{
    "document": {
        "category": "csaf_security_advisory",
        "csaf_version": "2.0",
        "distribution": {
            "tlp": {
                "label": "WHITE"
            }
        },
        "lang": "nl",
        "notes": [
            {
                "category": "legal_disclaimer",
                "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
            },
            {
                "category": "description",
                "text": "Microsoft heeft kwetsbaarheden verholpen in Windows.",
                "title": "Feiten"
            },
            {
                "category": "description",
                "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:\n\n- Denial-of-Service\n- Omzeilen van een beveiligingsmaatregel\n- Manipulatie van gegevens\n- Uitvoeren van willekeurige code (gebruikersrechten)\n- Uitvoeren van willekeurige code (root/adminrechten)\n- Toegang tot gevoelige gegevens\n- Verkrijgen van verhoogde rechten\n- Spoofing\n\nDe ernstigste kwetsbaarheden hebben de kenmerken CVE-2025-49708 en CVE-2025-59287 toegewezen gekregen.\nDe kwetsbaarheid met kenmerk CVE-2025-49708 bevindt zich in de Graphics Component en stelt een kwaadwillende in staat om uit een Virtual Machine (VM) te breken en acties uit te voeren op de onderliggende Host.\nDe kwetsbaarheid met kenmerk CVE-2025-59287 bevindt zich in de Windows Server Update Servce (WSUS) en stelt een kwaadwillende in staat om op afstand willekeurige code uit te voeren op het kwetsbare systeem.\n\nVan de kwetsbaarheid met kenmerk CVE-2025-59230 meldt Microsoft informatie te hebben dat deze actief is misbruikt op verouderde systemen. De kwetsbaarheid bevindt zich in de Remote Access Connection Manager stelt een lokale, geauthenticeerde kwaadwillende in staat om zich SYSTEM-rechten toe te kennen en zo mogelijk willekeurige code uit te voeren als SYSTEM\n\n**Update:** \n\nHet NCSC heeft van een vertrouwde partner vernomen dat op 24 oktober 2025 misbruik van de kwetsbaarheid met kenmerk CVE-2025-59287 is waargenomen. Deze kwetsbaarheid bevindt zich in de WSUS-service en stelt een kwaadwillende in staat om willekeurige code uit te voeren op het kwetsbare systeem. Het is niet gebruikelijk een WSUS service publiek via internet toegankelijk te hebben.\nInmiddels is er publieke proof-of-conceptcode beschikbaar voor de betreffende kwetsbaarheid, wat het risico op misbruik verhoogt.\n\n**De in deze Patch-Tuesday update uitgebrachte oplossing voor deze kwetsbaarheid blijkt niet afdoende te zijn. Microsoft heeft hiervoor een out-of-band patch uitgebracht die zo spoedig mogelijk aanvullend op de Patch-Tuesday update dient te worden ingezet.**\n\n```\nWindows Confidential Virtual Machines (CVM): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-48813 | 6.30 | Voordoen als andere gebruiker       | \n|----------------|------|-------------------------------------|\n\nWindows Resilient File System (ReFS): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-55687 | 7.40 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows DirectX: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-55678 | 7.00 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-55698 | 7.70 | Denial-of-Service                   | \n|----------------|------|-------------------------------------|\n\n\nWindows DWM: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-55681 | 7.00 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-58722 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nXbox: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-53768 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Kernel: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59186 | 5.50 | Toegang tot gevoelige gegevens      | \n| CVE-2025-59207 | 7.80 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-50152 | 7.80 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-55334 | 6.20 | Omzeilen van beveiligingsmaatregel  | \n| CVE-2025-55679 | 5.10 | Toegang tot gevoelige gegevens      | \n| CVE-2025-55683 | 5.50 | Toegang tot gevoelige gegevens      | \n| CVE-2025-55693 | 7.40 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-55699 | 5.50 | Toegang tot gevoelige gegevens      | \n| CVE-2025-59187 | 7.80 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-59194 | 7.00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Routing and Remote Access Service (RRAS): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-55700 | 6.50 | Toegang tot gevoelige gegevens      | \n| CVE-2025-58717 | 6.50 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nInbox COM Objects: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-58732 | 7.00 | Uitvoeren van willekeurige code     | \n| CVE-2025-58735 | 7.00 | Uitvoeren van willekeurige code     | \n| CVE-2025-59282 | 7.00 | Uitvoeren van willekeurige code     | \n| CVE-2025-58730 | 7.00 | Uitvoeren van willekeurige code     | \n| CVE-2025-58731 | 7.00 | Uitvoeren van willekeurige code     | \n| CVE-2025-58733 | 7.00 | Uitvoeren van willekeurige code     | \n| CVE-2025-58734 | 7.00 | Uitvoeren van willekeurige code     | \n| CVE-2025-58736 | 7.00 | Uitvoeren van willekeurige code     | \n| CVE-2025-58738 | 7.00 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nAgere Windows Modem Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-24990 | 7.80 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-24052 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nActive Directory Federation Services: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59258 | 6.20 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nWindows Push Notification Core: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59211 | 5.50 | Toegang tot gevoelige gegevens      | \n| CVE-2025-59209 | 5.50 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nWindows Authentication Methods: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59277 | 7.80 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-59275 | 7.80 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-59278 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows File Explorer: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-58739 | 6.50 | Voordoen als andere gebruiker       | \n| CVE-2025-59214 | 6.50 | Voordoen als andere gebruiker       | \n|----------------|------|-------------------------------------|\n\nData Sharing Service Client: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59200 | 7.70 | Voordoen als andere gebruiker       | \n|----------------|------|-------------------------------------|\n\nWindows Hyper-V: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-55328 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows NTFS: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-55335 | 7.40 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows ETL Channel: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59197 | 5.50 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nMicrosoft Failover Cluster Virtual Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59260 | 5.50 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nWindows Server Update Service: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59287 | 9.80 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nMicrosoft Windows Speech: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-58715 | 8.80 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-58716 | 8.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows NTLM: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59284 | 3.30 | Voordoen als andere gebruiker       | \n|----------------|------|-------------------------------------|\n\nWindows COM: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-58725 | 7.00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nNetwork Connection Status Indicator (NCSI): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59201 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nTCG TPM2.0: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-2884  | 5.30 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nWindows MapUrlToZone: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59208 | 7.10 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nInternet Explorer: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59295 | 8.80 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nWindows Core Shell: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59185 | 6.50 | Voordoen als andere gebruiker       | \n| CVE-2025-59244 | 6.50 | Voordoen als andere gebruiker       | \n|----------------|------|-------------------------------------|\n\nWindows SMB Server: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-58726 | 7.50 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Remote Access Connection Manager: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59230 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows PrintWorkflowUserSvc: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-55685 | 7.00 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-55686 | 7.00 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-55689 | 7.00 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-55331 | 7.00 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-55684 | 7.00 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-55688 | 7.00 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-55690 | 7.00 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-55691 | 7.00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Taskbar Live: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59294 | 2.10 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nWindows BitLocker: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-55333 | 6.10 | Omzeilen van beveiligingsmaatregel  | \n| CVE-2025-55338 | 6.10 | Omzeilen van beveiligingsmaatregel  | \n| CVE-2025-55330 | 6.10 | Omzeilen van beveiligingsmaatregel  | \n| CVE-2025-55332 | 6.10 | Omzeilen van beveiligingsmaatregel  | \n| CVE-2025-55337 | 6.10 | Omzeilen van beveiligingsmaatregel  | \n| CVE-2025-55682 | 6.10 | Omzeilen van beveiligingsmaatregel  | \n|----------------|------|-------------------------------------|\n\nNtQueryInformation Token function (ntifs.h): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-55696 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows USB Video Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-55676 | 5.50 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nWindows Ancillary Function Driver for WinSock: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59242 | 7.80 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-58714 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nAzure Local: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-55697 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Local Session Manager (LSM): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59257 | 6.50 | Denial-of-Service                   | \n| CVE-2025-59259 | 6.50 | Denial-of-Service                   | \n| CVE-2025-58729 | 6.50 | Denial-of-Service                   | \n|----------------|------|-------------------------------------|\n\nWindows Resilient File System (ReFS) Deduplication Service: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59206 | 7.40 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-59210 | 7.40 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Virtualization-Based Security (VBS) Enclave: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-53717 | 7.00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Cloud Files Mini Filter Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-55336 | 5.50 | Toegang tot gevoelige gegevens      | \n| CVE-2025-55680 | 8.40 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows WLAN Auto Config Service: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-55695 | 5.50 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nSoftware Protection Platform (SPP): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59199 | 8.40 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Cryptographic Services: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-58720 | 7.80 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nRemote Desktop Client: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-58718 | 8.80 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nWindows StateRepository API: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59203 | 5.50 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nMicrosoft Windows Search Component: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59190 | 5.50 | Denial-of-Service                   | \n| CVE-2025-59198 | 5.00 | Denial-of-Service                   | \n| CVE-2025-59253 | 5.50 | Denial-of-Service                   | \n|----------------|------|-------------------------------------|\n\nWindows Failover Cluster: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-47979 | 5.50 | Toegang tot gevoelige gegevens      | \n| CVE-2025-59188 | 5.50 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nWindows SMB Client: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59280 | 3.10 | Manipulatie van gegevens            | \n|----------------|------|-------------------------------------|\n\nWindows Secure Boot: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-47827 | 4.60 | Omzeilen van beveiligingsmaatregel  | \n|----------------|------|-------------------------------------|\n\nMicrosoft PowerShell: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-25004 | 7.30 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nMicrosoft Windows: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-55701 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nMicrosoft Windows Codecs Library: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-54957 | 7.00 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nWindows Error Reporting: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-55692 | 7.80 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-55694 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows SSDP Service: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59196 | 7.00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nStorport.sys Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59192 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop Protocol: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-55340 | 7.00 | Omzeilen van beveiligingsmaatregel  | \n|----------------|------|-------------------------------------|\n\nWindows Connected Devices Platform Service: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-58727 | 7.00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows NDIS: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-55339 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Health and Optimized Experiences Service: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59241 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop Services: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59202 | 7.00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows High Availability Services: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59184 | 5.50 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nMicrosoft Brokering File System: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-48004 | 7.40 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-59189 | 7.40 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows DWM Core Library: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59254 | 7.80 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-59255 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Digital Media: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-53150 | 7.80 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-50175 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Hello: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-53139 | 7.70 | Omzeilen van beveiligingsmaatregel  | \n|----------------|------|-------------------------------------|\n\nConnected Devices Platform Service (Cdpsvc): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-58719 | 4.70 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-55326 | 7.50 | Uitvoeren van willekeurige code     | \n| CVE-2025-59191 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Device Association Broker service: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-50174 | 7.00 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-55677 | 7.80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Bluetooth Service: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-58728 | 7.80 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-59290 | 7.80 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-59289 | 7.00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Storage Management Provider: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-55325 | 5.50 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nWindows Management Services: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59204 | 5.50 | Toegang tot gevoelige gegevens      | \n| CVE-2025-59193 | 7.00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-58737 | 7.00 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nMicrosoft Graphics Component: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2025-59195 | 7.00 | Denial-of-Service                   | \n| CVE-2025-49708 | 9.90 | Uitvoeren van willekeurige code     | \n| CVE-2016-9535  | 4.00 | Uitvoeren van willekeurige code     | \n| CVE-2025-59205 | 7.00 | Verkrijgen van verhoogde rechten    | \n| CVE-2025-59261 | 7.00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n```\n\n\n**Update**: \nHet NCSC heeft van een vertrouwde partner vernomen dat op 24 oktober 2025 misbruik van CVE-2025-59287 is waargenomen. Tevens is er publieke proof-of-conceptcode beschikbaar voor de betreffende CVE, wat het risico op misbruik verhoogt. Het is goed gebruik om WSUS niet direct aan het internet te ontsluiten.",
                "title": "Interpretaties"
            },
            {
                "category": "description",
                "text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance\n\nVoor aanvullende informatie en eventuele workarounds met betrekking tot de kwetsbaarheid met kenmerk CVE-2025-59287 heeft microsoft de informatie bij deze kwetsbaarheid geactualiseerd. Zie de detailpagina op:\n\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287",
                "title": "Oplossingen"
            },
            {
                "category": "general",
                "text": "high",
                "title": "Kans"
            },
            {
                "category": "general",
                "text": "high",
                "title": "Schade"
            },
            {
                "category": "general",
                "text": "Improper Input Validation",
                "title": "CWE-20"
            },
            {
                "category": "general",
                "text": "Improper Link Resolution Before File Access ('Link Following')",
                "title": "CWE-59"
            },
            {
                "category": "general",
                "text": "External Control of File Name or Path",
                "title": "CWE-73"
            },
            {
                "category": "general",
                "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
                "title": "CWE-119"
            },
            {
                "category": "general",
                "text": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')",
                "title": "CWE-120"
            },
            {
                "category": "general",
                "text": "Stack-based Buffer Overflow",
                "title": "CWE-121"
            },
            {
                "category": "general",
                "text": "Heap-based Buffer Overflow",
                "title": "CWE-122"
            },
            {
                "category": "general",
                "text": "Out-of-bounds Read",
                "title": "CWE-125"
            },
            {
                "category": "general",
                "text": "Buffer Over-read",
                "title": "CWE-126"
            },
            {
                "category": "general",
                "text": "Integer Overflow or Wraparound",
                "title": "CWE-190"
            },
            {
                "category": "general",
                "text": "Integer Underflow (Wrap or Wraparound)",
                "title": "CWE-191"
            },
            {
                "category": "general",
                "text": "Exposure of Sensitive Information to an Unauthorized Actor",
                "title": "CWE-200"
            },
            {
                "category": "general",
                "text": "Generation of Error Message Containing Sensitive Information",
                "title": "CWE-209"
            },
            {
                "category": "general",
                "text": "Improper Access Control",
                "title": "CWE-284"
            },
            {
                "category": "general",
                "text": "Improper Authentication",
                "title": "CWE-287"
            },
            {
                "category": "general",
                "text": "Cleartext Storage of Sensitive Information",
                "title": "CWE-312"
            },
            {
                "category": "general",
                "text": "Cleartext Transmission of Sensitive Information",
                "title": "CWE-319"
            },
            {
                "category": "general",
                "text": "Use of a Key Past its Expiration Date",
                "title": "CWE-324"
            },
            {
                "category": "general",
                "text": "Improper Verification of Cryptographic Signature",
                "title": "CWE-347"
            },
            {
                "category": "general",
                "text": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
                "title": "CWE-362"
            },
            {
                "category": "general",
                "text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
                "title": "CWE-367"
            },
            {
                "category": "general",
                "text": "Double Free",
                "title": "CWE-415"
            },
            {
                "category": "general",
                "text": "Use After Free",
                "title": "CWE-416"
            },
            {
                "category": "general",
                "text": "NULL Pointer Dereference",
                "title": "CWE-476"
            },
            {
                "category": "general",
                "text": "Deserialization of Untrusted Data",
                "title": "CWE-502"
            },
            {
                "category": "general",
                "text": "Insertion of Sensitive Information into Log File",
                "title": "CWE-532"
            },
            {
                "category": "general",
                "text": "Reliance on Untrusted Inputs in a Security Decision",
                "title": "CWE-807"
            },
            {
                "category": "general",
                "text": "Untrusted Pointer Dereference",
                "title": "CWE-822"
            },
            {
                "category": "general",
                "text": "Improper Enforcement of Behavioral Workflow",
                "title": "CWE-841"
            },
            {
                "category": "general",
                "text": "Use of Uninitialized Resource",
                "title": "CWE-908"
            },
            {
                "category": "general",
                "text": "Incomplete Comparison with Missing Factors",
                "title": "CWE-1023"
            },
            {
                "category": "general",
                "text": "Use of a Cryptographic Primitive with a Risky Implementation",
                "title": "CWE-1240"
            },
            {
                "category": "general",
                "text": "Improper Validation of Specified Type of Input",
                "title": "CWE-1287"
            }
        ],
        "publisher": {
            "category": "coordinator",
            "contact_details": "cert@ncsc.nl",
            "name": "Nationaal Cyber Security Centrum",
            "namespace": "https://www.ncsc.nl/"
        },
        "references": [
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287"
            }
        ],
        "title": "Kwetsbaarheden verholpen in Microsoft Windows",
        "tracking": {
            "current_release_date": "2025-10-24T11:09:29.790442Z",
            "generator": {
                "date": "2025-08-04T16:30:00Z",
                "engine": {
                    "name": "V.A.",
                    "version": "1.3"
                }
            },
            "id": "NCSC-2025-0310",
            "initial_release_date": "2025-10-14T18:03:45.875739Z",
            "revision_history": [
                {
                    "date": "2025-10-14T18:03:45.875739Z",
                    "number": "1.0.0",
                    "summary": "Initiele versie"
                },
                {
                    "date": "2025-10-24T08:24:42.569331Z",
                    "number": "1.0.1",
                    "summary": "Het NCSC heeft van een vertrouwde partner vernomen dat op 24 oktober 2025 misbruik van CVE-2025-59287 is waargenomen. Tevens is er publieke proof-of-conceptcode beschikbaar voor de betreffende CVE, wat het risico op misbruik verhoogt. Het is goed gebruik om WSUS niet direct aan het internet te ontsluiten."
