Microsoft Windows Vulnerabilities

Timeline

The analysis of the timeline helps to identify the required approach and handling of single items and item collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Prioritizing items becomes possible.

Last Year

The analysis of the timeline helps to identify the required approach and handling of single items and item collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Prioritizing items becomes possible.

Version

Server 20163606
Server 20193589
10 18093357
103281
Server 20123169

Grouping all affected versions of a specific product helps to determine existing issues. This makes it possible to determine vendors and products which need attention when it comes to remediations.

Remediation

Official Fix6277
Temporary Fix0
Workaround304
Unavailable40
Not Defined200

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability

High358
Functional41
Proof-of-Concept1061
Unproven2507
Not Defined2854

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

Access Vector

Not Defined0
Physical116
Local2006
Adjacent245
Network4454

The approach a vulnerability it becomes important to use the expected access vector. This is typically via the network, local, or physically even.

Authentication

Not Defined0
High192
Low3945
None2684

To exploit a vulnerability a certail level of authentication might be required. Vulnerabilities without such a requirement are much more popular.

User Interaction

Not Defined0
Required974
None5847

Some attack scenarios require some user interaction by a victim. This is typical for phishing, social engineering and cross site scripting attacks.

C3BM Index

Our unique C3BM Index (CVSSv3 Base Meta Index) cumulates the CVSSv3 Meta Base Scores of all entries over time. Comparing this index to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

Last Year

Our unique C3BM Index (CVSSv3 Base Meta Index) cumulates the CVSSv3 Meta Base Scores of all entries over time. Comparing this index to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

CVSSv3 Base

≤10
≤20
≤39
≤4290
≤5574
≤61144
≤71083
≤82300
≤91133
≤10288

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp

≤10
≤20
≤333
≤4356
≤5917
≤61025
≤71996
≤81807
≤9551
≤10136

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB

≤10
≤22
≤384
≤4462
≤5722
≤61055
≤71284
≤81729
≤91172
≤10311

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD

≤10
≤20
≤35
≤418
≤5149
≤6441
≤7278
≤81293
≤9276
≤1062

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

CNA

≤10
≤20
≤32
≤44
≤548
≤6192
≤7377
≤8901
≤9362
≤1058

A CVE Numbering Authority (CNA) is responsible for assigning new CVE entries. They might also include a CVSS score. These are usually not complete and might differ from VulDB scores.

Vendor

≤10
≤20
≤37
≤423
≤5316
≤6590
≤7848
≤82001
≤9555
≤1095

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research

≤10
≤20
≤30
≤40
≤50
≤61
≤70
≤81
≤91
≤100

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

Exploit 0-day

<1k13
<2k4
<5k26
<10k137
<25k1097
<50k2411
<100k2494
≥100k639

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today

<1k2464
<2k245
<5k807
<10k972
<25k2107
<50k209
<100k17
≥100k0

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

Exploit Market Volume

Our unique calculation of exploit prices makes it possible to forecast the expected exploit market volume. The calculated prices for all possible 0-day expoits are cumulated for this task. Comparing the volume to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

Last Year

Our unique calculation of exploit prices makes it possible to forecast the expected exploit market volume. The calculated prices for all possible 0-day expoits are cumulated for this task. Comparing the volume to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

🔴 CTI Activities

Our unique Cyber Threat Intelligence aims to determine the ongoing research of actors to anticipiate their acitivities. Observing exploit markets on the Darknet, discussions of vulnerabilities on mailinglists, and exchanges on social media makes it possible to identify planned attacks. Monitored actors and activities are classified whether they are offensive or defensive. They are also weighted as some actors are well-known for certain products and technologies. And some of their disclosures might contain more or less details about technical aspects and personal context. The world map highlights active actors in real-time.

