Popis
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, gain privileges, cause denial of service, spoof user interface, execute arbitrary code, read local files.
Below is a complete list of vulnerabilities:
- An information disclosure vulnerability in Remote Procedure Call can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Projected File System can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Encrypted File System (EFS) can be exploited remotely to gain privileges.
- A denial of service vulnerability in HTTP.sys can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Kerberos can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Universal Plug and Play (upnp.dll) can be exploited remotely to obtain sensitive information.
- A spoofing vulnerability in Windows Shell can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Windows UPnP Device Host can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Function Discovery Service (fdwsd.dll) can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows TCP/IP can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Web Account Manager can be exploited remotely to obtain sensitive information.
- A spoofing vulnerability in Windows Snipping Tool can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Windows Push Notifications can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.
- A spoofing vulnerability in Active Directory can be exploited remotely to spoof user interface.
- A denial of service vulnerability in Windows Redirected Drive Buffering System can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows User Interface Core can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Microsoft Brokering File System can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows Local Security Authority Subsystem Service (LSASS) can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Desktop Window Manager can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Shell can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Windows BitLocker can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Windows Simple Search and Discovery Protocol (SSDP) Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Sensor Data Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows OLE can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows COM Server can be exploited remotely to obtain sensitive information.
- Security UI vulnerability can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Windows Snipping Tool can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in UEFI Secure Boot can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Remote Desktop Licensing Service can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Graphics Component can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Remote Access Management service/API (RPC server) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows TDI Translation Driver (tdx.sys) can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows GDI can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Windows Virtualization-Based Security (VBS) can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in PowerShell can be exploited remotely to gain privileges.
- Security vulnerability can be exploited to bypass security restrictions.
- A security feature bypass vulnerability in Windows Recovery Environment can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Print Spooler can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Windows Boot Manager can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Windows Speech Brokered Api can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Win32k can be exploited remotely to gain privileges.
- A spoofing vulnerability in Windows Admin Center can be exploited remotely to spoof user interface.
- A spoofing vulnerability in Remote Desktop can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Windows UPnP Device Host can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Container Isolation FS Filter Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Applocker Filter Driver (applockerfltr.sys) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows COM can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Server Update Service (WSUS) can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Internet Key Exchange (IKE) Service Extensions can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Advanced Rasterization Platform can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Storage Spaces Controller can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Active Directory can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Package Catalog can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows USB Printing Stack (usbprint.sys) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Microsoft Management Console can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Windows Hello can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Windows Biometric Service can be exploited remotely to bypass security restrictions.
- An information disclosure vulnerability in Microsoft Local Security Authority Subsystem Service can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Windows UPnP Device Host can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Windows Hyper-V can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in Windows Shell can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Windows Management Services can be exploited remotely to gain privileges.
- A tampering vulnerability in Windows Server Update Service (WSUS) can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows Print Spooler can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Windows Kernel Memory can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows WalletService can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Search Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Shell can be exploited remotely to gain privileges.
- A denial of service vulnerability in Connected User Experiences and Telemetry Service can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows LUA File Virtualization Filter Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Speech Runtime can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Microsoft Cryptographic Services can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Client Side Caching driver (csc.sys) can be exploited remotely to gain privileges.
