Security
Headlines
HeadlinesLatestCVEs

Tag

#windows

CVE-2025-53801: Microsoft DWM Core Library Elevation of Privilege Vulnerability

Untrusted pointer dereference in Windows DWM allows an authorized attacker to elevate privileges locally.

Microsoft Security Response Center
#vulnerability#windows#microsoft#auth#Windows DWM#Security Vulnerability
CVE-2025-53800: Windows Graphics Component Elevation of Privilege Vulnerability

**What privileges could be gained by an attacker who successfully exploited this vulnerability?** An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.

CVE-2025-53804: Windows Kernel-Mode Driver Information Disclosure Vulnerability

Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally.

CVE-2025-53803: Windows Kernel Memory Information Disclosure Vulnerability

Generation of error message containing sensitive information in Windows Kernel allows an authorized attacker to disclose information locally.

CVE-2025-53802: Windows Bluetooth Service Elevation of Privilege Vulnerability

**What privileges could be gained by an attacker who successfully exploited this vulnerability?** An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.

CVE-2025-54913: Windows UI XAML Maps MapControlSettings Elevation of Privilege Vulnerability

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows UI XAML Phone DatePickerFlyout allows an authorized attacker to elevate privileges locally.

CVE-2025-55228: Windows Graphics Component Remote Code Execution Vulnerability

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to execute code locally.

CVE-2025-54919: Windows Graphics Component Remote Code Execution Vulnerability

**According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?** Successful exploitation of this vulnerability requires an attacker to win a race condition.