Affected Versions (168): 1.0, 1.1, 1.1.352, 1.2, 2.1, 2.6, 3.1.4000.1823, 3.11, 4.0, 4.0 SP1, 4.0 SP2, 4.0 SP3, 4.0 SP5, 4.0 SP6, 4.1, 5, 5.0, 5.1, 6.0, 6.0.2900.218, 6.00.2900.5512, 6.1, 6.1.76, 6.2, 6.3, 6.4, 7, 7 SP1, 7 SP 1, 7.0, 7.1, 7.5, 8, 8.0, 8.00.00.4477, 8.1, 8.5, 8.5.1, 9, 9.0, 9.1, 9.2, 9.3, 9.4, 9.5, 10, 10 20H2, 10 21H1, 10 21H2, 10 22H2, 10 1507, 10 1511, 10 1606, 10 1607, 10 1703, 10 1709, 10 1803, 10 1809, 10 1903, 10 1909, 10 2004, 10 Mobile, 10 Version 1809 for 32-bit Systems, 10.00.00.4036, 11, 11 21H1, 11 21H2, 11 22H2, 11 22H3, 11 23H2, 11 24H2, 11.0.5721.523, 11.0.5721.526, 11.0.5721.5145, 12, 22H2, 23H2, 64-bit SP2, 95, 98, 98 SP1, 98SE, 1122 H2, 1511, 1999, 2000, 2000 SP1, 2000 SP2, 2000 SP3, 2000 SP4, 2003, 2003 SP2, 2005, 2008 R2 SP1, 2008 SP2, 2009, 2011, 2012, 2012 R2, 2016, App Client, CE, CE 3.0.9348, ME, Microsoft Office, Microsoft Office 2019, Microsoft Office LTSC, NT, NT 3.1, NT 3.5, NT 3.51, NT 3.51 SP4, NT 4.0, NT 4.0 Beta, NT 4.0 SP1, NT 4.0 SP2, NT 4.0 SP3, NT 4.0 SP4, NT 4.0 SP5, NT 4.0 SP6a, PowerShell 7.2, PowerShell 7.3, R2, RT, RT 8.1, RT8.1, Remote Desktop client, SP3, Server 20H2, Server 1709, Server 1803, Server 1903, Server 1909, Server 1930, Server 2003, Server 2003 R2 SP1, Server 2003 R2 SP2, Server 2003 SP1, Server 2003 SP2, Server 2004, Server 2008, Server 2008 R2, Server 2008 R2 SP1, Server2008 R2 SP1, Server 2008 R2 SP2, Server 2008 SP2, Server 2008 SP2, Server 2012, Server2012, Server 2012 R2, Server 2013, Server 2016, Server 2018 R2 SP1, Server 2018 SP2, Server 2019, Server 2022, Server 2022 23H2, Server 2022 Azure Edition Core Hotpatch, Server 2022 Datacenter Azure Edition, Server 2025, Subsystem, Vista, Vista SP1, Vista SP2, XP, XP SP1, XP SP2, XP SP3