                },
                {
                    "date": "2025-10-24T11:09:29.790442Z",
                    "number": "1.0.2",
                    "summary": "De originele update om de kwetsbaarheid met kenmerk CVE-2025-59287 te verhelpen blijkt niet afdoende. Microsoft heeft een Out-of-Band patch uitgebracht om additionele oplossingen te bieden. "
                }
            ],
            "status": "final",
            "version": "1.0.2"
        }
    },
    "product_tree": {
        "branches": [
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-1"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows 10 1809"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-2"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows 10 21h2"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-3"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows 10 22h2"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-4"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows 10 Version 1507"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-5"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows 10 Version 1607"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-6"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows 10 Version 1809"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-7"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows 10 Version 21H2"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-8"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows 10 Version 22H2"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-9"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows 11 22H2"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-10"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows 11 23H2"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-11"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows 11 Version 23H2"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-12"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows 11 Version 24H2"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-13"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows 11 Version 25H2"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-14"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows 11 version 22H2"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-15"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows 11 version 22H3"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-16"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows Server 2008 R2 Service Pack 1"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-17"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-18"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows Server 2008 Service Pack 2"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-19"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows Server 2008 Service Pack 2 (Server Core installation)"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-20"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows Server 2012"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-21"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows Server 2012 (Server Core installation)"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-22"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows Server 2012 R2"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-23"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows Server 2012 R2 (Server Core installation)"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-24"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows Server 2016"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-25"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows Server 2016 (Server Core installation)"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-26"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows Server 2019"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-27"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows Server 2019 (Server Core installation)"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-28"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows Server 2022"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-29"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows Server 2022, 23H2 Edition (Server Core installation)"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-30"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows Server 2025"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-31"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Windows Server 2025 (Server Core installation)"
                    }
                ],
                "category": "vendor",
                "name": "Microsoft"
            }
        ]
    },
    "vulnerabilities": [
        {
            "cve": "CVE-2025-59258",
            "cwe": {
                "id": "CWE-532",
                "name": "Insertion of Sensitive Information into Log File"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Insertion of Sensitive Information into Log File",
                    "title": "CWE-532"
                },
                {
                    "category": "description",
                    "text": "In Active Directory Federation Services, sensitive information logged can be exploited by unauthorized attackers, leading to potential local disclosure of confidential data.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59258 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59258.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 6.2,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59258"
        },
        {
            "cve": "CVE-2025-47979",
            "cwe": {
                "id": "CWE-532",
                "name": "Insertion of Sensitive Information into Log File"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Insertion of Sensitive Information into Log File",
                    "title": "CWE-532"
                },
                {
                    "category": "description",
                    "text": "In a Windows Failover Cluster, sensitive information logged can be exploited by authorized attackers to disclose confidential data locally.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-47979 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47979.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 5.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-47979"
        },
        {
            "cve": "CVE-2025-55683",
            "cwe": {
                "id": "CWE-200",
                "name": "Exposure of Sensitive Information to an Unauthorized Actor"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Exposure of Sensitive Information to an Unauthorized Actor",
                    "title": "CWE-200"
                },
                {
                    "category": "description",
                    "text": "The exposure of sensitive information in the Windows Kernel allows authorized attackers to locally disclose confidential data, posing a significant security risk.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55683 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55683.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 5.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55683"
        },
        {
            "cve": "CVE-2025-55697",
            "cwe": {
                "id": "CWE-122",
                "name": "Heap-based Buffer Overflow"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Heap-based Buffer Overflow",
                    "title": "CWE-122"
                },
                {
                    "category": "description",
                    "text": "A heap-based buffer overflow vulnerability in Azure Local allows an authorized attacker to locally elevate their privileges.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55697 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55697.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55697"
        },
        {
            "cve": "CVE-2025-58737",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in Windows Remote Desktop, termed 'use after free,' allows unauthorized attackers to execute arbitrary code on the local system.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-58737 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58737.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-58737"
        },
        {
            "cve": "CVE-2025-59184",
            "cwe": {
                "id": "CWE-200",
                "name": "Exposure of Sensitive Information to an Unauthorized Actor"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Exposure of Sensitive Information to an Unauthorized Actor",
                    "title": "CWE-200"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in Windows High Availability Services allows an authorized attacker to locally disclose sensitive information to unauthorized individuals.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59184 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59184.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 5.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59184"
        },
        {
            "cve": "CVE-2025-59188",
            "cwe": {
                "id": "CWE-200",
                "name": "Exposure of Sensitive Information to an Unauthorized Actor"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Exposure of Sensitive Information to an Unauthorized Actor",
                    "title": "CWE-200"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in Windows Failover Cluster allows an authorized attacker to expose sensitive information to unauthorized individuals locally.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59188 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59188.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 5.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59188"
        },
        {
            "cve": "CVE-2025-59260",
            "cwe": {
                "id": "CWE-200",
                "name": "Exposure of Sensitive Information to an Unauthorized Actor"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Exposure of Sensitive Information to an Unauthorized Actor",
                    "title": "CWE-200"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in the Microsoft Failover Cluster Virtual Driver allows an authorized attacker to locally disclose sensitive information.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59260 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59260.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 5.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59260"
        },
        {
            "cve": "CVE-2025-59287",
            "cwe": {
                "id": "CWE-502",
                "name": "Deserialization of Untrusted Data"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Deserialization of Untrusted Data",
                    "title": "CWE-502"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in Windows Server Update Service allows unauthorized attackers to remotely execute code through the deserialization of untrusted data.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59287 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59287.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 9.8,
                        "baseSeverity": "CRITICAL"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59287"
        },
        {
            "cve": "CVE-2025-48004",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in the Microsoft Brokering File System enables unauthorized attackers to locally elevate their privileges due to a use-after-free error.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-48004 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48004.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.4,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-48004"
        },
        {
            "cve": "CVE-2025-50174",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in the Windows Device Association Broker service enables an authorized attacker to locally elevate privileges via a use-after-free exploit.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-50174 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-50174.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-50174"
        },
        {
            "cve": "CVE-2025-24990",
            "cwe": {
                "id": "CWE-822",
                "name": "Untrusted Pointer Dereference"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Untrusted Pointer Dereference",
                    "title": "CWE-822"
                },
                {
                    "category": "description",
                    "text": "Microsoft's October cumulative update removes the ltmdm64.sys driver for the Agere Modem, disabling dependent fax modem hardware and addressing a vulnerability that allows privilege escalation.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-24990 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-24990.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-24990"
        },
        {
            "cve": "CVE-2025-24052",
            "cwe": {
                "id": "CWE-121",
                "name": "Stack-based Buffer Overflow"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Stack-based Buffer Overflow",
                    "title": "CWE-121"
                },
                {
                    "category": "description",
                    "text": "Microsoft has removed the ltmdm64.sys driver due to vulnerabilities in the Agere Modem driver, rendering fax modem hardware dependent on this driver non-functional on Windows.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-24052 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-24052.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-24052"
        },
        {
            "cve": "CVE-2025-55325",
            "cwe": {
                "id": "CWE-126",
                "name": "Buffer Over-read"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Buffer Over-read",
                    "title": "CWE-126"
                },
                {
                    "category": "description",
                    "text": "A buffer over-read vulnerability in the Windows Storage Management Provider allows an authorized attacker to locally disclose sensitive information.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55325 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55325.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 5.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55325"
        },
        {
            "cve": "CVE-2025-55333",
            "cwe": {
                "id": "CWE-1023",
                "name": "Incomplete Comparison with Missing Factors"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Incomplete Comparison with Missing Factors",
                    "title": "CWE-1023"
                },
                {
                    "category": "description",
                    "text": "An incomplete comparison in Windows BitLocker may allow unauthorized attackers to exploit security features through physical attacks.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55333 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55333.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
                        "baseScore": 6.1,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55333"
        },
        {
            "cve": "CVE-2025-55335",
            "cwe": {
                "id": "CWE-362",
                "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
                    "title": "CWE-362"
                },
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in Windows NTFS enables unauthorized attackers to locally elevate their privileges through a use-after-free exploit.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55335 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55335.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.4,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55335"
        },
        {
            "cve": "CVE-2025-55336",
            "cwe": {
                "id": "CWE-200",
                "name": "Exposure of Sensitive Information to an Unauthorized Actor"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Exposure of Sensitive Information to an Unauthorized Actor",
                    "title": "CWE-200"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in the Windows Cloud Files Mini Filter Driver allows an authorized attacker to expose sensitive information to unauthorized local actors.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55336 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55336.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 5.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55336"
