So, without further ado, here’s the chart of MS patches that affect Windows platforms in the past month.
|
Patch data provided by: |
|||||
|
Technology |
Products Affected |
Severity |
Reference |
Workaround/ Exploited / Publicly Disclosed |
Vulnerability Info |
|
Windows |
Windows 10, 11 Server 2008 SP2, 2008 R2 SP1, 2012, 2012 R2, 2016, 2019, 2022, 2025 including Server Core Installations |
Critical |
CVE-2016-9535 |
Workaround: No Exploited: Yes* Public: Yes** |
Denial of Service |
|
Edge |
Chromium-based |
Important |
CVE-2025-10200 |
Workaround: No |
Remote Code Execution Spoofing |
|
Office |
365 Apps for Enterprise |
Critical |
CVE-2025-10200 |
Workaround: No Exploited: No Public: No |
Denial of Service |
|
SharePoint |
Enterprise Server 2016 |
Important |
CVE-2025-59221 |
Workaround: No Exploited: No Public: No |
Information Disclosure Remote Code Execution |
|
SQL Server |
JDBC Driver versions 10.2, 11.2, 12.10, 12.2, 12.4, 12.6, 12.8, 13.2 |
Important |
Workaround: No Exploited: No Public: No |
Spoofing |
|
|
Azure |
Arc Enabled Servers - Azure Connected Machine Agent |
Critical |
CVE-2025-0033** |
Workaround: No |
Elevation of Privilege Remote Code Execution Spoofing |
|
Apps |
MS 365 Copilot's Business Chat |
Critical |
CVE-2025-49728 |
Workaround: No |
Elevation of Privilege Security Feature Bypass Spoofing |
|
Developer Tools |
.NET 8.0/9.0 on Linux, MacOS, Windows |
Important |
CVE-2025-25004 |
Workaround: No |
Elevation of Privilege Information Disclosure Remote Code Execution Security Feature Bypass |
|
Open Source Software |
microsoft/playwright |
Moderate |
Workaround: No Exploited: No Public: No |
Spoofing |
|
|
Exchange |
2016 CU23 |
Important |
Workaround: No Exploited: No Public: No |
Elevation of Privilege |
|
|
System Center |
Configuration Manager 2403, 2409, 2503 |
Important |
CVE-2025-55320 CVE-2025-59213 CVE-2025-59497 |
Workaround: No Exploited: No Public: No |
Elevation of Privilege |
|
Other |
OmniParser |
Important |
Workaround: No Exploited: No Public: No |
Remote Code Execution |
|
Thanks as always for reading and best wishes on security,
Randy Franklin Smith
Click here to unsubscribeUltimate Windows Security is a division of Monterey Technology Group, Inc. ©2006-2025 Monterey Technology Group, All rights reserved. You may forward this email in its entirety but all other rights reserved.
9450 SW Gemini Drive #53822, Beaverton, OR 97008
Note: We do our best to provide quality information and expert commentary but use all information at your own risk.