Описание
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, bypass security restrictions, execute arbitrary code, read local files, cause denial of service.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Host Process for Windows Tasks can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Customer Experience Improvement Program (CEIP) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Administrator Protection can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Bluetooth RFCOM Protocol Driver can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Speech Recognition can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Microsoft Wireless Provisioning System can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kerberos can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Multimedia Class Scheduler Service (MMCSS) Driver can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows Speech Recognition can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows License Manager can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Transport Driver Interface (TDI) Translation Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.
- A denial of service vulnerability in Storvsp.sys Driver can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows OLE can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Smart Card Reader can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Broadcast DVR User Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in DirectX Graphics Kernel can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Microsoft Streaming Service Proxy can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows WLAN Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Remote Desktop Services can be exploited remotely to gain privileges.
- A remote code execution vulnerability in GDI+ can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows Hyper-V can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Speech Runtime can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Client-Side Caching can be exploited remotely to gain privileges.
- A denial of service vulnerability in DirectX Graphics Kernel can be exploited remotely to cause denial of service.
Первичный источник обнаружения
- CVE-2025-60710
CVE-2025-59512
CVE-2025-60721
CVE-2025-59513
CVE-2025-59508
CVE-2025-60718
CVE-2025-62218
CVE-2025-60704
CVE-2025-60707
CVE-2025-60715
CVE-2025-59509
CVE-2025-59510
CVE-2025-62209
CVE-2025-60720
CVE-2025-62217
CVE-2025-60708
CVE-2025-62215
CVE-2025-60714
CVE-2025-59505
CVE-2025-62452
CVE-2025-60713
CVE-2025-60717
CVE-2025-60719
CVE-2025-59506
CVE-2025-60709
CVE-2025-59515
CVE-2025-59514
CVE-2025-59511
CVE-2025-60716
CVE-2025-62213
CVE-2025-60703
CVE-2025-62208
CVE-2025-60724
CVE-2025-60706
CVE-2025-62219
CVE-2025-59507
CVE-2025-60705
CVE-2025-60723
Связанные продукты
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
- Microsoft-Windows-Server-2022
- Microsoft-Windows-Server-2025
Список CVE
- CVE-2025-59505 critical
- CVE-2025-59506 high
- CVE-2025-59507 high
- CVE-2025-59508 high
- CVE-2025-59509 high
- CVE-2025-59510 high
- CVE-2025-59511 critical
- CVE-2025-59512 critical
- CVE-2025-59513 high
- CVE-2025-59514 critical
- CVE-2025-59515 high
- CVE-2025-60703 critical
- CVE-2025-60704 critical
- CVE-2025-60705 critical
- CVE-2025-60706 high
- CVE-2025-60707 critical
- CVE-2025-60708 high
- CVE-2025-60709 critical
- CVE-2025-60710 critical
- CVE-2025-60713 critical
- CVE-2025-60714 critical
- CVE-2025-60715 critical
- CVE-2025-60716 high
- CVE-2025-60717 high
- CVE-2025-60718 critical
- CVE-2025-60719 high
- CVE-2025-60720 critical
- CVE-2025-60721 critical
- CVE-2025-60723 high
- CVE-2025-60724 critical
- CVE-2025-62208 high
- CVE-2025-62209 high
- CVE-2025-62213 high
- CVE-2025-62215 high
- CVE-2025-62217 high
- CVE-2025-62218 high
- CVE-2025-62219 high
- CVE-2025-62452 critical
Список KB
- 5066836
- 5066586
- 5066791
- 5066835
- 5066793
- 5066837
- 5066780
- 5066782
- 5068791
- 5068861
- 5068787
- 5068840
- 5068779
- 5068966
- 5068781
- 5068864
- 5068865
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!