7.8
CVE-2025-53133 - Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally.
8
CVE-2025-53132 - Win32k Elevation of Privilege Vulnerability
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to elevate privileges over a network.
8.8
CVE-2025-53131 - Windows Media Remote Code Execution Vulnerability
Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network.
8.1
CVE-2025-50177 - Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
Use after free in Windows Message Queuing allows an unauthorized attacker to execute code over a network.
7.8
CVE-2025-50176 - DirectX Graphics Kernel Remote Code Execution Vulnerability
Access of resource using incompatible type ('type confusion') in Graphics Kernel allows an authorized attacker to execute code locally.
7.8
CVE-2025-50173 - Windows Installer Elevation of Privilege Vulnerability
Weak authentication in Windows Installer allows an authorized attacker to elevate privileges locally.
6.5
CVE-2025-50172 - DirectX Graphics Kernel Denial of Service Vulnerability
Allocation of resources without limits or throttling in Windows DirectX allows an authorized attacker to deny service over a network.
9.1
CVE-2025-50171 - Remote Desktop Spoofing Vulnerability
Missing authorization in Remote Desktop Server allows an unauthorized attacker to perform spoofing over a network.
7.8
CVE-2025-50170 - Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
Improper handling of insufficient permissions or privileges in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.
7.5
CVE-2025-50169 - Windows SMB Remote Code Execution Vulnerability
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB allows an unauthorized attacker to execute code over a network.