
CVE-2025-59194
CVE-2025-59255
CVE-2025-59207
CVE-2025-59284
CVE-2025-53139
CVE-2025-54957
CVE-2025-55696
CVE-2025-59261
CVE-2025-58734
CVE-2025-59193
CVE-2025-48004
CVE-2025-48813
CVE-2025-55328
CVE-2025-59195
CVE-2025-55681
CVE-2025-59197
CVE-2025-55332
CVE-2025-50152
CVE-2025-55333
CVE-2025-59254
CVE-2025-59203
CVE-2025-59502
CVE-2025-59204
CVE-2025-53150
CVE-2025-59199
CVE-2025-59192
CVE-2025-55330
CVE-2025-58722
CVE-2025-58728
CVE-2025-58715
CVE-2025-55685
CVE-2025-50175
CVE-2025-59200
CVE-2025-55326
CVE-2025-59289
CVE-2025-59191
CVE-2025-49708
CVE-2025-58731
CVE-2025-58720
CVE-2025-53717
CVE-2025-55338
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-Server-2008
- Microsoft-Exchange-Server
- Microsoft-Windows-10
- Microsoft-Windows-11
Список CVE
- CVE-2016-9535 critical
- CVE-2025-47827 warning
- CVE-2025-2884 high
- CVE-2025-24052 critical
- CVE-2025-24990 critical
- CVE-2025-25004 high
- CVE-2025-48004 high
- CVE-2025-48813 warning
- CVE-2025-49708 critical
- CVE-2025-50152 critical
- CVE-2025-50175 critical
- CVE-2025-53139 high
- CVE-2025-53150 critical
- CVE-2025-53717 high
- CVE-2025-53768 critical
- CVE-2025-53782 critical
- CVE-2025-55325 high
- CVE-2025-55326 critical
- CVE-2025-55328 high
- CVE-2025-55330 warning
- CVE-2025-55331 high
- CVE-2025-55332 warning
- CVE-2025-55333 warning
- CVE-2025-55334 high
- CVE-2025-55335 high
- CVE-2025-55336 high
- CVE-2025-55338 warning
- CVE-2025-55339 critical
- CVE-2025-55340 high
- CVE-2025-55678 high
- CVE-2025-55679 warning
- CVE-2025-55680 high
- CVE-2025-55681 critical
- CVE-2025-55685 high
- CVE-2025-55686 high
- CVE-2025-55687 high
- CVE-2025-55689 high
- CVE-2025-55692 critical
- CVE-2025-55695 warning
- CVE-2025-55696 high
- CVE-2025-55699 high
- CVE-2025-55700 warning
- CVE-2025-55701 critical
- CVE-2025-58714 critical
- CVE-2025-58715 critical
- CVE-2025-58716 critical
- CVE-2025-58717 warning
- CVE-2025-58718 critical
- CVE-2025-58719 warning
- CVE-2025-58720 critical
- CVE-2025-58722 critical
- CVE-2025-58725 high
- CVE-2025-58726 critical
- CVE-2025-58727 high
- CVE-2025-58728 critical
- CVE-2025-58729 high
- CVE-2025-58730 high
- CVE-2025-58731 high
- CVE-2025-58732 high
- CVE-2025-58733 high
- CVE-2025-58734 high
- CVE-2025-58735 high
- CVE-2025-58736 high
- CVE-2025-58737 high
- CVE-2025-58738 high
- CVE-2025-58739 high
- CVE-2025-59185 high
- CVE-2025-59187 critical
- CVE-2025-59188 high
- CVE-2025-59190 high
- CVE-2025-59191 critical
- CVE-2025-59192 critical
- CVE-2025-59193 high
- CVE-2025-59194 high
- CVE-2025-59195 high
- CVE-2025-59196 high
- CVE-2025-59197 high
- CVE-2025-59198 warning
- CVE-2025-59199 critical
- CVE-2025-59200 critical
- CVE-2025-59201 critical
- CVE-2025-59202 high
- CVE-2025-59203 high
- CVE-2025-59204 high
- CVE-2025-59205 high
- CVE-2025-59207 critical
- CVE-2025-59208 high
- CVE-2025-59209 high
- CVE-2025-59211 high
- CVE-2025-59214 high
- CVE-2025-59230 critical
- CVE-2025-59242 critical
- CVE-2025-59244 high
- CVE-2025-59248 critical
- CVE-2025-59249 critical
- CVE-2025-59253 high
- CVE-2025-59254 critical
- CVE-2025-59255 critical
- CVE-2025-59258 high
- CVE-2025-59259 high
- CVE-2025-59261 high
- CVE-2025-59275 critical
- CVE-2025-59277 critical
- CVE-2025-59278 critical
- CVE-2025-59280 warning
- CVE-2025-59282 high
- CVE-2025-59284 high
- CVE-2025-59287 critical
- CVE-2025-59289 high
- CVE-2025-59290 critical
- CVE-2025-59294 warning
- CVE-2025-59295 critical
- CVE-2025-59502 critical
- CVE-2025-54957 critical
Список KB
- 5065429
- 5065431
- 5066369
- 5066368
- 5066367
- 5066874
- 5066873
- 5066872
- 5066840
- 5066877
- 5066876
- 5066875
- 5066791
- 5066793
- 5070886
- 5070887
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!