        },
        {
            "cve": "CVE-2025-55338",
            "cwe": {
                "id": "CWE-288",
                "name": "Authentication Bypass Using an Alternate Path or Channel"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Authentication Bypass Using an Alternate Path or Channel",
                    "title": "CWE-288"
                },
                {
                    "category": "description",
                    "text": "The document highlights a vulnerability in Windows BitLocker that allows unauthorized attackers to bypass security features through physical attacks due to unpatchable ROM code.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55338 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55338.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
                        "baseScore": 6.1,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55338"
        },
        {
            "cve": "CVE-2025-55339",
            "cwe": {
                "id": "CWE-125",
                "name": "Out-of-bounds Read"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Out-of-bounds Read",
                    "title": "CWE-125"
                },
                {
                    "category": "description",
                    "text": "An out-of-bounds read vulnerability in Windows NDIS allows an authorized attacker to locally elevate their privileges.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55339 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55339.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55339"
        },
        {
            "cve": "CVE-2025-55340",
            "cwe": {
                "id": "CWE-287",
                "name": "Improper Authentication"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Authentication",
                    "title": "CWE-287"
                },
                {
                    "category": "description",
                    "text": "Improper authentication in Windows Remote Desktop Protocol allows an authorized attacker to bypass a security feature locally.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55340 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55340.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55340"
        },
        {
            "cve": "CVE-2025-55676",
            "cwe": {
                "id": "CWE-209",
                "name": "Generation of Error Message Containing Sensitive Information"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Generation of Error Message Containing Sensitive Information",
                    "title": "CWE-209"
                },
                {
                    "category": "description",
                    "text": "The Windows USB Video Driver may produce an error message that discloses sensitive information, potentially enabling local access by an authorized attacker.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55676 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55676.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 5.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55676"
        },
        {
            "cve": "CVE-2025-55677",
            "cwe": {
                "id": "CWE-822",
                "name": "Untrusted Pointer Dereference"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Untrusted Pointer Dereference",
                    "title": "CWE-822"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in the Windows Device Association Broker service allows an authorized attacker to locally elevate their privileges through an untrusted pointer dereference.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55677 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55677.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55677"
        },
        {
            "cve": "CVE-2025-55681",
            "cwe": {
                "id": "CWE-125",
                "name": "Out-of-bounds Read"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Out-of-bounds Read",
                    "title": "CWE-125"
                },
                {
                    "category": "other",
                    "text": "Untrusted Pointer Dereference",
                    "title": "CWE-822"
                },
                {
                    "category": "description",
                    "text": "An out-of-bounds read vulnerability in Windows DWM allows an authorized attacker to locally elevate their privileges.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55681 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55681.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55681"
        },
        {
            "cve": "CVE-2025-55685",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in Windows PrintWorkflowUserSvc enables an authorized attacker to locally elevate privileges via a use-after-free exploit.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55685 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55685.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55685"
        },
        {
            "cve": "CVE-2025-55686",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in Windows PrintWorkflowUserSvc enables an authorized attacker to locally elevate privileges via a use-after-free exploit.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55686 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55686.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55686"
        },
        {
            "cve": "CVE-2025-55687",
            "cwe": {
                "id": "CWE-362",
                "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
                    "title": "CWE-362"
                },
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A race condition in the Windows Resilient File System (ReFS) due to improper synchronization can allow unauthorized attackers to locally elevate their privileges.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55687 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55687.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.4,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55687"
        },
        {
            "cve": "CVE-2025-55689",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in Windows PrintWorkflowUserSvc enables an authorized attacker to locally elevate privileges via a use-after-free exploit.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55689 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55689.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55689"
        },
        {
            "cve": "CVE-2025-55700",
            "cwe": {
                "id": "CWE-125",
                "name": "Out-of-bounds Read"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Out-of-bounds Read",
                    "title": "CWE-125"
                },
                {
                    "category": "description",
                    "text": "An out-of-bounds read vulnerability in Windows Routing and Remote Access Service (RRAS) could allow unauthorized attackers to disclose sensitive information over a network.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55700 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55700.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
                        "baseScore": 6.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55700"
        },
        {
            "cve": "CVE-2025-55701",
            "cwe": {
                "id": "CWE-1287",
                "name": "Improper Validation of Specified Type of Input"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Validation of Specified Type of Input",
                    "title": "CWE-1287"
                },
                {
                    "category": "description",
                    "text": "An authorized attacker can exploit improper input validation in Microsoft Windows to locally elevate privileges, potentially compromising system integrity.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55701 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55701.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55701"
        },
        {
            "cve": "CVE-2025-58715",
            "cwe": {
                "id": "CWE-190",
                "name": "Integer Overflow or Wraparound"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Integer Overflow or Wraparound",
                    "title": "CWE-190"
                },
                {
                    "category": "description",
                    "text": "An integer overflow vulnerability in Microsoft Windows Speech allows an authorized attacker to locally elevate their privileges.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-58715 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58715.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                        "baseScore": 8.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-58715"
        },
        {
            "cve": "CVE-2025-58716",
            "cwe": {
                "id": "CWE-20",
                "name": "Improper Input Validation"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Input Validation",
                    "title": "CWE-20"
                },
                {
                    "category": "description",
                    "text": "Improper input validation in Microsoft Windows Speech allows an authorized attacker to locally elevate their privileges.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-58716 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58716.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                        "baseScore": 8.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-58716"
        },
        {
            "cve": "CVE-2025-58717",
            "cwe": {
                "id": "CWE-125",
                "name": "Out-of-bounds Read"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Out-of-bounds Read",
                    "title": "CWE-125"
                },
                {
                    "category": "description",
                    "text": "An out-of-bounds read vulnerability in Windows Routing and Remote Access Service (RRAS) could allow unauthorized attackers to disclose sensitive information over a network.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-58717 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58717.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
                        "baseScore": 6.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-58717"
        },
        {
            "cve": "CVE-2025-58719",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in the Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to locally elevate their privileges through a use-after-free exploit.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-58719 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58719.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
                        "baseScore": 4.7,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-58719"
        },
        {
            "cve": "CVE-2025-58722",
            "cwe": {
                "id": "CWE-122",
                "name": "Heap-based Buffer Overflow"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Heap-based Buffer Overflow",
                    "title": "CWE-122"
                },
                {
                    "category": "description",
                    "text": "A heap-based buffer overflow vulnerability in Windows DWM allows an authorized attacker to locally elevate their privileges.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-58722 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58722.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-58722"
        },
        {
            "cve": "CVE-2025-58728",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in the Windows Bluetooth Service enables an authorized attacker to locally elevate privileges via a use-after-free exploit.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-58728 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58728.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-58728"
        },
        {
            "cve": "CVE-2025-58732",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "The document highlights a vulnerability in Inbox COM Objects that allows unauthorized code execution locally due to a use-after-free flaw.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-58732 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58732.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-58732"
        },
        {
            "cve": "CVE-2025-58735",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "The document highlights a vulnerability in Inbox COM Objects that allows unauthorized code execution locally due to a use-after-free flaw.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-58735 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58735.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-58735"
        },
        {
            "cve": "CVE-2025-59185",
            "cwe": {
                "id": "CWE-73",
                "name": "External Control of File Name or Path"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "External Control of File Name or Path",
                    "title": "CWE-73"
                },
                {
                    "category": "description",
                    "text": "Unauthorized attackers can exploit external control of file names or paths in Windows Core Shell to execute spoofing attacks over a network.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59185 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59185.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
                        "baseScore": 6.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59185"
        },
        {
            "cve": "CVE-2025-59195",
            "cwe": {
                "id": "CWE-362",
                "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
                    "title": "CWE-362"
                },
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A race condition in the Microsoft Graphics Component allows an authorized attacker to locally deny service by mismanaging shared resources during concurrent execution.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59195 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59195.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59195"
        },
        {
            "cve": "CVE-2025-59196",
            "cwe": {
                "id": "CWE-362",
                "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
                    "title": "CWE-362"
                },
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A race condition in the Windows SSDP Service allows an authorized attacker to locally elevate their privileges due to improper synchronization of shared resources.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59196 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59196.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59196"
        },
        {
            "cve": "CVE-2025-59199",
            "cwe": {
                "id": "CWE-284",
                "name": "Improper Access Control"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Access Control",
                    "title": "CWE-284"
                },
                {
                    "category": "description",
                    "text": "An improper access control vulnerability in the Software Protection Platform (SPP) allows an authorized attacker to locally escalate their privileges.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59199 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59199.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59199"
        },
        {
            "cve": "CVE-2025-59200",
            "cwe": {
                "id": "CWE-362",
                "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
                    "title": "CWE-362"
                },
                {
                    "category": "other",
                    "text": "External Control of File Name or Path",
                    "title": "CWE-73"
                },
                {
                    "category": "description",
                    "text": "A race condition in the Data Sharing Service Client due to improper synchronization enables unauthorized attackers to spoof locally, posing a significant security risk.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59200 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59200.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L",
                        "baseScore": 7.7,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59200"
        },
        {
            "cve": "CVE-2025-59201",
