Açıklama
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions, obtain sensitive information, spoof user interface, gain privileges.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Predictor can be exploited remotely to execute arbitrary code.
- A security bypass vulnerability in SecureBoot in IGEL OS before 11 can be exploited remotely to bypass security restrictions.
- An out of bounds read vulnerability in TCG TPM2.0 can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Agere Modem Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in PowerShell can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Microsoft Exchange Server can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows NTFS can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in DirectX Graphics Kernel can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Resilient File System (ReFS) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Error Reporting Service can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows WLAN AutoConfig Service can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Authentication can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows COM+ Event System Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows SMB Server can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows Local Session Manager (LSM) can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Inbox COM Objects (Global Memory) can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Remote Desktop Protocol can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Microsoft Windows File Explorer can be exploited remotely to spoof user interface.
- A spoofing vulnerability in NTLM Hash Disclosure can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Microsoft Failover Cluster can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in Windows Search Service can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Simple Search and Discovery Protocol (SSDP) Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Network Connection Status Indicator (NCSI) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Remote Desktop Services can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows MapUrlToZone can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Windows Push Notification can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Remote Access Connection Manager can be exploited remotely to gain privileges.
- A spoofing vulnerability in Microsoft Exchange Server can be exploited remotely to spoof user interface.
- An information disclosure vulnerability in Windows Active Directory Federation Services (ADFS) can be exploited remotely to obtain sensitive information.
- A tampering vulnerability in Windows SMB Client can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Internet Information Services (IIS) Inbox COM Objects (Global Memory) can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Server Update Service (WSUS) can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows URL Parsing can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Connected Devices Platform Service can be exploited remotely to gain privileges.
- A security bypass vulnerability in Windows Remote Desktop Protocol can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Windows Speech Runtime can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Bluetooth Service can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Xbox IStorageService can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows PrintWorkflowUserSvc can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Network Driver Interface Specification Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Windows Kernel can be exploited remotely to bypass security restrictions.
- An information disclosure vulnerability in Windows Taskbar Live Preview can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Windows Storage Management Provider can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows DWM Core Library can be exploited remotely to gain privileges.
- A spoofing vulnerability in Windows NTLM can be exploited remotely to spoof user interface.
- A security feature bypass vulnerability in Windows Hello can be exploited remotely to bypass security restrictions.
- An integer overflow vulnerability in Dolby Digital Plus audio decoder can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in NtQueryInformation Token function (ntifs.h) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Management Services can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Microsoft Brokering File System can be exploited remotely to gain privileges.
- A spoofing vulnerability in Virtual Secure Mode can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Windows Hyper-V can be exploited remotely to gain privileges.
- A denial of service vulnerability in Microsoft Graphics Component can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Desktop Windows Manager can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows ETL Channel can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Windows BitLocker can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Microsoft DWM Core Library can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows State Repository API Server File can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in Remote Procedure Call can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows Management Services can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Digital Media can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Software Protection Platform (SPP) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Storport.sys Driver can be exploited remotely to gain privileges.