Link to Product Website: https://www.microsoft.com/en-us/windows

Software Type: Operating System

PublishedBaseTempVulnerability0dayTodayExpRemCTICVE
03/11/20258.87.7Microsoft Windows Remote Desktop Client path traversal$25k-$100k$5k-$25kUnprovenOfficial Fix0.17CVE-2025-26645
03/11/20257.06.7Microsoft Windows Management Console neutralization$25k-$100k$5k-$25kHighOfficial Fix0.30CVE-2025-26633
03/11/20255.75.0Microsoft Windows link following$25k-$100k$5k-$25kUnprovenOfficial Fix0.04CVE-2025-25008
03/11/20254.43.9Microsoft Windows DirectX Graphics Kernel File null pointer dereference$0-$5k$0-$5kUnprovenOfficial Fix0.07CVE-2025-24997
03/11/20255.44.7Microsoft Windows NTLM Hash file inclusion$25k-$100k$5k-$25kUnprovenOfficial Fix0.06CVE-2025-24996
03/11/20257.86.8Microsoft Windows Kernel Streaming WOW Thunk Service Driver heap-based overflow$25k-$100k$5k-$25kUnprovenOfficial Fix0.03CVE-2025-24995
03/11/20257.66.6Microsoft Windows Cross Device Service access control$25k-$100k$5k-$25kUnprovenOfficial Fix0.20CVE-2025-24994
03/11/20257.87.5Microsoft Windows NTFS heap-based overflow$25k-$100k$5k-$25kHighOfficial Fix0.15CVE-2025-24993
03/11/20254.43.8Microsoft Windows NTFS buffer over-read$5k-$25k$0-$5kUnprovenOfficial Fix0.03CVE-2025-24992
03/11/20255.04.8Microsoft Windows NTFS out-of-bounds$5k-$25k$0-$5kHighOfficial Fix0.14CVE-2025-24991
03/11/20256.65.8Microsoft Windows USB Video Class System Driver out-of-bounds$5k-$25k$0-$5kUnprovenOfficial Fix0.00CVE-2025-24988
03/11/20256.65.8Microsoft Windows USB Video Class System Driver out-of-bounds$5k-$25k$0-$5kUnprovenOfficial Fix0.03CVE-2025-24987
03/11/20257.67.3Microsoft Windows Fast FAT File System Driver integer overflow$25k-$100k$5k-$25kHighOfficial Fix0.25CVE-2025-24985
03/11/20253.93.7Microsoft Windows NTFS log file$0-$5k$0-$5kHighOfficial Fix0.23CVE-2025-24984
03/11/20257.06.7Microsoft Windows Win32 Kernel Subsystem use after free$25k-$100k$5k-$25kHighOfficial Fix0.14CVE-2025-24983
03/11/20258.17.0Microsoft Windows Windows Subsystem for Linux untrusted pointer dereference$25k-$100k$5k-$25kUnprovenOfficial Fix0.08CVE-2025-24084
03/11/20257.66.6Microsoft Windows Cross Device Service access control$25k-$100k$5k-$25kUnprovenOfficial Fix0.03CVE-2025-24076
03/11/20257.86.8Microsoft Windows Local Security Authority use after free$25k-$100k$5k-$25kUnprovenOfficial Fix0.03CVE-2025-24072
03/11/20256.45.5Microsoft Windows File Explorer information disclosure$25k-$100k$5k-$25kUnprovenOfficial Fix0.06CVE-2025-24071
03/11/20257.86.8Microsoft Windows Kernel Streaming Service Driver heap-based overflow$25k-$100k$5k-$25kUnprovenOfficial Fix0.03CVE-2025-24067
03/11/20257.86.8Microsoft Windows Kernel Streaming Service Driver heap-based overflow$25k-$100k$5k-$25kUnprovenOfficial Fix0.04CVE-2025-24066
03/11/20258.17.1Microsoft Windows Domain Name Service use after free$100k and more$25k-$100kUnprovenOfficial Fix0.09CVE-2025-24064
03/11/20257.06.1Microsoft Windows Mark of the Web protection mechanism$25k-$100k$5k-$25kUnprovenOfficial Fix0.03CVE-2025-24061
03/11/20257.86.8Microsoft Windows Common Log File System Driver numeric conversion$25k-$100k$5k-$25kUnprovenOfficial Fix0.11CVE-2025-24059
03/11/20258.87.7Microsoft Windows Telephony Service heap-based overflow$100k and more$25k-$100kUnprovenOfficial Fix0.09CVE-2025-24056
