{"Cloud":true,"Homeassistant":true,"Plex":true,"Proxmox1":true,"Proxmox2":true,"SecurityAlerts":[{"Title":"NCSC-2026-0146 [1.00] [M/H] Kwetsbaarheid verholpen in Microsoft SQL Server","Link":"https://advisories.ncsc.nl/advisory?id=NCSC-2026-0146","Description":"Microsoft heeft een kwetsbaarheid verholpen in SQL Server. Een geauthenticeerde kwaadwillende kan de kwetsbaarheid misbruiken om willekeurige code uit te voeren onder het account van de SQL server zelf.","Guid":"NCSC-2026-0146 [1.00]","PubDate":"2026-05-12T19:53:47+02:00","AdvisoryID":"NCSC-2026-0146","Versie":"1.00","Kans":"M","Schade":"H"},{"Title":"NCSC-2026-0140 [1.00] [M/H] Kwetsbaarheden verholpen in diverse SAP-producten","Link":"https://advisories.ncsc.nl/advisory?id=NCSC-2026-0140","Description":"SAP heeft kwetsbaarheden verholpen in SAP S/4HANA, SAP Commerce Cloud, SAP Forecasting \u0026 Replenishment, SAP NetWeaver Application Server voor ABAP, SAP Business Server Pages, SAP BusinessObjects Business Intelligence Platform, SAP Strategic Enterprise Management Scorecard Wizard, SAPUI5 Search UI, SAP Financial Consolidation, SAP Incentive and Commission Management, SAP Application Server ABAP voor SAP NetWeaver en ABAP Platform, en SAP HANA Deployment Infrastructure. De kwetsbaarheden betreffen verschillende typen beveiligingsproblemen binnen de genoemde SAP-producten.\n\n- In SAP S/4HANA\u0027s Enterprise Search for ABAP module kunnen geauthenticeerde aanvallers SQL-injecties uitvoeren, wat kan leiden tot ongeautoriseerde toegang tot gevoelige data en applicatiecrashes.\n- SAP Commerce Cloud bevat een configuratiefout in Spring Security waardoor ongeauthenticeerde gebruikers kwaadaardige configuraties kunnen uploaden en daarmee willekeurige server-side code kunnen uitvoeren.\n- In SAP Forecasting \u0026 Replenishment en SAP NetWeaver Application Server voor ABAP kunnen geauthenticeerde gebruikers met administratieve rechten OS-commando\u0027s uitvoeren, wat kan resulteren in systeemcompromittering of verstoring van de applicatie.\n- SAP S/4HANA Condition Maintenance heeft een ontbrekende autorisatiecontrole waardoor geauthenticeerde gebruikers records kunnen bekijken en wijzigen zonder de juiste permissies.\n- SAP Business Server Pages Application component TAF_APPLAUNCHER en SAP NetWeaver Application Server ABAP bevatten Cross-Site Scripting (XSS) kwetsbaarheden die het mogelijk maken om gebruikers te misleiden via kwaadaardige links.\n- SAP BusinessObjects Business Intelligence Platform heeft een Cross Site Request Forgery (CSRF) kwetsbaarheid die geauthenticeerde gebruikers kan misleiden tot het uitvoeren van ongewenste acties.\n- SAP Strategic Enterprise Management Scorecard Wizard kent een autorisatiefout waardoor geauthenticeerde gebruikers toegang krijgen tot niet-toegestane informatie en instellingen kunnen wijzigen.\n- SAPUI5 Search UI is kwetsbaar voor URL-parameter manipulatie die kan leiden tot het injecteren van kwaadaardige content en gebruikers kan omleiden naar aanvallersites.\n- SAP Financial Consolidation bevat een kwetsbaarheid waarmee geauthenticeerde gebruikers sessies van andere gebruikers kunnen be\u00EBindigen, wat de beschikbaarheid be\u00EFnvloedt.\n- SAP Incentive and Commission Management heeft onvoldoende autorisatiecontrole waardoor geauthenticeerde gebruikers database tabellen kunnen aanpassen.\n- SAP Application Server ABAP voor SAP NetWeaver en ABAP Platform bevat een code-injectie kwetsbaarheid die geauthenticeerde gebruikers kunnen misbruiken om willekeurige code uit te voeren.\n- SAP HANA Deployment Infrastructure bevat een SQL-injectie kwetsbaarheid in de @sap/hdi-deploy package, waarbij gebruikers met hoge privileges dynamische SQL-query\u0027s kunnen manipuleren, wat de vertrouwelijkheid en beschikbaarheid kan be\u00EFnvloeden.\n\nDaarnaast is er een gerelateerde kwetsbaarheid in Apache Log4j Core (versies 2.0-beta9 tot 2.25.2) met ontbrekende TLS hostname verificatie, die man-in-the-middle aanvallen mogelijk maakt en ook diverse SAP-producten en andere software be\u00EFnvloedt.","Guid":"NCSC-2026-0140 [1.00]","PubDate":"2026-05-12T14:21:42+02:00","AdvisoryID":"NCSC-2026-0140","Versie":"1.00","Kans":"M","Schade":"H"},{"Title":"NCSC-2026-0139 [1.00] [M/H] Kwetsbaarheden verholpen in Apple MacOS","Link":"https://advisories.ncsc.nl/advisory?id=NCSC-2026-0139","Description":"Apple heeft meerdere kwetsbaarheden verholpen in diverse versies van macOS (inclusief Sequoia, Sonoma en Tahoe versies). De kwetsbaarheden betreffen onder andere fouten in geheugenbeheer zoals buffer overflows, use-after-free, out-of-bounds read en write, en integer overflow, die kunnen leiden tot onverwachte applicatie- of systeemcrashes, denial-of-service, of ongeautoriseerde toegang tot kernel- of gebruikersgegevens. Verder zijn er problemen opgelost met betrekking tot sandbox escape, privilege escalatie naar root, bypass van Content Security Policy, onjuiste permissie- en toegangscontrole, race conditions, logging die gevoelige informatie lekt, en bypass van Gatekeeper beveiligingsmechanismen. Sommige kwetsbaarheden kunnen worden misbruikt via speciaal vervaardigde bestanden, webcontent, of netwerkverkeer. De fixes omvatten verbeterde validatie van invoer, strengere toegangscontrole, verbeterde geheugen- en statusbeheer, en versterkte sandboxing en logging mechanismen.","Guid":"NCSC-2026-0139 [1.00]","PubDate":"2026-05-12T14:19:43+02:00","AdvisoryID":"NCSC-2026-0139","Versie":"1.00","Kans":"M","Schade":"H"},{"Title":"NCSC-2026-0138 [1.00] [M/H] Kwetsbaarheden verholpen in Apple iOS en iPadOS","Link":"https://advisories.ncsc.nl/advisory?id=NCSC-2026-0138","Description":"Apple heeft meerdere kwetsbaarheden verholpen in diverse versies van iOS en iPadOS De kwetsbaarheden betreffen onder andere onjuiste geheugenbeheermechanismen zoals use-after-free, buffer overflows, out-of-bounds reads en writes, race conditions, type confusion, null pointer dereferences, en onvoldoende inputvalidatie. Deze kunnen leiden tot onverwachte applicatie- of systeemcrashes, denial-of-service, ongeautoriseerde toegang tot gevoelige gebruikers- of kerneldata, privilege-escalatie, en het omzeilen van beveiligingsmechanismen zoals Content Security Policy en sandboxing. Sommige kwetsbaarheden maken het mogelijk dat een aanvaller code met kernel-privileges uitvoert of systeemstabiliteit verstoort. De problemen kunnen worden geactiveerd door het verwerken van speciaal vervaardigde bestanden, webcontent, of netwerkverkeer. De fixes omvatten verbeterde validatie, strengere toegangscontroles, en verbeterde geheugen- en state managementmechanismen.","Guid":"NCSC-2026-0138 [1.00]","PubDate":"2026-05-12T14:18:59+02:00","AdvisoryID":"NCSC-2026-0138","Versie":"1.00","Kans":"M","Schade":"H"},{"Title":"NCSC-2026-0137 [1.00] [M/H] Kwetsbaarheden verholpen in LiteLLM door BerriAI","Link":"https://advisories.ncsc.nl/advisory?id=NCSC-2026-0137","Description":"BerriAI heeft kwetsbaarheden verholpen in LiteLLM, specifiek in versies 1.74.2 tot en met 1.83.6. LiteLLM is een veelgebruikte proxy om op gecentraliseerde wijze API\u0027s naar een groot aantal LLM systemen te beheren.