            "cwe": {
                "id": "CWE-284",
                "name": "Improper Access Control"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Access Control",
                    "title": "CWE-284"
                },
                {
                    "category": "description",
                    "text": "Improper access control in the Network Connection Status Indicator (NCSI) allows an authorized attacker to locally elevate their privileges.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59201 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59201.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59201"
        },
        {
            "cve": "CVE-2025-59202",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in Windows Remote Desktop Services enables an authorized attacker to locally elevate privileges via a use-after-free exploit.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59202 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59202.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59202"
        },
        {
            "cve": "CVE-2025-59204",
            "cwe": {
                "id": "CWE-908",
                "name": "Use of Uninitialized Resource"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use of Uninitialized Resource",
                    "title": "CWE-908"
                },
                {
                    "category": "description",
                    "text": "The document highlights a vulnerability in Windows Management Services that allows an authorized attacker to disclose information locally due to uninitialized resources.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59204 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59204.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 5.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59204"
        },
        {
            "cve": "CVE-2025-59206",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "Windows Resilient File System (ReFS) contains a vulnerability in its Deduplication Service that may enable an attacker to elevate their privileges.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59206 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59206.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.4,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59206"
        },
        {
            "cve": "CVE-2025-59207",
            "cwe": {
                "id": "CWE-20",
                "name": "Improper Input Validation"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Input Validation",
                    "title": "CWE-20"
                },
                {
                    "category": "other",
                    "text": "Untrusted Pointer Dereference",
                    "title": "CWE-822"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in the Windows Kernel allows an authorized attacker to exploit an untrusted pointer dereference, enabling local privilege escalation.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59207 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59207.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59207"
        },
        {
            "cve": "CVE-2025-59211",
            "cwe": {
                "id": "CWE-200",
                "name": "Exposure of Sensitive Information to an Unauthorized Actor"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Exposure of Sensitive Information to an Unauthorized Actor",
                    "title": "CWE-200"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in Windows Push Notification Core allows an authorized attacker to expose sensitive information to an unauthorized actor locally.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59211 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59211.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 5.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59211"
        },
        {
            "cve": "CVE-2025-59242",
            "cwe": {
                "id": "CWE-122",
                "name": "Heap-based Buffer Overflow"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Heap-based Buffer Overflow",
                    "title": "CWE-122"
                },
                {
                    "category": "other",
                    "text": "Integer Underflow (Wrap or Wraparound)",
                    "title": "CWE-191"
                },
                {
                    "category": "description",
                    "text": "A heap-based buffer overflow vulnerability in the Windows Ancillary Function Driver for WinSock allows an authorized attacker to locally elevate their privileges.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59242 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59242.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59242"
        },
        {
            "cve": "CVE-2025-49708",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in the Microsoft Graphics Component allows an authorized attacker to exploit a use-after-free condition to gain elevated privileges over a network.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-49708 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-49708.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                        "baseScore": 9.9,
                        "baseSeverity": "CRITICAL"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-49708"
        },
        {
            "cve": "CVE-2025-59254",
            "cwe": {
                "id": "CWE-122",
                "name": "Heap-based Buffer Overflow"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Heap-based Buffer Overflow",
                    "title": "CWE-122"
                },
                {
                    "category": "description",
                    "text": "A heap-based buffer overflow vulnerability in the Windows DWM Core Library allows an authorized attacker to locally elevate their privileges.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59254 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59254.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59254"
        },
        {
            "cve": "CVE-2025-59255",
            "cwe": {
                "id": "CWE-122",
                "name": "Heap-based Buffer Overflow"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Heap-based Buffer Overflow",
                    "title": "CWE-122"
                },
                {
                    "category": "description",
                    "text": "A heap-based buffer overflow vulnerability in the Windows DWM Core Library allows an authorized attacker to locally elevate their privileges.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59255 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59255.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59255"
        },
        {
            "cve": "CVE-2025-54957",
            "cwe": {
                "id": "CWE-190",
                "name": "Integer Overflow or Wraparound"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Integer Overflow or Wraparound",
                    "title": "CWE-190"
                },
                {
                    "category": "other",
                    "text": "Deserialization of Untrusted Data",
                    "title": "CWE-502"
                },
                {
                    "category": "other",
                    "text": "Out-of-bounds Write",
                    "title": "CWE-787"
                },
                {
                    "category": "description",
                    "text": "Recent vulnerabilities in Dolby UDC, Microsoft Windows Codecs Library, and Chrome involve integer overflows and deserialization flaws, potentially leading to crashes and unauthorized code execution.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-54957 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-54957.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-54957"
        },
        {
            "cve": "CVE-2025-59257",
            "cwe": {
                "id": "CWE-1287",
                "name": "Improper Validation of Specified Type of Input"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Validation of Specified Type of Input",
                    "title": "CWE-1287"
                },
                {
                    "category": "description",
                    "text": "An attacker can exploit improper input validation in Windows Local Session Manager (LSM) to trigger a denial of service over a network.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59257 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59257.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                        "baseScore": 6.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59257"
        },
        {
            "cve": "CVE-2025-59259",
            "cwe": {
                "id": "CWE-1287",
                "name": "Improper Validation of Specified Type of Input"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Validation of Specified Type of Input",
                    "title": "CWE-1287"
                },
                {
                    "category": "description",
                    "text": "An attacker can exploit improper input validation in Windows Local Session Manager (LSM) to trigger a denial of service over a network.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59259 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59259.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                        "baseScore": 6.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59259"
        },
        {
            "cve": "CVE-2025-59282",
            "cwe": {
                "id": "CWE-362",
                "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
                    "title": "CWE-362"
                },
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A race condition in Inbox COM Objects due to improper synchronization enables unauthorized attackers to execute code locally, posing a significant security risk.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59282 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59282.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59282"
        },
        {
            "cve": "CVE-2025-59284",
            "cwe": {
                "id": "CWE-200",
                "name": "Exposure of Sensitive Information to an Unauthorized Actor"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Exposure of Sensitive Information to an Unauthorized Actor",
                    "title": "CWE-200"
                },
                {
                    "category": "description",
                    "text": "The document highlights a vulnerability in Windows NTLM that allows unauthorized attackers to locally spoof by exposing sensitive information.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59284 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59284.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
                        "baseScore": 3.3,
                        "baseSeverity": "LOW"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59284"
        },
        {
            "cve": "CVE-2025-59294",
            "cwe": {
                "id": "CWE-200",
                "name": "Exposure of Sensitive Information to an Unauthorized Actor"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Exposure of Sensitive Information to an Unauthorized Actor",
                    "title": "CWE-200"
                },
                {
                    "category": "description",
                    "text": "The document highlights a vulnerability in Windows Taskbar Live that allows unauthorized attackers to access sensitive information through physical attacks.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59294 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59294.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
                        "baseScore": 2.1,
                        "baseSeverity": "LOW"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59294"
        },
        {
            "cve": "CVE-2025-59295",
            "cwe": {
                "id": "CWE-122",
                "name": "Heap-based Buffer Overflow"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Heap-based Buffer Overflow",
                    "title": "CWE-122"
                },
                {
                    "category": "description",
                    "text": "A heap-based buffer overflow vulnerability in Internet Explorer allows unauthorized attackers to execute code remotely, posing significant security risks.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59295 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59295.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                        "baseScore": 8.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59295"
        },
        {
            "cve": "CVE-2016-9535",
            "cwe": {
                "id": "CWE-122",
                "name": "Heap-based Buffer Overflow"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Heap-based Buffer Overflow",
                    "title": "CWE-122"
                },
                {
                    "category": "other",
                    "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
                    "title": "CWE-119"
                },
                {
                    "category": "other",
                    "text": "Dependency on Vulnerable Third-Party Component",
                    "title": "CWE-1395"
                },
                {
                    "category": "description",
                    "text": "The TIFF update addresses critical security vulnerabilities, including heap buffer overflows and remote code execution risks, particularly in libtiff 4.0.6 due to assertion errors in tif_predict.h and tif_predict.c.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2016-9535 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2016/cve-2016-9535.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.0",
                        "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 9.8,
                        "baseSeverity": "CRITICAL"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2016-9535"
        },
        {
            "cve": "CVE-2025-48813",
            "cwe": {
                "id": "CWE-324",
                "name": "Use of a Key Past its Expiration Date"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use of a Key Past its Expiration Date",
                    "title": "CWE-324"
                },
                {
                    "category": "description",
                    "text": "The use of an expired key in Virtual Secure Mode allows an authorized attacker to execute local spoofing attacks.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-48813 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48813.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
                        "baseScore": 6.3,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-48813"
        },
        {
            "cve": "CVE-2025-25004",
            "cwe": {
                "id": "CWE-284",
                "name": "Improper Access Control"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Access Control",
                    "title": "CWE-284"
                },
                {
                    "category": "description",
                    "text": "An improper access control vulnerability in Microsoft PowerShell allows an authorized attacker to locally elevate their privileges.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-25004 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-25004.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
                        "baseScore": 7.3,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-25004"
        },
        {
            "cve": "CVE-2025-53717",
            "cwe": {
                "id": "CWE-807",
                "name": "Reliance on Untrusted Inputs in a Security Decision"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Reliance on Untrusted Inputs in a Security Decision",
                    "title": "CWE-807"
                },
                {
                    "category": "description",
                    "text": "The document highlights a security vulnerability in Windows Virtualization-Based Security (VBS) Enclave, where untrusted inputs can allow an authorized attacker to elevate privileges locally.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-53717 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53717.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-53717"
        },
        {
            "cve": "CVE-2025-50152",
            "cwe": {
                "id": "CWE-125",