Oficiální doporučení
- CVE-2026-32074
- CVE-2026-26153
- CVE-2026-33096
- CVE-2026-27912
- CVE-2026-32214
- CVE-2026-32202
- CVE-2026-32156
- CVE-2026-32086
- CVE-2026-32150
- CVE-2026-33827
- CVE-2026-32079
- CVE-2026-33829
- CVE-2026-32159
- CVE-2026-26177
- CVE-2026-32072
- CVE-2026-26173
- CVE-2026-32216
- CVE-2026-32164
- CVE-2026-26181
- CVE-2026-32071
- CVE-2026-32218
- CVE-2026-27923
- CVE-2026-32151
- CVE-2026-27913
- CVE-2026-27911
- CVE-2026-32212
- CVE-2026-32215
- CVE-2026-32082
- CVE-2026-26161
- CVE-2026-26162
- CVE-2026-32091
- CVE-2026-20806
- CVE-2023-20585
- CVE-2026-32183
- CVE-2026-32220
- CVE-2026-26159
- CVE-2026-32221
- CVE-2026-26183
- CVE-2026-27908
- CVE-2026-32155
- CVE-2026-27931
- CVE-2026-23670
- CVE-2026-26170
- CVE-2026-25250
- CVE-2026-20928
- CVE-2026-32070
- CVE-2026-33104
- CVE-2026-33101
- CVE-2026-26182
- CVE-2026-26175
- CVE-2026-27927
- CVE-2026-32069
- CVE-2026-32089
- CVE-2026-26167
- CVE-2026-33100
- CVE-2026-27930
- CVE-2026-32068
- CVE-2026-32093
- CVE-2026-32222
- CVE-2026-32196
- CVE-2026-26151
- CVE-2026-27916
- CVE-2026-33098
- CVE-2026-25184
- CVE-2026-32162
- CVE-2026-26174
- CVE-2026-26160
- CVE-2026-27919
- CVE-2026-33824
- CVE-2026-32083
- CVE-2026-26178
- CVE-2026-32224
- CVE-2026-27907
- CVE-2026-27926
- CVE-2026-26184
- CVE-2026-27920
- CVE-2026-0390
- CVE-2026-33826
- CVE-2026-32081
- CVE-2026-32076
- CVE-2026-32223
- CVE-2026-27915
- CVE-2026-27914
- CVE-2026-26180
- CVE-2026-27928
- CVE-2026-26163
- CVE-2026-27917
- CVE-2026-32088
- CVE-2026-32078
- CVE-2026-26155
- CVE-2026-27925
- CVE-2026-26168
- CVE-2026-32149
- CVE-2026-32158
- CVE-2026-32225
- CVE-2026-20930
- CVE-2026-26154
- CVE-2026-33099
- CVE-2026-32163
- CVE-2026-32157
- CVE-2026-32090
- CVE-2026-27922
- CVE-2026-27906
- CVE-2026-32084
- CVE-2026-26169
- CVE-2026-32077
- CVE-2026-27910
- CVE-2026-26156
- CVE-2026-26179
- CVE-2026-32080
- CVE-2026-27909
- CVE-2026-32154
- CVE-2026-32195
- CVE-2026-27924
- CVE-2026-32219
- CVE-2026-27918
- CVE-2026-32181
- CVE-2026-32075
- CVE-2026-27929
- CVE-2026-27921
- CVE-2026-32153
- CVE-2026-26152
- CVE-2026-32152
- CVE-2026-32217
- CVE-2026-32165
- CVE-2026-26172
- CVE-2026-26165
- CVE-2026-32160
- CVE-2026-32087
- CVE-2026-26176
- CVE-2026-26166
- CVE-2026-32073
Vykořisťování
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Související produkty
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
- Microsoft-Remote-Desktop
- Microsoft-Windows-Server-2022
- Microsoft-Windows-Server-2025
seznam CVE
- CVE-2026-0390 high
- CVE-2026-20806 high
- CVE-2026-20928 warning
- CVE-2026-20930 critical
- CVE-2026-23670 high
- CVE-2026-25184 high
- CVE-2026-26151 high
- CVE-2026-26152 high
- CVE-2026-26153 critical
- CVE-2026-26154 critical
- CVE-2026-26155 high
- CVE-2026-26156 critical
- CVE-2026-26159 critical
- CVE-2026-26160 critical
- CVE-2026-26161 critical
- CVE-2026-26162 critical
- CVE-2026-26163 critical
- CVE-2026-26165 high