\n\nDe eerste kwetsbaarheid betreft een SQL-injectie in het proxy API key verificatiemechanisme, waardoor niet-geauthenticeerde aanvallers SQL-injectieaanvallen kunnen uitvoeren om proxy databasegegevens te lezen en te wijzigen. Dit kan leiden tot het compromitteren van credentials en verdere ongeautoriseerde toegang tot het systeem. De tweede kwetsbaarheid betreft twee preview endpoints in de MCP server feature die volledige serverconfiguraties accepteren. Elke geauthenticeerde gebruiker met een geldige proxy API key kan hiermee willekeurige commando\u0027s uitvoeren op de proxy host, zonder dat hiervoor administratieve rechten vereist zijn. Deze kwetsbaarheid maakt ongeautoriseerde command execution mogelijk.","Guid":"NCSC-2026-0137 [1.00]","PubDate":"2026-05-11T08:38:59+02:00","AdvisoryID":"NCSC-2026-0137","Versie":"1.00","Kans":"M","Schade":"H"},{"Title":"NCSC-2026-0136 [1.00] [M/H] Kwetsbaarheden verholpen in Cisco Unity Connection","Link":"https://advisories.ncsc.nl/advisory?id=NCSC-2026-0136","Description":"Cisco heeft meerdere kwetsbaarheden verholpen in Cisco Unity Connection. De kwetsbaarheden bevinden zich in de web management interface en de Web Inbox web UI van Cisco Unity Connection. Geauthenticeerde aanvallers met geldige inloggegevens kunnen arbitrary code uitvoeren met root privileges, waardoor zij volledige controle over het apparaat krijgen. Daarnaast is er een server-side request forgery (SSRF) kwetsbaarheid die het mogelijk maakt om interne services te manipuleren. Sommige SSRF-aanvallen kunnen ook door niet-geauthenticeerde aanvallers worden uitgevoerd door onjuiste inputvalidatie in de Web Inbox web UI. Deze combinatie van kwetsbaarheden maakt het mogelijk om ongeautoriseerde code uit te voeren en interne systemen te be\u00EFnvloeden.","Guid":"NCSC-2026-0136 [1.00]","PubDate":"2026-05-08T15:08:42+02:00","AdvisoryID":"NCSC-2026-0136","Versie":"1.00","Kans":"M","Schade":"H"},{"Title":"NCSC-2026-0135 [1.00] [H/H] Kwetsbaarheden verholpen in Ivanti Endpoint Manager Mobile","Link":"https://advisories.ncsc.nl/advisory?id=NCSC-2026-0135","Description":"Ivanti heeft vijf kwetsbaarheden verholpen in Endpoint Manager Mobile (EPMM), ook wel bekend als MobileIron. De kwetsbaarheid met het kenmerk CVE-2026-6973 stelt een geauthenticeerde kwaadwillende met administratieve toegang in staat om op afstand willekeurige code uit te voeren met beheerdersrechten. Van de kwetsbaarheid met kenmerk CVE-2026-6973 meldt Ivanti dat deze actief is misbruikt bij een zeer beperkt aantal klanten. Om succesvol misbruik te bewerkstelligen moet de kwaadwillende beschikken over valide inloggegevens van een account met adminrechten. Ivanti geeft aan dat klanten die het advies in januari hebben opgevolgd om hun inloggegevens te vernieuwen, aanzienlijk minder risico lopen.\n\nDe kwetsbaarheid met CVE-2026-5786 stelt een geauthenticeerde kwaadwillende op afstand in staat om beheertoegang\nte verkrijgen. De kwetsbaarheid met CVE-2026-5787 stelt een niet-geauthenticeerde kwaadwillende in staat om zich voor te doen als\neen geregistreerd Sentry systeem, om zodoende door een Certificate Authority (CA) ondertekende client certificaten \nte verkrijgen. De kwetsbaarheid CVE-2026-5788 stelt een niet-geauthenticeerde kwaadwillende op afstand in staat om willekeurige\ncode uit te voeren. De kwetsbaarheid CVE-2026-7821 stelt een niet-geauthenticeerde kwaadwillende in staat om een apparaat te registreren\naan een set van niet-geregistreerde apparaten en toegang te verkrijgen tot (gevoelige) gegevens.\n\nHet NCSC verwacht dat op korte termijn Proof-of-Concept code publiek beschikbaar komt. Dit vergroot de kans grootschalig misbruik aanzienlijk.","Guid":"NCSC-2026-0135 [1.00]","PubDate":"2026-05-07T18:17:26+02:00","AdvisoryID":"NCSC-2026-0135","Versie":"1.00","Kans":"H","Schade":"H"},{"Title":"NCSC-2026-0134 [1.00] [M/H] Kwetsbaarheden verholpen in Apache HTTP Server","Link":"https://advisories.ncsc.nl/advisory?id=NCSC-2026-0134","Description":"Apache Software Foundation heeft meerdere kwetsbaarheden verholpen in Apache HTTP Server. De kwetsbaarheden betreffen verschillende modules en functionaliteiten binnen Apache HTTP Server. De meest ernstige kwetsbaarheid betreft een double free in de HTTP/2-implementatie, die het voor een aanvaller mogelijk maakt om willekeurige code uit te voeren voorafgaand aan authenticatie. \n\nLokale .htaccess auteurs kunnen via een privilege-escalatie toegang krijgen tot bestanden met httpd-gebruikersrechten. Het mod_proxy_ajp module bevat een heap-based buffer overflow en een out-of-bounds read, waardoor geheugenbeschadiging kan optreden. In de mod_md module is een resource allocatieprobleem aanwezig dat de serverprestaties kan be\u00EFnvloeden. De mod_dav_lock module bevat een NULL pointer dereference die kan leiden tot servercrashes en daarmee denial of service. De mod_auth_digest module kent een timing attack die Digest authenticatie kan omzeilen. De mod_authn_socache module heeft een NULL pointer dereference die crashes veroorzaakt bij caching forward proxy configuraties. Verder is er een HTTP response splitting kwetsbaarheid die manipulatie van HTTP headers mogelijk maakt. Daarnaast is er een improper null termination en out-of-bounds read in de core server functionaliteit, en een buffer over-read die kan leiden tot informatielekken of instabiliteit.","Guid":"NCSC-2026-0134 [1.00]","PubDate":"2026-05-06T13:33:26+02:00","AdvisoryID":"NCSC-2026-0134","Versie":"1.00","Kans":"M","Schade":"H"},{"Title":"NCSC-2026-0133 [1.00] [M/H] Kwetsbaarheden verholpen in Progress MOVEit Automation","Link":"https://advisories.ncsc.nl/advisory?id=NCSC-2026-0133","Description":"Progress heeft kwetsbaarheden verholpen in MOVEit Automation. De kwetsbaarheid met kenmerk CVE-2026-4670 betreft een bypass van de authenticatie in MOVEit Automation. Een kwaadwillende zonder rechten kan deze kwetsbaarheid misbruiken zonder dat daar gebruikersinteractie voor nodig is. \n\nDe tweede kwetsbaarheid met kenmerk CVE-2026-5174 betreft een onjuiste invoervalidatie in Progress Software MOVEit Automation en maakt privilege-escalatie mogelijk.\n\nDeze kwetsbaarheden zijn aanwezig in versies 2025.0.0 tot maar niet inclusief 2025.0.9, versies 2024.0.0 tot maar niet inclusief 2024.1.8, en alle versies v\u00F3\u00F3r 2024.0.0. \n\n\n","Guid":"NCSC-2026-0133 [1.00]","PubDate":"2026-05-06T11:18:44+02:00","AdvisoryID":"NCSC-2026-0133","Versie":"1.00","Kans":"M","Schade":"H"},{"Title":"NCSC-2026-0132 [1.01] [M/H] Kwetsbaarheid verholpen in Palo Alto Networks PAN-OS","Link":"https://advisories.ncsc.nl/advisory?id=NCSC-2026-0132","Description":"Palo Alto Networks heeft een kwetsbaarheid verholpen in PAN-OS, specifiek in de User-ID Authentication Portal component van PA-Series en VM-Series firewalls. De kwetsbaarheid betreft een buffer overflow in de User-ID Authentication Portal, waardoor niet-geauthenticeerde aanvallers willekeurige code kunnen uitvoeren met root privileges. Prisma Access, Cloud NGFW en Panorama appliances zijn niet kwetsbaar. Het is gangbare praktijk om de User-ID Authentication Portal niet direct aan het internet bloot te stellen. Exploitatie kan leiden tot volledige systeemcompromittering via de authenticatieportal.\n\nPalo Alto heeft beperkt misbruik waargenomen, gericht op Palo Alto Networks User-ID\u2122-authenticatieportalen die blootgesteld zijn aan niet-vertrouwde IP-adressen en/of het openbare internet.  