03/11/20253.22.8Microsoft Windows USB Video Class System Driver out-of-bounds$0-$5k$0-$5kUnprovenOfficial Fix0.03CVE-2025-24055
03/11/20255.44.7Microsoft Windows NTLM Hash file inclusion$25k-$100k$5k-$25kUnprovenOfficial Fix0.03CVE-2025-24054
03/11/20258.87.7Microsoft Windows Routing/Remote Access Service heap-based overflow$100k and more$25k-$100kUnprovenOfficial Fix0.14CVE-2025-24051
03/11/20257.86.8Microsoft Windows Hyper-V heap-based overflow$25k-$100k$5k-$25kUnprovenOfficial Fix0.14CVE-2025-24050
03/11/20257.86.8Microsoft Windows Hyper-V heap-based overflow$25k-$100k$5k-$25kUnprovenOfficial Fix0.15CVE-2025-24048
03/11/20257.86.8Microsoft Windows Kernel Streaming Service Driver use after free$25k-$100k$5k-$25kUnprovenOfficial Fix0.00CVE-2025-24046
03/11/20258.17.1Microsoft Windows Remote Desktop Services sensitive data storage in improperly locked memory$25k-$100k$5k-$25kUnprovenOfficial Fix0.18CVE-2025-24045
03/11/20257.86.8Microsoft Windows Win32 Kernel Subsystem use after free$25k-$100k$5k-$25kUnprovenOfficial Fix0.04CVE-2025-24044
03/11/20258.17.1Microsoft Windows Remote Desktop Services sensitive data storage in improperly locked memory$25k-$100k$5k-$25kUnprovenOfficial Fix0.45CVE-2025-24035
03/11/20254.33.9Microsoft Windows MapUrlToZone resolution of path$25k-$100k$5k-$25kProof-of-ConceptOfficial Fix0.07CVE-2025-21247
03/11/20258.17.1Microsoft Windows exFAT File System heap-based overflow$25k-$100k$5k-$25kUnprovenOfficial Fix0.06CVE-2025-21180
03/11/20257.57.0Microsoft Windows Core Messaging heap-based overflow$25k-$100k$25k-$100kUnprovenOfficial Fix0.14CVE-2025-26634
02/11/20257.87.1Microsoft Windows Disk Cleanup Tool link following$25k-$100k$5k-$25kUnprovenOfficial Fix0.06CVE-2025-21420
02/11/20256.25.9Microsoft Windows Setup Files Cleanup link following$25k-$100k$5k-$25kFunctionalOfficial Fix0.02CVE-2025-21419
02/11/20257.87.5Microsoft Windows Ancillary Function Driver for WinSock heap-based overflow$25k-$100k$5k-$25kHighOfficial Fix0.00CVE-2025-21418
02/11/20257.06.4Microsoft Windows Core Messaging heap-based overflow$25k-$100k$5k-$25kUnprovenOfficial Fix0.01CVE-2025-21414
02/11/20258.88.1Microsoft Windows Routing/Remote Access Service heap-based overflow$100k and more$25k-$100kUnprovenOfficial Fix0.04CVE-2025-21410
02/11/20258.88.1Microsoft Windows Telephony Service heap-based overflow$100k and more$25k-$100kUnprovenOfficial Fix0.03CVE-2025-21407
02/11/20258.88.1Microsoft Windows Telephony Service use after free$100k and more$25k-$100kUnprovenOfficial Fix0.02CVE-2025-21406
02/11/20256.26.0Microsoft Windows Storage link following$25k-$100k$5k-$25kHighOfficial Fix0.00CVE-2025-21391
02/11/20257.16.5Microsoft Windows DHCP Client Service use after free$25k-$100k$5k-$25kUnprovenOfficial Fix0.06CVE-2025-21379
02/11/20255.85.5Microsoft Windows NTLM Hash file inclusion$25k-$100k$5k-$25kFunctionalOfficial Fix0.00CVE-2025-21377
02/11/20258.17.1Microsoft Windows LDAP integer underflow$100k and more$25k-$100kUnprovenOfficial Fix0.06CVE-2025-21376
02/11/20257.86.8Microsoft Windows Kernel Streaming WOW Thunk Service Driver heap-based overflow$25k-$100k$5k-$25kUnprovenOfficial Fix0.00CVE-2025-21375
02/11/20257.86.8Microsoft Windows Installer link following$25k-$100k$5k-$25kUnprovenOfficial Fix0.03CVE-2025-21373

6771 more entries are not shown

more entries by Microsoft

Want to stay up to date on a daily basis?

Enable the mail alert feature now!