- CVE-2026-26166 high
- CVE-2026-26167 critical
- CVE-2026-26168 critical
- CVE-2026-26169 high
- CVE-2026-26170 critical
- CVE-2026-26172 critical
- CVE-2026-26173 high
- CVE-2026-26174 high
- CVE-2026-26175 warning
- CVE-2026-26176 critical
- CVE-2026-26177 high
- CVE-2026-26178 critical
- CVE-2026-26179 critical
- CVE-2026-26180 critical
- CVE-2026-26181 critical
- CVE-2026-26182 high
- CVE-2026-26183 critical
- CVE-2026-26184 critical
- CVE-2026-27906 warning
- CVE-2026-27907 critical
- CVE-2026-27908 high
- CVE-2026-27909 critical
- CVE-2026-27910 critical
- CVE-2026-27911 critical
- CVE-2026-27912 critical
- CVE-2026-27913 critical
- CVE-2026-27914 critical
- CVE-2026-27915 critical
- CVE-2026-27916 critical
- CVE-2026-27917 high
- CVE-2026-27918 critical
- CVE-2026-27919 critical
- CVE-2026-27920 critical
- CVE-2026-27921 high
- CVE-2026-27922 high
- CVE-2026-27923 critical
- CVE-2026-27924 critical
- CVE-2026-27925 high
- CVE-2026-27926 high
- CVE-2026-27927 critical
- CVE-2026-27928 critical
- CVE-2026-27929 high
- CVE-2026-27930 high
- CVE-2026-27931 high
- CVE-2026-32068 high
- CVE-2026-32069 critical
- CVE-2026-32070 high
- CVE-2026-32071 critical
- CVE-2026-32072 high
- CVE-2026-32073 high
- CVE-2026-32074 critical
- CVE-2026-32075 high
- CVE-2026-32076 critical
- CVE-2026-32077 critical
- CVE-2026-32078 critical
- CVE-2026-32079 high
- CVE-2026-32080 high
- CVE-2026-32081 high
- CVE-2026-32082 high
- CVE-2026-32083 high
- CVE-2026-32084 high
- CVE-2026-32085 high
- CVE-2026-32086 high
- CVE-2026-32087 high
- CVE-2026-32088 high
- CVE-2026-32089 critical
- CVE-2026-32090 critical
- CVE-2026-32091 critical
- CVE-2026-32093 high
- CVE-2026-32149 high
- CVE-2026-32150 high
- CVE-2026-32151 high
- CVE-2026-32152 critical
- CVE-2026-32153 critical
- CVE-2026-32154 critical
- CVE-2026-32155 critical
- CVE-2026-32156 high
- CVE-2026-32157 critical
- CVE-2026-32158 critical
- CVE-2026-32159 critical
- CVE-2026-32160 critical
- CVE-2026-32162 critical
- CVE-2026-32163 critical
- CVE-2026-32164 critical
- CVE-2026-32165 critical
- CVE-2026-32181 high
- CVE-2026-32183 critical
- CVE-2026-32195 high
- CVE-2026-32196 high
- CVE-2026-32202 warning
- CVE-2026-32212 high
- CVE-2026-32214 high
- CVE-2026-32215 high
- CVE-2026-32216 high
- CVE-2026-32217 high
- CVE-2026-32218 high
- CVE-2026-32219 high
- CVE-2026-32220 warning
- CVE-2026-32221 critical
- CVE-2026-32222 critical
- CVE-2026-32223 high
- CVE-2026-32224 high
- CVE-2026-32225 critical
- CVE-2026-33096 critical
- CVE-2026-33098 critical
- CVE-2026-33099 high
- CVE-2026-33100 high
- CVE-2026-33101 critical
- CVE-2026-33104 high
- CVE-2026-33824 critical
- CVE-2026-33826 critical
- CVE-2026-33827 critical
- CVE-2026-33829 warning
- CVE-2026-25250 high
- CVE-2023-20585 high
seznam KB
Zobrazit více
Zjistěte statistiky zranitelností šířících se ve vaší oblasti statistics.securelist.com
Našli jste v popisu této chyby zabezpečení nepřesnost? Dej nám vědět!