Het is niet gebruikelijk om het User-ID\u2122-authenticatieportalal direct publiekelijk aan het internet bloot te stellen.","Guid":"NCSC-2026-0132 [1.01]","PubDate":"2026-05-06T10:42:18+02:00","AdvisoryID":"NCSC-2026-0132","Versie":"1.01","Kans":"M","Schade":"H"},{"Title":"NCSC-2026-0131 [1.00] [M/H] Kwetsbaarheid verholpen in Linux kernel cryptographic subsystem","Link":"https://advisories.ncsc.nl/advisory?id=NCSC-2026-0131","Description":"De Linux kernel heeft een kwetsbaarheid verholpen in de algif_aead crypto module binnen het cryptographic subsystem. De kwetsbaarheid bevindt zich in de algif_aead crypto module van de Linux kernel, waar een fout in de in-place operatie optrad wanneer bron- en bestemmingsmappings verschilden. Hiermee is het mogelijk om voor een gebruiker zonder sudo rechten verhoogde privileges te verkrijgen.","Guid":"NCSC-2026-0131 [1.00]","PubDate":"2026-05-01T08:13:56+02:00","AdvisoryID":"NCSC-2026-0131","Versie":"1.00","Kans":"M","Schade":"H"},{"Title":"NCSC-2026-0130 [1.00] [H/H] Kwetsbaarheid verholpen in cPanel en WHM","Link":"https://advisories.ncsc.nl/advisory?id=NCSC-2026-0130","Description":"cPanel heeft een kwetsbaarheid verholpen in cPanel en WHM producten, inclusief versies na 11.40 en v\u00F3\u00F3r de specifieke gepatchte releases. De kwetsbaarheid betreft een authenticatieomzeiling die ontstaat door CRLF-injectie in sessiebestanden, waardoor aanvallers sessies kunnen vervalsen. Daarnaast is de loginflow zelf kwetsbaar, waardoor niet-geauthenticeerde externe aanvallers de authenticatiemechanismen kunnen omzeilen. Hierdoor kan ongeautoriseerde toegang tot het WHM control panel met rootrechten worden verkregen.","Guid":"NCSC-2026-0130 [1.00]","PubDate":"2026-04-30T10:00:11+02:00","AdvisoryID":"NCSC-2026-0130","Versie":"1.00","Kans":"H","Schade":"H"},{"Title":"NCSC-2026-0129 [1.00] [M/H] Kwetsbaarheden verholpen in Apache Camel","Link":"https://advisories.ncsc.nl/advisory?id=NCSC-2026-0129","Description":"Apache Software Foundation heeft kwetsbaarheden verholpen in Apache Camel. De kwetsbaarheden bevinden zich in verschillende componenten van Apache Camel. De problemen betreffen onder andere onveilige deserialisatie, onvoldoende filtering van e-mailheaders, onjuiste authenticatiepadmatching, en onjuiste verwerking van interne headers. De meest ernstige kwetsbaarheid stelt kwaadwillenden in staat om ongeauthenticeerd op afstand willekeurige code uit te voeren. De kwetsbaarheden zijn aanwezig in diverse versies van Apache Camel, met name vanaf versie 3.0.0 tot net voor de gepatchte versies 4.14.6, 4.14.7, 4.18.1, 4.18.2, 4.19.0 en 4.20.0, afhankelijk van de component. De fixes omvatten onder meer het toepassen van veilige deserialisatie, correcte filtering van headers, en verbeterde authenticatiecontroles.","Guid":"NCSC-2026-0129 [1.00]","PubDate":"2026-04-29T10:12:14+02:00","AdvisoryID":"NCSC-2026-0129","Versie":"1.00","Kans":"M","Schade":"H"},{"Title":"NCSC-2026-0128 [1.00] [M/H] Kwetsbaarheden verholpen in GitLab EE en CE","Link":"https://advisories.ncsc.nl/advisory?id=NCSC-2026-0128","Description":"GitLab Inc. heeft meerdere kwetsbaarheden verholpen in GitLab Community Edition en Enterprise Edition, specifiek in versies vari\u00EBrend van 9.2 tot voor 18.11.1, inclusief diverse 18.x releases. De kwetsbaarheden betreffen verschillende componenten van GitLab, waaronder de discussions endpoint, GraphQL API, note retrieval, issue import, Mermaid sandbox, Storybook development environment, issue rendering, web interface en Virtual Registries. Geauthenticeerde gebruikers kunnen door onvoldoende resource limits of onjuiste inputvalidatie resource-exhaustie veroorzaken, wat leidt tot Denial-of-Service. Daarnaast zijn er problemen met onjuiste autorisatiecontroles waardoor project owners group fork preventie kunnen omzeilen, en met onvoldoende CSRF-bescherming waardoor ongeauthenticeerde gebruikers GraphQL mutaties kunnen uitvoeren. Verder is er een cross-site scripting (XSS) kwetsbaarheid die ongeauthenticeerde gebruikers toestaat om JavaScript code in de browser van een gebruiker uit te voeren. Ook kunnen gebruikers door onjuiste toegangscontrole de titels van vertrouwelijke issues in publieke projecten inzien en toegang krijgen tot Virtual Registries via onjuist gescopeerde credentials. Sommige kwetsbaarheden maken het mogelijk om ongeautoriseerde content te injecteren in browser sessies van andere gebruikers. De kwetsbaarheden zijn aanwezig in meerdere opeenvolgende versies en betreffen zowel Community als Enterprise edities van GitLab.","Guid":"NCSC-2026-0128 [1.00]","PubDate":"2026-04-23T13:21:11+02:00","AdvisoryID":"NCSC-2026-0128","Versie":"1.00","Kans":"M","Schade":"H"},{"Title":"NCSC-2026-0127 [1.00] [M/H] Kwetsbaarheden verholpen in Oracle PeopleSoft","Link":"https://advisories.ncsc.nl/advisory?id=NCSC-2026-0127","Description":"Oracle heeft kwetsbaarheden verholpen in Oracle PeopleSoft. De kwetsbaarheden stellen ongeauthenticeerde aanvallers in staat om toegang te krijgen tot gevoelige gegevens en deze te wijzigen. Daarbij kunnen de kwetsbaarheden leiden tot een denial-of-service van de betreffende producten.","Guid":"NCSC-2026-0127 [1.00]","PubDate":"2026-04-22T16:10:36+02:00","AdvisoryID":"NCSC-2026-0127","Versie":"1.00","Kans":"M","Schade":"H"},{"Title":"NCSC-2026-0126 [1.00] [M/H] Kwetsbaarheden verholpen in Oracle E-Business Suite","Link":"https://advisories.ncsc.nl/advisory?id=NCSC-2026-0126","Description":"Oracle heeft kwetsbaarheden verholpen in Oracle E-Business Suite. De kwetsbaarheden bevinden zich in verschillende componenten van Oracle E-Business Suite, waaronder Oracle Advanced Inbound Telephony, Oracle Enterprise Command Center Framework, Oracle Advanced Supply Chain Planning en Oracle Flow Manufacturing. Deze kwetsbaarheden kunnen worden misbruikt door ongeauthenticeerde of hooggeprivilegieerde aanvallers, wat kan leiden tot ongeautoriseerde toegang en gegevensmanipulatie.","Guid":"NCSC-2026-0126 [1.00]","PubDate":"2026-04-22T14:56:26+02:00","AdvisoryID":"NCSC-2026-0126","Versie":"1.00","Kans":"M","Schade":"H"},{"Title":"NCSC-2026-0125 [1.00] [M/H] Kwetsbaarheden verholpen in Oracle Enterprise Manager","Link":"https://advisories.ncsc.nl/advisory?id=NCSC-2026-0125","Description":"Oracle heeft kwetsbaarheden verholpen in Enterprise Manager Base Platform (13.5, 24.1). De kwetsbaarheden stellen niet-geauthenticeerde aanvallers in staat om ongeautoriseerde toegang te verkrijgen, of kunnen leiden tot een denial-of-service via HTTP.","Guid":"NCSC-2026-0125 [1.00]","PubDate":"2026-04-22T14:46:17+02:00","AdvisoryID":"NCSC-2026-0125","Versie":"1.00","Kans":"M","Schade":"H"},{"Title":"NCSC-2026-0124 [1.00] [M/H] Kwetsbaarheden verholpen in Oracle Identity Manager Connector","Link":"https://advisories.ncsc.nl/advisory?id=NCSC-2026-0124","Description":"Oracle heeft meerdere kwetsbaarheden verholpen in Oracle Identity Manager Connector versie 12.2.1.4.0. De kwetsbaarheden in Oracle Identity Manager Connector 12.2.1.4.0 stellen een aanvaller zonder authenticatie in staat om via netwerktoegang over HTTPS of HTTP ongeautoriseerde acties uit te voeren, zoals het cre\u00EBren, verwijderen of wijzigen van kritieke data. Daarnaast kan een aanvaller een denial-of-service veroorzaken door de service te laten crashen of hangen. Ook is er een kwetsbaarheid waarbij een aanvaller met lage privileges via LDAP toegang kan krijgen om kritieke data te lezen, wijzigen of verwijderen. ","Guid":"NCSC-2026-0124 [1.00]","PubDate":"2026-04-22T13:33:45+02:00","AdvisoryID":"NCSC-2026-0124","Versie":"1.00","Kans":"M","Schade":"H"},{"Title":"NCSC-2026-0123 [1.00] [M/H] Kwetsbaarheid verholpen in ASP.NET Core van Microsoft","Link":"https://advisories.ncsc.nl/advisory?id=NCSC-2026-0123","Description":"Microsoft heeft een kwetsbaarheid verholpen in ASP.NET Core. De kwetsbaarheid ontstaat door onjuiste verificatie van cryptografische handtekeningen binnen ASP.NET Core. Hierdoor kan een onbevoegde aanvaller binnen een netwerk privileges verhogen door beveiligingscontroles te omzeilen en ongeautoriseerde toegang met verhoogde rechten te verkrijgen.","Guid":"NCSC-2026-0123 [1.00]","PubDate":"2026-04-22T11:40:27+02:00","AdvisoryID":"NCSC-2026-0123","Versie":"1.00","Kans":"M","Schade":"H"},{"Title":"NCSC-2026-0122 [1.00] [M/H] Kwetsbaarheid verholpen in Cisco Webex Services","Link":"https://advisories.ncsc.nl/advisory?id=NCSC-2026-0122","Description":"Cisco heeft een kwetsbaarheid verholpen in Cisco Webex Services, specifiek in de SSO-integratie met Control Hub. De kwetsbaarheid bevindt zich in de onjuiste validatie van certificaten binnen de SSO-integratie van Cisco Webex Services via Control Hub. Een niet-geauthenticeerde externe aanvaller kan deze kwetsbaarheid misbruiken om zich voor te doen als elke gebruiker binnen het systeem. Dit kan leiden tot ongeautoriseerde toegang tot gebruikersaccounts en gevoelige informatie.","Guid":"NCSC-2026-0122 [1.00]","PubDate":"2026-04-17T10:37:31+02:00","AdvisoryID":"NCSC-2026-0122","Versie":"1.00","Kans":"M","Schade":"H"},{"Title":"NCSC-2026-0121 [1.00] [M/H] Kwetsbaarheden verholpen in Fortinet FortiSandbox","Link":"https://advisories.ncsc.nl/advisory?id=NCSC-2026-0121","Description":"Fortinet heeft meerdere kwetsbaarheden verholpen in FortiSandbox, waaronder in on-premises versies en FortiSandbox Cloud, waarvan twee door Fortinet als kritiek zijn beoordeeld. Een kwaadwillende kan de kwetsbaarheden met kenmerk CVE-2026-39813 en CVE-2026-39808 misbruiken doordat in FortiSandbox sprake is van OS command injection en een path traversal-kwetsbaarheid in de JRPC API. Hierdoor kan een niet-geauthenticeerde aanvaller via gemanipuleerde HTTP-verzoeken ongeautoriseerde code of commando\u2019s uitvoeren en authenticatie omzeilen.