                "name": "Out-of-bounds Read"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Out-of-bounds Read",
                    "title": "CWE-125"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in the Windows Kernel allows an authorized attacker to locally elevate their privileges through an out-of-bounds read.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-50152 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-50152.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-50152"
        },
        {
            "cve": "CVE-2025-53150",
            "cwe": {
                "id": "CWE-362",
                "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
                    "title": "CWE-362"
                },
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in Windows Digital Media allows an authorized attacker to locally elevate their privileges through a use-after-free exploit.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-53150 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53150.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-53150"
        },
        {
            "cve": "CVE-2025-50175",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in Windows Digital Media allows an authorized attacker to locally elevate their privileges through a use-after-free exploit.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-50175 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-50175.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-50175"
        },
        {
            "cve": "CVE-2025-53139",
            "cwe": {
                "id": "CWE-319",
                "name": "Cleartext Transmission of Sensitive Information"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Cleartext Transmission of Sensitive Information",
                    "title": "CWE-319"
                },
                {
                    "category": "description",
                    "text": "The cleartext transmission of sensitive information in Windows Hello allows unauthorized local access, undermining its intended security features.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-53139 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53139.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
                        "baseScore": 7.7,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-53139"
        },
        {
            "cve": "CVE-2025-53768",
            "cwe": {
                "id": "CWE-362",
                "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
                    "title": "CWE-362"
                },
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in Xbox enables an authorized attacker to locally elevate their privileges due to a use-after-free issue.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-53768 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53768.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-53768"
        },
        {
            "cve": "CVE-2025-55328",
            "cwe": {
                "id": "CWE-362",
                "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
                    "title": "CWE-362"
                },
                {
                    "category": "description",
                    "text": "A race condition in Windows Hyper-V allows an authorized attacker to locally elevate their privileges due to improper synchronization of shared resources.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55328 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55328.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55328"
        },
        {
            "cve": "CVE-2025-55330",
            "cwe": {
                "id": "CWE-841",
                "name": "Improper Enforcement of Behavioral Workflow"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Enforcement of Behavioral Workflow",
                    "title": "CWE-841"
                },
                {
                    "category": "description",
                    "text": "Improper enforcement of behavioral workflow in Windows BitLocker allows unauthorized attackers to exploit physical access and bypass security features.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55330 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55330.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
                        "baseScore": 6.1,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55330"
        },
        {
            "cve": "CVE-2025-55331",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in Windows PrintWorkflowUserSvc enables an authorized attacker to locally elevate privileges via a use-after-free exploit.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55331 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55331.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55331"
        },
        {
            "cve": "CVE-2025-55332",
            "cwe": {
                "id": "CWE-841",
                "name": "Improper Enforcement of Behavioral Workflow"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Enforcement of Behavioral Workflow",
                    "title": "CWE-841"
                },
                {
                    "category": "description",
                    "text": "Improper enforcement of behavioral workflow in Windows BitLocker allows unauthorized attackers to exploit physical access and bypass security features.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55332 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55332.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
                        "baseScore": 6.1,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55332"
        },
        {
            "cve": "CVE-2025-55334",
            "cwe": {
                "id": "CWE-312",
                "name": "Cleartext Storage of Sensitive Information"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Cleartext Storage of Sensitive Information",
                    "title": "CWE-312"
                },
                {
                    "category": "description",
                    "text": "The Windows Kernel's storage of sensitive information in cleartext allows local attackers to bypass security measures, posing a significant risk to system integrity.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55334 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55334.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 6.2,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55334"
        },
        {
            "cve": "CVE-2025-55337",
            "cwe": {
                "id": "CWE-841",
                "name": "Improper Enforcement of Behavioral Workflow"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Enforcement of Behavioral Workflow",
                    "title": "CWE-841"
                },
                {
                    "category": "description",
                    "text": "Improper enforcement of behavioral workflow in Windows BitLocker allows unauthorized attackers to exploit physical access and bypass security features.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55337 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55337.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
                        "baseScore": 6.1,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55337"
        },
        {
            "cve": "CVE-2025-55678",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in Windows DirectX allows an authorized attacker to locally elevate privileges via a use-after-free exploit.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55678 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55678.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55678"
        },
        {
            "cve": "CVE-2025-55679",
            "cwe": {
                "id": "CWE-20",
                "name": "Improper Input Validation"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Input Validation",
                    "title": "CWE-20"
                },
                {
                    "category": "other",
                    "text": "Exposure of Sensitive Information to an Unauthorized Actor",
                    "title": "CWE-200"
                },
                {
                    "category": "description",
                    "text": "Improper input validation in the Windows Kernel can allow unauthorized attackers to locally disclose sensitive information.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55679 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55679.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 5.1,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55679"
        },
        {
            "cve": "CVE-2025-55680",
            "cwe": {
                "id": "CWE-367",
                "name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
                    "title": "CWE-367"
                },
                {
                    "category": "description",
                    "text": "A TOCTOU race condition in the Windows Cloud Files Mini Filter Driver allows an authorized attacker to locally elevate their privileges.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55680 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55680.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55680"
        },
        {
            "cve": "CVE-2025-55682",
            "cwe": {
                "id": "CWE-841",
                "name": "Improper Enforcement of Behavioral Workflow"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Enforcement of Behavioral Workflow",
                    "title": "CWE-841"
                },
                {
                    "category": "description",
                    "text": "Improper enforcement of behavioral workflow in Windows BitLocker allows unauthorized attackers to exploit physical access and bypass security features.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55682 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55682.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
                        "baseScore": 6.1,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55682"
        },
        {
            "cve": "CVE-2025-55684",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in Windows PrintWorkflowUserSvc enables an authorized attacker to locally elevate privileges via a use-after-free exploit.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55684 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55684.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55684"
        },
        {
            "cve": "CVE-2025-55688",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in Windows PrintWorkflowUserSvc enables an authorized attacker to locally elevate privileges via a use-after-free exploit.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55688 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55688.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55688"
        },
        {
            "cve": "CVE-2025-55690",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in Windows PrintWorkflowUserSvc enables an authorized attacker to locally elevate privileges via a use-after-free exploit.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55690 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55690.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55690"
        },
        {
            "cve": "CVE-2025-55691",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in Windows PrintWorkflowUserSvc enables an authorized attacker to locally elevate privileges via a use-after-free exploit.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55691 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55691.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55691"
        },
        {
            "cve": "CVE-2025-55692",
            "cwe": {
                "id": "CWE-20",
                "name": "Improper Input Validation"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Input Validation",
                    "title": "CWE-20"
                },
                {
                    "category": "description",
                    "text": "Improper input validation in Windows Error Reporting allows an authorized attacker to gain elevated local privileges.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55692 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55692.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55692"
        },
        {
            "cve": "CVE-2025-55693",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in the Windows Kernel, termed 'use after free,' allows unauthorized attackers to locally escalate their privileges.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55693 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55693.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.4,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55693"
        },
        {
            "cve": "CVE-2025-55694",
            "cwe": {
                "id": "CWE-284",
                "name": "Improper Access Control"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Access Control",
                    "title": "CWE-284"
                },
                {
                    "category": "description",
                    "text": "Improper access control in Windows Error Reporting allows an authorized attacker to gain elevated privileges locally, posing a significant security risk.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55694 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55694.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55694"
        },
        {
            "cve": "CVE-2025-55695",
            "cwe": {
                "id": "CWE-125",
                "name": "Out-of-bounds Read"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Out-of-bounds Read",
                    "title": "CWE-125"
                },
                {
                    "category": "description",
                    "text": "An out-of-bounds read vulnerability in the Windows WLAN Auto Config Service can be exploited by an authorized attacker to disclose local information.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55695 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55695.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 5.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55695"
        },
        {
            "cve": "CVE-2025-55696",
            "cwe": {
                "id": "CWE-367",
                "name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
                    "title": "CWE-367"
                },
                {
                    "category": "other",
                    "text": "Untrusted Pointer Dereference",
                    "title": "CWE-822"
                },
                {
                    "category": "description",
                    "text": "A TOCTOU race condition in the NtQueryInformation Token function enables an authorized attacker to locally elevate their privileges.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55696 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55696.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55696"
        },
        {
            "cve": "CVE-2025-55698",
            "cwe": {
                "id": "CWE-476",
                "name": "NULL Pointer Dereference"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "NULL Pointer Dereference",
                    "title": "CWE-476"
                },
                {
                    "category": "description",
                    "text": "A null pointer dereference vulnerability in Windows DirectX allows an authorized attacker to induce a denial of service over a network.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55698 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55698.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
                        "baseScore": 7.7,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55698"
        },
        {
            "cve": "CVE-2025-55699",
            "cwe": {
                "id": "CWE-200",
                "name": "Exposure of Sensitive Information to an Unauthorized Actor"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Exposure of Sensitive Information to an Unauthorized Actor",
                    "title": "CWE-200"
                },
                {
                    "category": "description",
                    "text": "The exposure of sensitive information in the Windows Kernel allows authorized attackers to locally disclose confidential data, posing a significant security risk.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55699 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55699.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 5.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55699"