- A spoofing vulnerability in Data Sharing Service can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Windows Connected Devices Platform Service (Cdpsvc) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft Graphics Component can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Cryptographic Services can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Virtualization-Based Security (VBS) Enclave can be exploited remotely to gain privileges.
Orijinal öneriler
- CVE-2025-59188
- CVE-2025-58737
- CVE-2025-58733
- CVE-2025-47827
- CVE-2025-59230
- CVE-2025-59201
- CVE-2025-55687
- CVE-2025-59187
- CVE-2025-59244
- CVE-2025-55678
- CVE-2025-58736
- CVE-2025-58729
- CVE-2025-59242
- CVE-2025-55335
- CVE-2025-58718
- CVE-2025-58714
- CVE-2025-59196
- CVE-2025-59208
- CVE-2025-59209
- CVE-2025-58725
- CVE-2025-58732
- CVE-2025-58730
- CVE-2025-55695
- CVE-2025-59214
- CVE-2025-59277
- CVE-2025-55692
- CVE-2025-58739
- CVE-2025-24052
- CVE-2025-59259
- CVE-2025-55700
- CVE-2025-59253
- CVE-2025-55701
- CVE-2025-59287
- CVE-2025-59202
- CVE-2025-59280
- CVE-2025-59198
- CVE-2025-59185
- CVE-2025-24990
- CVE-2025-58735
- CVE-2025-58717
- CVE-2025-59205
- CVE-2025-59282
- CVE-2025-59190
- CVE-2025-59258
- CVE-2025-58726
- CVE-2025-59275
- CVE-2025-25004
- CVE-2025-59295
- CVE-2025-59211
- CVE-2016-9535
- CVE-2025-59249
- CVE-2025-59248
- CVE-2025-53782
- CVE-2025-2884
- CVE-2025-58727
- CVE-2025-55340
- CVE-2025-58719
- CVE-2025-58716
- CVE-2025-55679
- CVE-2025-59290
- CVE-2025-55336
- CVE-2025-58738
- CVE-2025-53768
- CVE-2025-55689
- CVE-2025-55699
- CVE-2025-55686
- CVE-2025-55339
- CVE-2025-55680
- CVE-2025-55331
- CVE-2025-55334
- CVE-2025-59294
- CVE-2025-55325
- CVE-2025-59194
- CVE-2025-59255
- CVE-2025-59207
- CVE-2025-59284
- CVE-2025-53139
- CVE-2025-54957
- CVE-2025-55696
- CVE-2025-59261
- CVE-2025-58734
- CVE-2025-59193
- CVE-2025-48004
- CVE-2025-48813
- CVE-2025-55328
- CVE-2025-59195
- CVE-2025-55681
- CVE-2025-59197
- CVE-2025-55332
- CVE-2025-50152
- CVE-2025-55333
- CVE-2025-59254
- CVE-2025-59203
- CVE-2025-59502
- CVE-2025-59204
- CVE-2025-53150
- CVE-2025-59199
- CVE-2025-59192
- CVE-2025-55330
- CVE-2025-58722
- CVE-2025-58728
- CVE-2025-58715
- CVE-2025-55685
- CVE-2025-50175
- CVE-2025-59200
- CVE-2025-55326
- CVE-2025-59289
- CVE-2025-59191
- CVE-2025-49708
- CVE-2025-58731
- CVE-2025-58720
- CVE-2025-53717
- CVE-2025-55338
Kötüye kullanma
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
İlgili ürünler
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-Server-2008
- Microsoft-Exchange-Server
- Microsoft-Windows-10
- Microsoft-Windows-11
CVE Listesi
- CVE-2016-9535 critical
- CVE-2025-47827 warning
- CVE-2025-2884 high
- CVE-2025-24052 critical
- CVE-2025-24990 critical
- CVE-2025-25004 high
- CVE-2025-48004 high
- CVE-2025-48813 warning
- CVE-2025-49708 critical
- CVE-2025-50152 critical
- CVE-2025-50175 critical
- CVE-2025-53139 high
- CVE-2025-53150 critical
- CVE-2025-53717 high
- CVE-2025-53768 critical
- CVE-2025-53782 critical
- CVE-2025-55325 high
- CVE-2025-55326 critical
- CVE-2025-55328 high
- CVE-2025-55330 warning
- CVE-2025-55331 high
- CVE-2025-55332 warning
- CVE-2025-55333 warning
- CVE-2025-55334 high
- CVE-2025-55335 high
- CVE-2025-55336 high
- CVE-2025-55338 warning
- CVE-2025-55339 critical
- CVE-2025-55340 high
- CVE-2025-55678 high
- CVE-2025-55679 warning
- CVE-2025-55680 high
- CVE-2025-55681 critical
- CVE-2025-55685 high
- CVE-2025-55686 high
- CVE-2025-55687 high
- CVE-2025-55689 high
- CVE-2025-55692 critical
- CVE-2025-55695 warning
- CVE-2025-55696 high
- CVE-2025-55699 high
- CVE-2025-55700 warning
- CVE-2025-55701 critical
- CVE-2025-58714 critical
- CVE-2025-58715 critical
- CVE-2025-58716 critical
- CVE-2025-58717 warning
- CVE-2025-58718 critical
- CVE-2025-58719 warning
- CVE-2025-58720 critical
- CVE-2025-58722 critical
- CVE-2025-58725 high
- CVE-2025-58726 critical
- CVE-2025-58727 high
- CVE-2025-58728 critical
- CVE-2025-58729 high
- CVE-2025-58730 high
- CVE-2025-58731 high
- CVE-2025-58732 high
- CVE-2025-58733 high
- CVE-2025-58734 high
- CVE-2025-58735 high
- CVE-2025-58736 high
- CVE-2025-58737 high
- CVE-2025-58738 high
- CVE-2025-58739 high
- CVE-2025-59185 high
- CVE-2025-59187 critical
- CVE-2025-59188 high
- CVE-2025-59190 high
- CVE-2025-59191 critical
- CVE-2025-59192 critical
- CVE-2025-59193 high
- CVE-2025-59194 high
- CVE-2025-59195 high
- CVE-2025-59196 high
- CVE-2025-59197 high
- CVE-2025-59198 warning
- CVE-2025-59199 critical
- CVE-2025-59200 critical
- CVE-2025-59201 critical
- CVE-2025-59202 high
- CVE-2025-59203 high
- CVE-2025-59204 high
- CVE-2025-59205 high
- CVE-2025-59207 critical
- CVE-2025-59208 high
- CVE-2025-59209 high
- CVE-2025-59211 high
- CVE-2025-59214 high
- CVE-2025-59230 critical
- CVE-2025-59242 critical
- CVE-2025-59244 high
- CVE-2025-59248 critical
- CVE-2025-59249 critical
- CVE-2025-59253 high
- CVE-2025-59254 critical
- CVE-2025-59255 critical
- CVE-2025-59258 high
- CVE-2025-59259 high
- CVE-2025-59261 high
- CVE-2025-59275 critical
- CVE-2025-59277 critical
- CVE-2025-59278 critical
- CVE-2025-59280 warning
- CVE-2025-59282 high
- CVE-2025-59284 high
- CVE-2025-59287 critical
- CVE-2025-59289 high
- CVE-2025-59290 critical
- CVE-2025-59294 warning
- CVE-2025-59295 critical
- CVE-2025-59502 critical
- CVE-2025-54957 critical
KB Listesi
- 5065429
- 5065431
- 5066369
- 5066368
- 5066367
- 5066874
- 5066873
- 5066872
- 5066840
- 5066877
- 5066876
- 5066875
- 5066791
- 5066793
- 5070886
- 5070887
Daha fazlasını okuyun
Bölgenizde yayılan güvenlik açıklarının istatistiklerini öğrenin statistics.securelist.com
Bu güvenlik açığının açıklamasında bir tutarsızlık mı tespit ettiniz? Bize bildirin!