\n\nDe overige kwetsbaarheden omvatten een path traversal-kwetsbaarheid waardoor een geprivilegieerde super-admin met CLI-toegang via HTTP-verzoeken mappen kan verwijderen, en meerdere cross-site scripting kwetsbaarheden (reflected en stored) waardoor via gemanipuleerde HTTP-verzoeken XSS-aanvallen kunnen worden uitgevoerd.","Guid":"NCSC-2026-0121 [1.00]","PubDate":"2026-04-15T14:23:16+02:00","AdvisoryID":"NCSC-2026-0121","Versie":"1.00","Kans":"M","Schade":"H"},{"Title":"NCSC-2026-0120 [1.00] [M/H] Kwetsbaarheden verholpen in Fortinet FortiAnalyzer en FortiManager","Link":"https://advisories.ncsc.nl/advisory?id=NCSC-2026-0120","Description":"Fortinet heeft kwetsbaarheden verholpen in FortiAnalyzer, FortiAnalyzer Cloud, FortiManager en FortiManager Cloud. Een kwaadwillende kan de kwetsbaarheden misbruiken doordat in FortiAnalyzer, FortiAnalyzer Cloud, FortiManager en FortiManager Cloud sprake is van SQL-injection, path traversal en een heap-based buffer overflow, waardoor respectievelijk geautoriseerde aanvallers code kunnen uitvoeren of bestanden kunnen verwijderen en een niet-geauthenticeerde aanvaller op afstand code kan uitvoeren. Deze kwetsbaarheden treffen zowel on-premises als cloud-gebaseerde versies van de genoemde Fortinet producten.","Guid":"NCSC-2026-0120 [1.00]","PubDate":"2026-04-15T14:20:38+02:00","AdvisoryID":"NCSC-2026-0120","Versie":"1.00","Kans":"M","Schade":"H"},{"Title":"NCSC-2026-0115 [1.01] [H/H] Kwetsbaarheid verholpen in Microsoft Defender","Link":"https://advisories.ncsc.nl/advisory?id=NCSC-2026-0115","Description":"Microsoft heeft een kwetsbaarheid verholpen in System Center. Een kwaadwillende kan de kwetsbaarheid misbruiken doordat Windows Defender onvoldoende gedetailleerde toegangscontrole toepast, waardoor een geautoriseerde aanvaller lokaal zijn rechten kan verhogen.\n\n**UPDATE **  \n\nIndien Microsoft Defender zichzelf in jouw IT-omgeving automatisch bijwerkt, controleer dan of de desbetreffende beveiligingsupdates zijn ge\u00EFnstalleerd.\n\nEr is publieke Proof-of-Concept-code (PoC) verschenen die de kwetsbaarheid met kenmerk CVE-2026-33825 aantoont en mogelijk misbruikt. De kans op misbruik neemt hierdoor toe.","Guid":"NCSC-2026-0115 [1.01]","PubDate":"2026-04-15T10:54:16+02:00","AdvisoryID":"NCSC-2026-0115","Versie":"1.01","Kans":"H","Schade":"H"},{"Title":"NCSC-2026-0119 [1.00] [M/H] Kwetsbaarheden verholpen in Microsoft Windows","Link":"https://advisories.ncsc.nl/advisory?id=NCSC-2026-0119","Description":"Microsoft heeft kwetsbaarheden verholpen in Windows. Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00EBn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- Toegang tot gevoelige gegevens\n- Uitvoeren van willekeurige code (gebruikersrechten)\n- Verkrijgen van verhoogde rechten\n- Omzeilen van een beveiligingsmaatregel\n- Spoofing\n\n\u0060\u0060\u0060\nFunction Discovery Service (fdwsd.dll): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-32087 | 7,00 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-32093 | 7,00 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-32086 | 7,00 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-32150 | 7,00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nApplocker Filter Driver (applockerfltr.sys): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-25184 | 7,00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Kernel: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-26179 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-26180 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-32195 | 7,00 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-32215 | 5,50 | Toegang tot gevoelige gegevens      | \n| CVE-2026-32217 | 5,50 | Toegang tot gevoelige gegevens      | \n| CVE-2026-32218 | 5,50 | Toegang tot gevoelige gegevens      | \n| CVE-2026-26163 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Remote Procedure Call: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-32085 | 5,50 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nWindows Common Log File System Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-32070 | 7,00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nMicrosoft Management Console: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-27914 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Push Notification Core: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-26167 | 8,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-32158 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-32159 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-32160 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-26172 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Installer: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-27910 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows File Explorer: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-32081 | 5,50 | Toegang tot gevoelige gegevens      | \n| CVE-2026-32079 | 5,50 | Toegang tot gevoelige gegevens      | \n| CVE-2026-32084 | 5,50 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nWindows Boot Manager: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-26175 | 4,60 | Omzeilen van beveiligingsmaatregel  | \n|----------------|------|-------------------------------------|\n\nWindows Boot Loader: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-0390  | 6,70 | Omzeilen van beveiligingsmaatregel  | \n|----------------|------|-------------------------------------|\n\nWindows User Interface Core: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-32165 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-27911 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-32163 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-32164 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nMicrosoft Windows Speech: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-32153 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows USB Print Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-32223 | 6,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows COM: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-20806 | 5,50 | Toegang tot gevoelige gegevens      | \n| CVE-2026-32162 | 8,40 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nInput-Output Memory Management Unit (IOMMU): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2023-20585 | 5,30 | \u003CVertaal: Tampering\u003E                | \n|----------------|------|-------------------------------------|\n\nUniversal Plug and Play (upnp.dll): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-32212 | 5,50 | Toegang tot gevoelige gegevens      | \n| CVE-2026-32214 | 5,50 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nWindows Redirected Drive Buffering: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-32216 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Virtualization-Based Security (VBS) Enclave: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-23670 | 5,70 | Omzeilen van beveiligingsmaatregel  | \n| CVE-2026-32220 | 4,40 | Omzeilen van beveiligingsmaatregel  | \n|----------------|------|-------------------------------------|\n\nWindows Active Directory: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-33826 | 8,00 | Uitvoeren van willekeurige code     | \n| CVE-2026-32072 | 6,20 | Voordoen als andere gebruiker       | \n|----------------|------|-------------------------------------|\n\nWindows Shell: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-26165 | 7,00 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-26166 | 7,00 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-27918 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-32202 | 4,30 | Voordoen als andere gebruiker       | \n| CVE-2026-32151 | 6,50 | Toegang tot gevoelige gegevens      | \n| CVE-2026-32225 | 8,80 | Omzeilen van beveiligingsmaatregel  | \n|----------------|------|-------------------------------------|\n\nWindows Server Update Service: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-26154 | 7,50 | \u003CVertaal: Tampering\u003E                | \n| CVE-2026-26174 | 7,00 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-32224 | 7,00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows TCP/IP: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-27921 | 7,00 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-33827 | 8,10 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nWindows Kernel Memory: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-26169 | 6,10 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nWindows BitLocker: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-27913 | 7,70 | Omzeilen van beveiligingsmaatregel  | \n|----------------|------|-------------------------------------|\n\nWindows GDI: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-27931 | 5,50 | Toegang tot gevoelige gegevens      | \n| CVE-2026-27930 | 5,50 | Toegang tot gevoelige gegevens      | \n|----------------|------|-------------------------------------|\n\nWindows Kerberos: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-27912 | 8,00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows RPC API: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-26183 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Ancillary Function Driver for WinSock: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-32073 | 7,00 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-26168 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-26173 | 7,00 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-26177 | 7,00 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-26182 | 7,00 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-27922 | 7,00 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-33099 | 7,00 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-33100 | 7,00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop Licensing Service: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-26160 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-26159 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Snipping Tool: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-32183 | 7,80 | Uitvoeren van willekeurige code     | \n| CVE-2026-33829 | 4,30 | Voordoen als andere gebruiker       | \n|----------------|------|-------------------------------------|\n\nWindows Local Security Authority Subsystem Service (LSASS): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-26155 | 6,50 | Toegang tot gevoelige gegevens      | \n| CVE-2026-32071 | 7,50 | Denial-of-Service                   | \n|----------------|------|-------------------------------------|\n\nWindows Cryptographic Services: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-26152 | 7,00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows WFP NDIS Lightweight Filter Driver (wfplwfs.sys): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-27917 | 7,00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Print Spooler Components: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-33101 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Projected File System: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-27927 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-26184 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-32069 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-32074 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-32078 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows LUAFV: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-27929 | 7,00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Universal Plug and Play (UPnP) Device Host: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-27915 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-27919 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-32075 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-32156 | 8,40 | Uitvoeren van willekeurige code     | \n| CVE-2026-27916 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-27920 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-27925 | 7,50 | Toegang tot gevoelige gegevens      | \n| CVE-2026-32077 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - GRFX: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-33104 | 7,00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Hello: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-27906 | 4,40 | Omzeilen van beveiligingsmaatregel  | \n| CVE-2026-27928 | 7,70 | Omzeilen van beveiligingsmaatregel  | \n|----------------|------|-------------------------------------|\n\nWindows Cloud Files Mini Filter Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-27926 | 7,00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Admin Center: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-32196 | 6,10 | Voordoen als andere gebruiker       | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - ICOMP: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-32222 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nRemote Desktop Client: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-32157 | 8,80 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nWindows WalletService: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-32080 | 7,00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nMicrosoft Windows Search Component: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-27909 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nDesktop Window Manager: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-27924 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-32152 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-32154 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-27923 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-32155 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows HTTP.sys: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-33096 | 7,50 | Denial-of-Service                   | \n|----------------|------|-------------------------------------|\n\nWindows Secure Boot: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-25250 | 6,00 | Omzeilen van beveiligingsmaatregel, | \n|----------------|------|-------------------------------------|\n\nMicrosoft PowerShell: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-26170 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nMicrosoft