        },
        {
            "cve": "CVE-2025-58714",
            "cwe": {
                "id": "CWE-284",
                "name": "Improper Access Control"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Access Control",
                    "title": "CWE-284"
                },
                {
                    "category": "description",
                    "text": "The Windows Ancillary Function Driver for WinSock has an improper access control vulnerability that allows an authorized attacker to locally elevate their privileges.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-58714 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58714.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-58714"
        },
        {
            "cve": "CVE-2025-58718",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in the Remote Desktop Client enables unauthorized code execution due to a use-after-free error, posing significant security risks.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-58718 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58718.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                        "baseScore": 8.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-58718"
        },
        {
            "cve": "CVE-2025-58720",
            "cwe": {
                "id": "CWE-1240",
                "name": "Use of a Cryptographic Primitive with a Risky Implementation"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use of a Cryptographic Primitive with a Risky Implementation",
                    "title": "CWE-1240"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in Windows Cryptographic Services allows an authorized attacker to locally disclose information due to a flawed implementation of a cryptographic primitive.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-58720 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58720.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-58720"
        },
        {
            "cve": "CVE-2025-58725",
            "cwe": {
                "id": "CWE-122",
                "name": "Heap-based Buffer Overflow"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Heap-based Buffer Overflow",
                    "title": "CWE-122"
                },
                {
                    "category": "description",
                    "text": "A heap-based buffer overflow vulnerability in Windows COM allows an authorized attacker to locally elevate their privileges.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-58725 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58725.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-58725"
        },
        {
            "cve": "CVE-2025-58726",
            "cwe": {
                "id": "CWE-284",
                "name": "Improper Access Control"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Access Control",
                    "title": "CWE-284"
                },
                {
                    "category": "description",
                    "text": "An improper access control vulnerability in Windows SMB Server allows authorized attackers to elevate their privileges within a network environment.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-58726 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58726.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.5,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-58726"
        },
        {
            "cve": "CVE-2025-58727",
            "cwe": {
                "id": "CWE-362",
                "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
                    "title": "CWE-362"
                },
                {
                    "category": "description",
                    "text": "A race condition in the Windows Connected Devices Platform Service allows an authorized attacker to locally elevate their privileges due to improper synchronization of shared resources.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-58727 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58727.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-58727"
        },
        {
            "cve": "CVE-2025-58729",
            "cwe": {
                "id": "CWE-1287",
                "name": "Improper Validation of Specified Type of Input"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Validation of Specified Type of Input",
                    "title": "CWE-1287"
                },
                {
                    "category": "description",
                    "text": "An attacker can exploit improper input validation in Windows Local Session Manager (LSM) to trigger a denial of service over a network.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-58729 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58729.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                        "baseScore": 6.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-58729"
        },
        {
            "cve": "CVE-2025-58730",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "The document highlights a vulnerability in Inbox COM Objects that allows unauthorized code execution locally due to a use-after-free flaw.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-58730 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58730.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-58730"
        },
        {
            "cve": "CVE-2025-58731",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "The document highlights a vulnerability in Inbox COM Objects that allows unauthorized code execution locally due to a use-after-free flaw.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-58731 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58731.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-58731"
        },
        {
            "cve": "CVE-2025-58733",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "The document highlights a vulnerability in Inbox COM Objects that allows unauthorized code execution locally due to a use-after-free flaw.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-58733 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58733.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-58733"
        },
        {
            "cve": "CVE-2025-58734",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "The document highlights a vulnerability in Inbox COM Objects that allows unauthorized code execution locally due to a use-after-free flaw.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-58734 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58734.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-58734"
        },
        {
            "cve": "CVE-2025-58736",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "The document highlights a vulnerability in Inbox COM Objects that allows unauthorized code execution locally due to a use-after-free flaw.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-58736 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58736.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-58736"
        },
        {
            "cve": "CVE-2025-58738",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "The document highlights a vulnerability in Inbox COM Objects that allows unauthorized code execution locally due to a use-after-free flaw.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-58738 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58738.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-58738"
        },
        {
            "cve": "CVE-2025-58739",
            "cwe": {
                "id": "CWE-200",
                "name": "Exposure of Sensitive Information to an Unauthorized Actor"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Exposure of Sensitive Information to an Unauthorized Actor",
                    "title": "CWE-200"
                },
                {
                    "category": "description",
                    "text": "Sensitive information exposure in Windows File Explorer can allow unauthorized attackers to spoof identities across a network, posing a significant security risk.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-58739 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58739.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
                        "baseScore": 6.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-58739"
        },
        {
            "cve": "CVE-2025-59187",
            "cwe": {
                "id": "CWE-20",
                "name": "Improper Input Validation"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Input Validation",
                    "title": "CWE-20"
                },
                {
                    "category": "other",
                    "text": "Untrusted Pointer Dereference",
                    "title": "CWE-822"
                },
                {
                    "category": "description",
                    "text": "Improper input validation in the Windows Kernel can allow an authorized attacker to gain elevated local privileges, posing a significant security risk.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59187 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59187.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59187"
        },
        {
            "cve": "CVE-2025-59189",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in the Microsoft Brokering File System enables unauthorized attackers to locally elevate their privileges due to a use-after-free error.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59189 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59189.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.4,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59189"
        },
        {
            "cve": "CVE-2025-59190",
            "cwe": {
                "id": "CWE-20",
                "name": "Improper Input Validation"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Input Validation",
                    "title": "CWE-20"
                },
                {
                    "category": "description",
                    "text": "Improper input validation in the Microsoft Windows Search Component can allow an unauthorized attacker to locally deny service.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59190 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59190.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
                        "baseScore": 5.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59190"
        },
        {
            "cve": "CVE-2025-59191",
            "cwe": {
                "id": "CWE-122",
                "name": "Heap-based Buffer Overflow"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Heap-based Buffer Overflow",
                    "title": "CWE-122"
                },
                {
                    "category": "description",
                    "text": "A heap-based buffer overflow vulnerability in the Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to locally elevate their privileges.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59191 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59191.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59191"
        },
        {
            "cve": "CVE-2025-59192",
            "cwe": {
                "id": "CWE-126",
                "name": "Buffer Over-read"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Buffer Over-read",
                    "title": "CWE-126"
                },
                {
                    "category": "description",
                    "text": "A buffer over-read vulnerability in the Storport.sys driver allows an authorized attacker to locally elevate their privileges.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59192 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59192.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59192"
        },
        {
            "cve": "CVE-2025-59193",
            "cwe": {
                "id": "CWE-362",
                "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
                    "title": "CWE-362"
                },
                {
                    "category": "description",
                    "text": "A race condition in Windows Management Services allows authorized attackers to locally elevate their privileges due to improper synchronization.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59193 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59193.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59193"
        },
        {
            "cve": "CVE-2025-59194",
            "cwe": {
                "id": "CWE-908",
                "name": "Use of Uninitialized Resource"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use of Uninitialized Resource",
                    "title": "CWE-908"
                },
                {
                    "category": "description",
                    "text": "The document outlines a vulnerability in the Windows Kernel that allows an authorized attacker to locally escalate privileges by exploiting uninitialized resources.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59194 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59194.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59194"
        },
        {
            "cve": "CVE-2025-59197",
            "cwe": {
                "id": "CWE-532",
                "name": "Insertion of Sensitive Information into Log File"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Insertion of Sensitive Information into Log File",
                    "title": "CWE-532"
                },
                {
                    "category": "description",
                    "text": "Inserting sensitive information into a Windows ETL Channel log file allows an authorized attacker to locally disclose confidential data.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59197 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59197.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 5.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59197"
        },
        {
            "cve": "CVE-2025-59198",
            "cwe": {
                "id": "CWE-20",
                "name": "Improper Input Validation"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Input Validation",
                    "title": "CWE-20"
                },
                {
                    "category": "description",
                    "text": "Improper input validation in the Microsoft Windows Search Component can allow an authorized attacker to locally trigger a denial of service condition.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59198 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59198.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
                        "baseScore": 5.0,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59198"
        },
        {
            "cve": "CVE-2025-59203",
            "cwe": {
                "id": "CWE-532",
                "name": "Insertion of Sensitive Information into Log File"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Insertion of Sensitive Information into Log File",
                    "title": "CWE-532"
                },
                {
                    "category": "description",
                    "text": "The Windows StateRepository API contains a vulnerability that enables authorized attackers to insert sensitive information into log files, risking local information disclosure.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59203 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59203.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 5.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59203"
        },
        {
            "cve": "CVE-2025-59205",
            "cwe": {
                "id": "CWE-362",
                "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",
                    "title": "CWE-362"
                },
                {
                    "category": "description",
                    "text": "A race condition in the Microsoft Graphics Component allows an authorized attacker to elevate privileges locally due to improper synchronization of shared resources.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59205 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59205.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59205"
        },
        {
            "cve": "CVE-2025-59208",
            "cwe": {
                "id": "CWE-125",
                "name": "Out-of-bounds Read"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Out-of-bounds Read",
                    "title": "CWE-125"
                },
                {
