
CVE-2025-48818 – BitLocker Security Feature Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2025-48818
08 Jul 2025 — Time-of-check time-of-use (toctou) race condition in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48818 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVE-2025-48817 – Remote Desktop Client Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2025-48817
08 Jul 2025 — Relative path traversal in Remote Desktop Client allows an unauthorized attacker to execute code over a network. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48817 • CWE-23: Relative Path Traversal CWE-284: Improper Access Control •

CVE-2025-48816 – HID Class Driver Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2025-48816
08 Jul 2025 — Integer overflow or wraparound in HID class driver allows an authorized attacker to elevate privileges locally. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48816 • CWE-125: Out-of-bounds Read CWE-190: Integer Overflow or Wraparound •

CVE-2025-48815 – Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2025-48815
08 Jul 2025 — Access of resource using incompatible type ('type confusion') in Windows SSDP Service allows an authorized attacker to elevate privileges locally. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48815 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVE-2025-48814 – Remote Desktop Licensing Service Security Feature Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2025-48814
08 Jul 2025 — Missing authentication for critical function in Windows Remote Desktop Licensing Service allows an unauthorized attacker to bypass a security feature over a network. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48814 • CWE-306: Missing Authentication for Critical Function •

CVE-2025-48811 – Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2025-48811
08 Jul 2025 — Missing support for integrity check in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48811 • CWE-353: Missing Support for Integrity Check •

CVE-2025-48808 – Windows Kernel Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2025-48808
08 Jul 2025 — Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48808 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2025-48806 – Microsoft MPEG-2 Video Extension Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2025-48806
08 Jul 2025 — Use after free in Microsoft MPEG-2 Video Extension allows an authorized attacker to execute code locally. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48806 • CWE-416: Use After Free •

CVE-2025-48805 – Microsoft MPEG-2 Video Extension Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2025-48805
08 Jul 2025 — Heap-based buffer overflow in Microsoft MPEG-2 Video Extension allows an authorized attacker to execute code locally. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48805 • CWE-122: Heap-based Buffer Overflow •

CVE-2025-48804 – BitLocker Security Feature Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2025-48804
08 Jul 2025 — Acceptance of extraneous untrusted data with trusted data in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48804 • CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data •