Windows: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-32181 | 5,50 | Denial-of-Service                   | \n|----------------|------|-------------------------------------|\n\nWindows SSDP Service: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-32082 | 7,00 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-32083 | 7,00 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-32068 | 7,00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Client Side Caching driver (csc.sys): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-26176 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Sensor Data Service: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-26161 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Encrypting File System (EFS): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-26153 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows TDI Translation Driver (tdx.sys): \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-27908 | 7,00 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Storage Spaces Controller: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-27907 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-32076 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nMicrosoft Brokering File System: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-26181 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-32219 | 7,00 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-32091 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows IKE Extension: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-33824 | 9,80 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nWindows Biometric Service: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-32088 | 6,10 | Omzeilen van beveiligingsmaatregel  | \n|----------------|------|-------------------------------------|\n\nWindows Advanced Rasterization Platform: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-26178 | 8,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows OLE: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-26162 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Recovery Environment Agent: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-20928 | 4,60 | Omzeilen van beveiligingsmaatregel  | \n|----------------|------|-------------------------------------|\n\nWindows Speech Brokered Api: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-32089 | 7,80 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-32090 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Container Isolation FS Filter Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-33098 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nWindows Management Services: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-20930 | 7,80 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\nRole: Windows Hyper-V: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-26156 | 7,80 | Uitvoeren van willekeurige code     | \n| CVE-2026-32149 | 7,30 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-26151 | 7,10 | Voordoen als andere gebruiker       | \n|----------------|------|-------------------------------------|\n\nMicrosoft Graphics Component: \n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-32221 | 8,40 | Uitvoeren van willekeurige code     | \n|----------------|------|-------------------------------------|\n\n\u0060\u0060\u0060\n","Guid":"NCSC-2026-0119 [1.00]","PubDate":"2026-04-15T10:53:38+02:00","AdvisoryID":"NCSC-2026-0119","Versie":"1.00","Kans":"M","Schade":"H"},{"Title":"NCSC-2026-0118 [1.00] [M/H] Kwetsbaarheden verholpen in Microsoft SQL Server","Link":"https://advisories.ncsc.nl/advisory?id=NCSC-2026-0118","Description":"Microsoft heeft kwetsbaarheden verholpen in SQL Server. Een kwaadwillende kan de kwetsbaarheden misbruiken doordat SQL Server invoer onvoldoende neutraliseert en onveilig niet-vertrouwde pointers dereferent. Hierdoor kan een geautoriseerde aanvaller lokaal rechten verhogen of op afstand via het netwerk code uitvoeren.\n\n\u0060\u0060\u0060\n|----------------|------|-------------------------------------|\n| CVE-ID         | CVSS | Impact                              |\n|----------------|------|-------------------------------------|\n| CVE-2026-32167 | 6,70 | Verkrijgen van verhoogde rechten    | \n| CVE-2026-33120 | 8,80 | Uitvoeren van willekeurige code     | \n| CVE-2026-32176 | 6,70 | Verkrijgen van verhoogde rechten    | \n|----------------|------|-------------------------------------|\n\n\u0060\u0060\u0060","Guid":"NCSC-2026-0118 [1.00]","PubDate":"2026-04-14T21:24:22+02:00","AdvisoryID":"NCSC-2026-0118","Versie":"1.00","Kans":"M","Schade":"H"}],"CveAlerts":[{"CvssScore":"0.0","CveId":"CVE-2026-8401","Description":"Affected products:\nFirefox\n\nDescription:\nSandbox escape in the Profile Backup component. This vulnerability was fixed in Firefox 150.0.3.","Link":"https://bugzilla.mozilla.org/show_bug.cgi?id=2038679","Title":"CVE-2026-8401 [0.0] Sandbox escape in the Profile Backup component. This vulnerability was fixed in Firefox 150.0.3."},{"CvssScore":"0.0","CveId":"CVE-2026-8391","Description":"Affected products:\nFirefox\n\nDescription:\nOther issue in the JavaScript Engine component. This vulnerability was fixed in Firefox 150.0.3.","Link":"https://bugzilla.mozilla.org/show_bug.cgi?id=2038575","Title":"CVE-2026-8391 [0.0] Other issue in the JavaScript Engine component. This vulnerability was fixed in Firefox 150.0.3."},{"CvssScore":"0.0","CveId":"CVE-2026-8390","Description":"Affected products:\nFirefox\n\nDescription:\nUse-after-free in the JavaScript: WebAssembly component. This vulnerability was fixed in Firefox 150.0.3.","Link":"https://bugzilla.mozilla.org/show_bug.cgi?id=2038081","Title":"CVE-2026-8390 [0.0] Use-after-free in the JavaScript: WebAssembly component. This vulnerability was fixed in Firefox 150.0.3."},{"CvssScore":"0.0","CveId":"CVE-2026-8389","Description":"Affected products:\nFirefox\n\nDescription:\nJIT miscompilation in the JavaScript Engine: JIT component. This vulnerability was fixed in Firefox 150.0.3.","Link":"https://bugzilla.mozilla.org/show_bug.cgi?id=2036983","Title":"CVE-2026-8389 [0.0] JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability was fixed in Firefox 150.0.3."},{"CvssScore":"0.0","CveId":"CVE-2026-8388","Description":"Affected products:\nFirefox\n\nDescription:\nIncorrect boundary conditions in the JavaScript Engine: JIT component. This vulnerability was fixed in Firefox 150.0.3.","Link":"https://bugzilla.mozilla.org/show_bug.cgi?id=2036978","Title":"CVE-2026-8388 [0.0] Incorrect boundary conditions in the JavaScript Engine: JIT component. This vulnerability was fixed in Firefox 150.0.3."},{"CvssScore":"0.0","CveId":"CVE-2026-45393","Description":"Affected products:\nCribl Edge\n\nDescription:\nReserved. Details will be published at disclosure.","Link":"https://docs.cribl.io/edge/release-notes/release-v4171#security-fixes","Title":"CVE-2026-45393 [0.0] Reserved. Details will be published at disclosure."},{"CvssScore":"0.0","CveId":"CVE-2026-45391","Description":"Affected products:\nCribl Edge\n\nDescription:\nReserved. Details will be published at disclosure.","Link":"https://docs.cribl.io/edge/release-notes/release-v4171#security-fixes","Title":"CVE-2026-45391 [0.0] Reserved. Details will be published at disclosure."},{"CvssScore":"0.0","CveId":"CVE-2026-44412","Description":"Affected products:\nSolid Edge SE2026\n\nDescription:\nA vulnerability has been identified in Solid Edge SE2026 (All versions \u003C V226.0 Update 5). The affected applications contain a stack based overflow vulnerability while parsing specially crafted PAR files.