                    "category": "description",
                    "text": "An out-of-bounds read vulnerability in Windows MapUrlToZone can allow unauthorized attackers to disclose sensitive information over a network.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59208 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59208.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
                        "baseScore": 7.1,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59208"
        },
        {
            "cve": "CVE-2025-59209",
            "cwe": {
                "id": "CWE-200",
                "name": "Exposure of Sensitive Information to an Unauthorized Actor"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Exposure of Sensitive Information to an Unauthorized Actor",
                    "title": "CWE-200"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in Windows Push Notification Core allows an authorized attacker to expose sensitive information to an unauthorized actor locally.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59209 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59209.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 5.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59209"
        },
        {
            "cve": "CVE-2025-59210",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "Windows Resilient File System (ReFS) contains a vulnerability in its Deduplication Service that may enable an attacker to elevate their privileges.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59210 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59210.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.4,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59210"
        },
        {
            "cve": "CVE-2025-59214",
            "cwe": {
                "id": "CWE-200",
                "name": "Exposure of Sensitive Information to an Unauthorized Actor"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Exposure of Sensitive Information to an Unauthorized Actor",
                    "title": "CWE-200"
                },
                {
                    "category": "description",
                    "text": "Sensitive information exposure in Windows File Explorer can allow unauthorized attackers to spoof identities across a network, posing a significant security risk.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59214 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59214.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
                        "baseScore": 6.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59214"
        },
        {
            "cve": "CVE-2025-59241",
            "cwe": {
                "id": "CWE-59",
                "name": "Improper Link Resolution Before File Access ('Link Following')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Link Resolution Before File Access ('Link Following')",
                    "title": "CWE-59"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in the Windows Health and Optimized Experiences Service enables authorized attackers to locally elevate privileges through improper link resolution prior to file access.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59241 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59241.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59241"
        },
        {
            "cve": "CVE-2025-2884",
            "cwe": {
                "id": "CWE-125",
                "name": "Out-of-bounds Read"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Out-of-bounds Read",
                    "title": "CWE-125"
                },
                {
                    "category": "description",
                    "text": "Multiple vulnerabilities have been identified in various HPE servers and the TCG TPM2.0 Reference implementation, including Out-of-Bounds read issues and local denial of service exploits.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-2884 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-2884.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H",
                        "baseScore": 6.6,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-2884"
        },
        {
            "cve": "CVE-2025-59244",
            "cwe": {
                "id": "CWE-73",
                "name": "External Control of File Name or Path"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "External Control of File Name or Path",
                    "title": "CWE-73"
                },
                {
                    "category": "description",
                    "text": "Unauthorized attackers can exploit external control of file names or paths in Windows Core Shell to execute spoofing attacks over a network.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59244 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59244.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
                        "baseScore": 6.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59244"
        },
        {
            "cve": "CVE-2025-59230",
            "cwe": {
                "id": "CWE-284",
                "name": "Improper Access Control"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Access Control",
                    "title": "CWE-284"
                },
                {
                    "category": "description",
                    "text": "Microsoft Windows Remote Access Connection Manager has a vulnerability that allows an authorized attacker to locally elevate privileges due to improper access control.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59230 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59230.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59230"
        },
        {
            "cve": "CVE-2025-59253",
            "cwe": {
                "id": "CWE-284",
                "name": "Improper Access Control"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Access Control",
                    "title": "CWE-284"
                },
                {
                    "category": "description",
                    "text": "An attacker can exploit improper access control in the Microsoft Windows Search Component, leading to a local denial of service.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59253 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59253.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                        "baseScore": 5.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59253"
        },
        {
            "cve": "CVE-2025-59261",
            "cwe": {
                "id": "CWE-367",
                "name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
                    "title": "CWE-367"
                },
                {
                    "category": "description",
                    "text": "A TOCTOU race condition in the Microsoft Graphics Component allows an authorized attacker to locally elevate their privileges.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59261 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59261.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59261"
        },
        {
            "cve": "CVE-2025-47827",
            "cwe": {
                "id": "CWE-347",
                "name": "Improper Verification of Cryptographic Signature"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Verification of Cryptographic Signature",
                    "title": "CWE-347"
                },
                {
                    "category": "other",
                    "text": "Use of a Key Past its Expiration Date",
                    "title": "CWE-324"
                },
                {
                    "category": "description",
                    "text": "IGEL OS versions prior to 11 have a vulnerability in the igel-flash-driver module that allows Secure Boot to be bypassed due to improper verification of cryptographic signatures, enabling the use of unverified SquashFS images.",
                    "title": "Summary"
                },
                {
                    "category": "general",
                    "text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
                    "title": "CVSSV4"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-47827 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47827.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "baseScore": 4.6,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-47827"
        },
        {
            "cve": "CVE-2025-59277",
            "cwe": {
                "id": "CWE-1287",
                "name": "Improper Validation of Specified Type of Input"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Validation of Specified Type of Input",
                    "title": "CWE-1287"
                },
                {
                    "category": "description",
                    "text": "The document identifies a vulnerability in Windows Authentication Methods that allows an authorized attacker to achieve elevated privileges due to inadequate input validation.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59277 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59277.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59277"
        },
        {
            "cve": "CVE-2025-59280",
            "cwe": {
                "id": "CWE-287",
                "name": "Improper Authentication"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Authentication",
                    "title": "CWE-287"
                },
                {
                    "category": "description",
                    "text": "Improper authentication in the Windows SMB Client allows unauthorized attackers to manipulate data over a network, posing a significant security risk.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59280 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59280.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
                        "baseScore": 3.1,
                        "baseSeverity": "LOW"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59280"
        },
        {
            "cve": "CVE-2025-59290",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in the Windows Bluetooth Service enables an authorized attacker to locally elevate privileges via a use-after-free exploit.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59290 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59290.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59290"
        },
        {
            "cve": "CVE-2025-55326",
            "cwe": {
                "id": "CWE-416",
                "name": "Use After Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Use After Free",
                    "title": "CWE-416"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in the Connected Devices Platform Service (Cdpsvc) allows unauthorized attackers to execute code remotely due to a use-after-free issue.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-55326 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55326.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                        "baseScore": 7.5,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-55326"
        },
        {
            "cve": "CVE-2025-59275",
            "cwe": {
                "id": "CWE-122",
                "name": "Heap-based Buffer Overflow"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Heap-based Buffer Overflow",
                    "title": "CWE-122"
                },
                {
                    "category": "other",
                    "text": "Out-of-bounds Read",
                    "title": "CWE-125"
                },
                {
                    "category": "other",
                    "text": "Improper Validation of Specified Type of Input",
                    "title": "CWE-1287"
                },
                {
                    "category": "description",
                    "text": "The document identifies a vulnerability in Windows Authentication Methods that allows an authorized attacker to achieve elevated privileges due to inadequate input validation.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59275 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59275.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59275"
        },
        {
            "cve": "CVE-2025-59278",
            "cwe": {
                "id": "CWE-1287",
                "name": "Improper Validation of Specified Type of Input"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Validation of Specified Type of Input",
                    "title": "CWE-1287"
                },
                {
                    "category": "description",
                    "text": "The document identifies a vulnerability in Windows Authentication Methods that allows an authorized attacker to achieve elevated privileges due to inadequate input validation.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59278 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59278.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59278"
        },
        {
            "cve": "CVE-2025-59289",
            "cwe": {
                "id": "CWE-415",
                "name": "Double Free"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Double Free",
                    "title": "CWE-415"
                },
                {
                    "category": "description",
                    "text": "A vulnerability in the Windows Bluetooth Service allows an authorized attacker to locally elevate privileges due to a double free error.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59289 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59289.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 7.0,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59289"
        },
        {
            "cve": "CVE-2025-59186",
            "cwe": {
                "id": "CWE-200",
                "name": "Exposure of Sensitive Information to an Unauthorized Actor"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Exposure of Sensitive Information to an Unauthorized Actor",
                    "title": "CWE-200"
                },
                {
                    "category": "description",
                    "text": "The exposure of sensitive information in the Windows Kernel allows authorized attackers to locally disclose confidential data, posing a significant security risk.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4",
                    "CSAFPID-5",
                    "CSAFPID-6",
                    "CSAFPID-7",
                    "CSAFPID-8",
                    "CSAFPID-9",
                    "CSAFPID-10",
                    "CSAFPID-11",
                    "CSAFPID-12",
                    "CSAFPID-13",
                    "CSAFPID-14",
                    "CSAFPID-15",
                    "CSAFPID-16",
                    "CSAFPID-17",
                    "CSAFPID-18",
                    "CSAFPID-19",
                    "CSAFPID-20",
                    "CSAFPID-21",
                    "CSAFPID-22",
                    "CSAFPID-23",
                    "CSAFPID-24",
                    "CSAFPID-25",
                    "CSAFPID-26",
                    "CSAFPID-27",
                    "CSAFPID-28",
                    "CSAFPID-29",
                    "CSAFPID-30",
                    "CSAFPID-31"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2025-59186 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59186.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                        "baseScore": 5.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4",
                        "CSAFPID-5",
                        "CSAFPID-6",
                        "CSAFPID-7",
                        "CSAFPID-8",
                        "CSAFPID-9",
                        "CSAFPID-10",
                        "CSAFPID-11",
                        "CSAFPID-12",
                        "CSAFPID-13",
                        "CSAFPID-14",
                        "CSAFPID-15",
                        "CSAFPID-16",
                        "CSAFPID-17",
                        "CSAFPID-18",
                        "CSAFPID-19",
                        "CSAFPID-20",
                        "CSAFPID-21",
                        "CSAFPID-22",
                        "CSAFPID-23",
                        "CSAFPID-24",
                        "CSAFPID-25",
                        "CSAFPID-26",
                        "CSAFPID-27",
                        "CSAFPID-28",
                        "CSAFPID-29",
                        "CSAFPID-30",
                        "CSAFPID-31"
                    ]
                }
            ],
            "title": "CVE-2025-59186"
        }
    ]
}