Beschreibung
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions, gain privileges, execute arbitrary code, obtain sensitive information.
Below is a complete list of vulnerabilities:
- A denial of service vulnerability in Windows TCP/IP can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Data Deduplication can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Hyper-V can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability can be exploited to gain privileges.
- An elevation of privilege vulnerability in Windows Print Spooler can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Storage Spaces Controller can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Application Identity (AppID) Subsystem can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows DNS Client can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in Windows Filtering Platform (WFP) can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Projected File System can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows Lightweight Directory Access Protocol (LDAP) can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Windows Native WiFi Miniport Driver can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows TCP/IP Local can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Win32k can be exploited remotely to gain privileges.
- Out-of-bounds read in Windows DWM Core Library can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Telephony Service can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Kernel-Mode Driver can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows TCP/IP can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Remote Desktop Services can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Admin Center can be exploited remotely to gain privileges.
- Buffer over-read in Windows DWM Core Library can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows TCP/IP can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Rich Text Edit can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft Message Queuing (MSMQ) can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in Windows TCP/IP Driver can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Windows GDI can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Link-Layer Discovery Protocol (LLDP) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Netlogon can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Internet Key Exchange (IKE) Protocol can be exploited remotely to cause denial of service.
- A security feature bypass vulnerability in Secure Boot can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Microsoft Cryptographic Services can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Message Queuing (MSMQ) can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows 11 Telnet Client can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Event Logging Service can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows TCP/IP can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows WAN ARP Driver can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Volume Manager Extension Driver can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Storport Miniport Driver can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows DWM Core Library can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Graphics Component can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows SMB Client can be exploited remotely to gain privileges.
Ursprüngliche Informationshinweise
- CVE-2026-41095
- CVE-2026-40402
- CVE-2025-54518
- CVE-2026-34342
- CVE-2026-35415
- CVE-2026-34343
- CVE-2026-41096
- CVE-2026-32209
- CVE-2026-34344
- CVE-2026-33841
- CVE-2026-34340
- CVE-2026-34339
- CVE-2026-32161
- CVE-2026-33837
- CVE-2026-34347
- CVE-2026-35417
- CVE-2026-35419
- CVE-2026-40382
- CVE-2026-34333
- CVE-2026-40413
- CVE-2026-34345
- CVE-2026-34332
- CVE-2026-40406
- CVE-2026-40398
- CVE-2026-35438
- CVE-2026-34336
- CVE-2026-34338
- CVE-2026-34351
- CVE-2026-33839
- CVE-2026-32170
- CVE-2026-40407
- CVE-2026-34329
- CVE-2026-35422
- CVE-2026-35421
- CVE-2026-34341
- CVE-2026-34337
- CVE-2026-41089
- CVE-2026-21530
- CVE-2026-34330
- CVE-2026-34334
- CVE-2026-35424
- CVE-2026-41097
- CVE-2026-40377
- CVE-2026-33835
- CVE-2026-35418
- CVE-2026-33838
- CVE-2026-33840
- CVE-2026-40397
- CVE-2026-41088
- CVE-2026-40369
- CVE-2026-40399
- CVE-2026-35423
- CVE-2026-33834
- CVE-2026-35416
- CVE-2026-40415
- CVE-2026-40405
- CVE-2026-40408
- CVE-2026-40380
- CVE-2026-34331
- CVE-2026-34350
- CVE-2026-42896
- CVE-2026-35420
- CVE-2026-40414
- CVE-2026-40403
- CVE-2026-40410
- CVE-2026-42825
Betroffene Produkte
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
- Microsoft-Windows-Server-2022
- Microsoft-Windows-Server-2025
CVE Liste
- CVE-2026-21530 high
- CVE-2026-32161 critical
- CVE-2026-32170 high
- CVE-2026-32209 warning
- CVE-2026-33834 critical
- CVE-2026-33835 critical
- CVE-2026-33837 critical
- CVE-2026-33838 critical
- CVE-2026-33839 high
- CVE-2026-33840 critical
- CVE-2026-33841 critical
- CVE-2026-34329 critical
- CVE-2026-34330 critical
- CVE-2026-34331 high
- CVE-2026-34332 critical
- CVE-2026-34333 critical
- CVE-2026-34334 critical
- CVE-2026-34336 critical
- CVE-2026-34337 critical
- CVE-2026-34338 critical
- CVE-2026-34339 high
- CVE-2026-34340 high
- CVE-2026-34341 high
- CVE-2026-34342 high
- CVE-2026-34343 critical
- CVE-2026-34344 critical
- CVE-2026-34345 high
- CVE-2026-34347 high
- CVE-2026-34350 high
- CVE-2026-34351 critical
- CVE-2026-35415 critical
- CVE-2026-35416 high
- CVE-2026-35417 critical
- CVE-2026-35418 critical
- CVE-2026-35419 high
- CVE-2026-35420 critical
- CVE-2026-35421 critical
- CVE-2026-35422 high
- CVE-2026-35423 high
- CVE-2026-35424 critical
- CVE-2026-35438 critical
- CVE-2026-40369 critical
- CVE-2026-40377 critical
- CVE-2026-40380 high
- CVE-2026-40382 critical
- CVE-2026-40397 critical
- CVE-2026-40398 critical
- CVE-2026-40399 critical
- CVE-2026-40401 high
- CVE-2026-40402 critical
- CVE-2026-40403 critical
- CVE-2026-40405 critical
- CVE-2026-40406 critical
- CVE-2026-40407 critical
- CVE-2026-40408 critical
- CVE-2026-40410 high
- CVE-2026-40413 high
- CVE-2026-40414 high
- CVE-2026-40415 critical
- CVE-2026-41088 critical
- CVE-2026-41089 critical
- CVE-2026-41095 critical
- CVE-2026-41096 critical
- CVE-2026-41097 high
- CVE-2026-42825 high
- CVE-2026-42896 critical
- CVE-2025-54518 unknown
KB Liste
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!