\r\nThis could allow an attacker to execute code in the context of the current process.","Link":"https://cert-portal.siemens.com/productcert/html/ssa-921111.html","Title":"CVE-2026-44412 [0.0] A vulnerability has been identified in Solid Edge SE2026 (All versions \u003C V226.0 Update 5). The affected applications contain a stack based overflow vulnerability while parsing spe"},{"CvssScore":"0.0","CveId":"CVE-2026-44411","Description":"Affected products:\nSolid Edge SE2026\n\nDescription:\nA vulnerability has been identified in Solid Edge SE2026 (All versions \u003C V226.0 Update 5). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process.","Link":"https://cert-portal.siemens.com/productcert/html/ssa-921111.html","Title":"CVE-2026-44411 [0.0] A vulnerability has been identified in Solid Edge SE2026 (All versions \u003C V226.0 Update 5). The affected application is vulnerable to uninitialized pointer access while parsing spe"},{"CvssScore":"LOW 2.1","CveId":"CVE-2026-44278","Description":"Affected products:\nFortiClientWindows\n\nDescription:\nA use of hard-coded cryptographic key vulnerability in Fortinet FortiClientWindows 7.4.0 through 7.4.2, FortiClientWindows 7.2 all versions may allow attacker to information disclosure via \u003Cinsert attack vector here\u003E","Link":"https://fortiguard.fortinet.com/psirt/FG-IR-26-129","Title":"CVE-2026-44278 [LOW 2.1] A use of hard-coded cryptographic key vulnerability in Fortinet FortiClientWindows 7.4.0 through 7.4.2, FortiClientWindows 7.2 all versions may allow attacker to information d"},{"CvssScore":"0.0","CveId":"CVE-2026-44015","Description":"Affected products:\nnginx-ui\n\nDescription:\nNginx UI is a web user interface for the Nginx web server. In 2.3.4 and earlier, an authenticated user can perform Server-Side Request Forgery (SSRF) by creating a cluster node pointing to an arbitrary internal URL and then sending API requests with the X-Node-ID header. The Proxy middleware forwards these requests to the attacker-specified internal address, bypassing network segmentation and enabling access to services bound to localhost or internal networks.","Link":"https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-wr32-99hh-6f35","Title":"CVE-2026-44015 [0.0] Nginx UI is a web user interface for the Nginx web server. In 2.3.4 and earlier, an authenticated user can perform Server-Side Request Forgery (SSRF) by creating a cluster node po"},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-42896","Description":"Affected products:\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nInteger overflow or wraparound in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42896","Title":"CVE-2026-42896 [HIGH 7.8] Integer overflow or wraparound in Windows DWM Core Library allows an authorized attacker to elevate privileges locally."},{"CvssScore":"MEDIUM 6.5","CveId":"CVE-2026-42891","Description":"Affected products:\nMicrosoft Edge for Android\n\nDescription:\nUser interface (ui) misrepresentation of critical information in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42891","Title":"CVE-2026-42891 [MEDIUM 6.5] User interface (ui) misrepresentation of critical information in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network."},{"CvssScore":"MEDIUM 5.4","CveId":"CVE-2026-42838","Description":"Affected products:\nMicrosoft Edge (Chromium-based)\n\nDescription:\nImproper neutralization of special elements in output used by a downstream component (\u0027injection\u0027) in Microsoft Edge (Chromium-based) allows an unauthorized attacker to elevate privileges over a network.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42838","Title":"CVE-2026-42838 [MEDIUM 5.4] Improper neutralization of special elements in output used by a downstream component (\u0027injection\u0027) in Microsoft Edge (Chromium-based) allows an unauthorized attacker to ele"},{"CvssScore":"HIGH 7.0","CveId":"CVE-2026-42825","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nUse after free in Windows Telephony Service allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42825","Title":"CVE-2026-42825 [HIGH 7.0] Use after free in Windows Telephony Service allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 8.8","CveId":"CVE-2026-41613","Description":"Affected products:\nVisual Studio Code\n\nDescription:\nSession fixation in Visual Studio Code allows an unauthorized attacker to elevate privileges over a network.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41613","Title":"CVE-2026-41613 [HIGH 8.8] Session fixation in Visual Studio Code allows an unauthorized attacker to elevate privileges over a network."},{"CvssScore":"MEDIUM 5.5","CveId":"CVE-2026-41612","Description":"Affected products:\nVisual Studio Code - Live Preview extension\n\nDescription:\nRelative path traversal in Visual Studio Code allows an unauthorized attacker to disclose information locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41612","Title":"CVE-2026-41612 [MEDIUM 5.5] Relative path traversal in Visual Studio Code allows an unauthorized attacker to disclose information locally."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-41611","Description":"Affected products:\nVisual Studio Code\n\nDescription:\nImproper neutralization of script-related html tags in a web page (basic xss) in Visual Studio Code allows an unauthorized attacker to execute code locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41611","Title":"CVE-2026-41611 [HIGH 7.8] Improper neutralization of script-related html tags in a web page (basic xss) in Visual Studio Code allows an unauthorized attacker to execute code locally."},{"CvssScore":"MEDIUM 6.3","CveId":"CVE-2026-41610","Description":"Affected products:\nVisual Studio Code\n\nDescription:\nImproper neutralization of input during web page generation (\u0027cross-site scripting\u0027) in Visual Studio Code allows an unauthorized attacker to bypass a security feature locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41610","Title":"CVE-2026-41610 [MEDIUM 6.3] Improper neutralization of input during web page generation (\u0027cross-site scripting\u0027) in Visual Studio Code allows an unauthorized attacker to bypass a security feature loca"},{"CvssScore":"HIGH 8.8","CveId":"CVE-2026-41109","Description":"Affected products:\nVisual Studio Code\n\nDescription:\nImproper neutralization of special elements in output used by a downstream component (\u0027injection\u0027) in GitHub Copilot and Visual Studio allows an unauthorized attacker to bypass a security feature over a network.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41109","Title":"CVE-2026-41109 [HIGH 8.8] Improper neutralization of special elements in output used by a downstream component (\u0027injection\u0027) in GitHub Copilot and Visual Studio allows an unauthorized attacker to bypa"},{"CvssScore":"HIGH 7.4","CveId":"CVE-2026-41107","Description":"Affected products:\nMicrosoft Edge (Chromium-based)\n\nDescription:\nExternal control of file name or path in Microsoft Edge (Chromium-based) allows an unauthorized attacker to disclose information over a network.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41107","Title":"CVE-2026-41107 [HIGH 7.4] External control of file name or path in Microsoft Edge (Chromium-based) allows an unauthorized attacker to disclose information over a network."},{"CvssScore":"MEDIUM 6.7","CveId":"CVE-2026-41097","Description":"Affected products:\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nReliance on a component that is not updateable in Windows Secure Boot allows an authorized attacker to bypass a security feature locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41097","Title":"CVE-2026-41097 [MEDIUM 6.7] Reliance on a component that is not updateable in Windows Secure Boot allows an authorized attacker to bypass a security feature locally."