Last updated on Nov 19, 2025
S.No Vulnerability Name Severity
WinVerifyTrust Signature Validation Vulnerability(CVE 2013 3900)Important
Windows Scripting Engine Memory Corruption Vulnerability for Windows 11 Version 23H2 for arm64-based Systems (KB5032190)Critical
Windows HTML Platforms Security Feature Bypass Vulnerability for Windows 11 Version 23H2 for arm64-based Systems (KB5034123)Critical
Windows Hyper-V Denial of Service Vulnerability for Windows 11 Version 23H2 for arm64-based Systems (KB5034765)Critical
Windows Hyper-V Remote Code Execution Vulnerability for Windows 11 Version 23H2 for arm64-based Systems (KB5035853)Critical
BitLocker Security Feature Bypass Vulnerability for Windows 11 Version 23H2 for arm64-based Systems (KB5036893)Critical
2024-05 Cumulative Update for Windows 11 Version 23H2 for arm64-based Systems (KB5037771)Critical
2024-05 Cumulative Update for Windows 11 Version 23H2 for arm64-based Systems (KB5037771)Critical
Windows Distributed File System (DFS) Remote Code Execution Vulnerability for Windows 11 Version 23H2 for arm64-based Systems (KB5039212)Critical
2024-08 Cumulative Update for Windows 11 Version 23H2 for arm64-based Systems (KB5041585)Critical
Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability for Windows 11 Version 23H2 for arm64-based Systems (KB5041585)Critical
Windows TCP/IP Remote Code Execution Vulnerability for Windows 11 Version 23H2 for arm64-based Systems (KB5043076)Critical
Windows libarchive Remote Code Execution Vulnerability for Windows 11 Version 23H2 for arm64-based Systems (KB5040442)Important
Open Source Curl Remote Code Execution Vulnerability for Windows 11 Version 23H2 for arm64-based Systems (KB5044285)Critical
Windows Package Library Manager Information Disclosure Vulnerability for Windows 11 Version 23H2 for arm64-based Systems (KB5046633)Critical
2024-12 Cumulative Update for Windows 11 Version 23H2 for arm64-based Systems (KB5048685)Critical
Windows Remote Desktop Services Remote Code Execution Vulnerability for Windows 11 Version 23H2 for arm64-based Systems (KB5048685)Critical
Windows Task Scheduler Elevation of Privilege Vulnerability for Windows 11 Version 23H2 for arm64-based Systems (KB5048685) (CVE-2024-49138)Critical
Windows App Package Installer Elevation of Privilege Vulnerability for Windows 11 Version 23H2 for arm64-based Systems (KB5050021)Critical
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability for Windows 11 Version 23H2 for arm64-based Systems (KB5051989)Important
Windows exFAT File System Remote Code Execution Vulnerability for Windows 11 Version 23H2 for arm64-based Systems (KB5053602)Important
Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability for Windows 11 Version 23H2 for arm64-based Systems (KB5055528)Important
Kernel Streaming Service Driver Elevation of Privilege Vulnerability for Windows 11 Version 23H2 for arm64-based Systems (KB5058405)Important
Windows Storage Management Provider Information Disclosure Vulnerability for Windows 11 Version 23H2 for arm64-based Systems (KB5060999) (CVE-2025-33053) (CVE-2025-33073)Important
Remote Desktop Spoofing Vulnerability for Windows 11 Version 23H2 for arm64-based Systems (KB5062552)Critical
Windows Graphics Component Elevation of Privilege Vulnerability for Windows 11 Version 23H2 for arm64-based Systems (KB5063875)Critical
Windows MBT Transport Driver Elevation of Privilege Vulnerability for Windows 11 Version 23H2 for arm64-based Systems (KB5065431)Important
MITRE CVE-2016-9535: LibTIFF Heap Buffer Overflow Vulnerability for Windows 11 Version 23H2 for arm64-based Systems (KB5066793)Critical
Windows Smart Card Reader Elevation of Privilege Vulnerability for Windows 11 Version 23H2 for arm64-based Systems (KB5068865)Critical

Disclaimer: This webpage is intended to provide you information about vulnerability announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.