},{"CvssScore":"CRITICAL 9.8","CveId":"CVE-2026-41096","Description":"Affected products:\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nHeap-based buffer overflow in Microsoft Windows DNS allows an unauthorized attacker to execute code over a network.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41096","Title":"CVE-2026-41096 [CRITICAL 9.8] Heap-based buffer overflow in Microsoft Windows DNS allows an unauthorized attacker to execute code over a network."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-41095","Description":"Affected products:\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nUse after free in Data Deduplication allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41095","Title":"CVE-2026-41095 [HIGH 7.8] Use after free in Data Deduplication allows an authorized attacker to elevate privileges locally."},{"CvssScore":"CRITICAL 9.8","CveId":"CVE-2026-41089","Description":"Affected products:\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nStack-based buffer overflow in Windows Netlogon allows an unauthorized attacker to execute code over a network.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41089","Title":"CVE-2026-41089 [CRITICAL 9.8] Stack-based buffer overflow in Windows Netlogon allows an unauthorized attacker to execute code over a network."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-41088","Description":"Affected products:\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nExternal control of file name or path in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41088","Title":"CVE-2026-41088 [HIGH 7.8] External control of file name or path in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 8.8","CveId":"CVE-2026-41086","Description":"Affected products:\nWindows Admin Center in Azure Portal\n\nDescription:\nImproper access control in Windows Admin Center allows an authorized attacker to elevate privileges over a network.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41086","Title":"CVE-2026-41086 [HIGH 8.8] Improper access control in Windows Admin Center allows an authorized attacker to elevate privileges over a network."},{"CvssScore":"MEDIUM 4.3","CveId":"CVE-2026-40416","Description":"Affected products:\nMicrosoft Edge (Chromium-based)\n\nDescription:\nUser interface (ui) misrepresentation of critical information in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40416","Title":"CVE-2026-40416 [MEDIUM 4.3] User interface (ui) misrepresentation of critical information in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network."},{"CvssScore":"HIGH 8.1","CveId":"CVE-2026-40415","Description":"Affected products:\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nUse after free in Windows TCP/IP allows an unauthorized attacker to execute code over a network.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40415","Title":"CVE-2026-40415 [HIGH 8.1] Use after free in Windows TCP/IP allows an unauthorized attacker to execute code over a network."},{"CvssScore":"HIGH 7.4","CveId":"CVE-2026-40414","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nNull pointer dereference in Windows TCP/IP allows an unauthorized attacker to deny service over an adjacent network.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40414","Title":"CVE-2026-40414 [HIGH 7.4] Null pointer dereference in Windows TCP/IP allows an unauthorized attacker to deny service over an adjacent network."},{"CvssScore":"HIGH 7.4","CveId":"CVE-2026-40413","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nNull pointer dereference in Windows TCP/IP allows an unauthorized attacker to deny service over an adjacent network.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40413","Title":"CVE-2026-40413 [HIGH 7.4] Null pointer dereference in Windows TCP/IP allows an unauthorized attacker to deny service over an adjacent network."},{"CvssScore":"HIGH 7.0","CveId":"CVE-2026-40410","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nUse after free in Windows SMB Client allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40410","Title":"CVE-2026-40410 [HIGH 7.0] Use after free in Windows SMB Client allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-40408","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nUse after free in Windows Kernel-Mode Drivers allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40408","Title":"CVE-2026-40408 [HIGH 7.8] Use after free in Windows Kernel-Mode Drivers allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-40407","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nHeap-based buffer overflow in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40407","Title":"CVE-2026-40407 [HIGH 7.8] Heap-based buffer overflow in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 7.5","CveId":"CVE-2026-40406","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nUse after free in Windows TCP/IP allows an unauthorized attacker to disclose information over a network.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40406","Title":"CVE-2026-40406 [HIGH 7.5] Use after free in Windows TCP/IP allows an unauthorized attacker to disclose information over a network."},{"CvssScore":"HIGH 7.5","CveId":"CVE-2026-40405","Description":"Affected products:\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nNull pointer dereference in Windows TCP/IP allows an unauthorized attacker to deny service over a network.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40405","Title":"CVE-2026-40405 [HIGH 7.5] Null pointer dereference in Windows TCP/IP allows an unauthorized attacker to deny service over a network."},{"CvssScore":"HIGH 8.8","CveId":"CVE-2026-40403","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nHeap-based buffer overflow in Windows Win32K - GRFX allows an authorized attacker to execute code locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40403","Title":"CVE-2026-40403 [HIGH 8.8] Heap-based buffer overflow in Windows Win32K - GRFX allows an authorized attacker to execute code locally."},{"CvssScore":"CRITICAL 9.3","CveId":"CVE-2026-40402","Description":"Affected products:\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows Server 2022\n\nDescription:\nUse after free in Windows Hyper-V allows an unauthorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40402","Title":"CVE-2026-40402 [CRITICAL 9.3] Use after free in Windows Hyper-V allows an unauthorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 7.1","CveId":"CVE-2026-40401","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nNull pointer dereference in Windows TCP/IP allows an unauthorized attacker to deny service locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40401","Title":"CVE-2026-40401 [HIGH 7.1] Null pointer dereference in Windows TCP/IP allows an unauthorized attacker to deny service locally."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-40399","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nStack-based buffer overflow in Windows TCP/IP allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40399","Title":"CVE-2026-40399 [HIGH 7.8] Stack-based buffer overflow in Windows TCP/IP allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-40398","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nHeap-based buffer overflow in Windows Remote Desktop allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40398","Title":"CVE-2026-40398 [HIGH 7.8] Heap-based buffer overflow in Windows Remote Desktop allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-40397","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nInteger underflow (wrap or wraparound) in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40397","Title":"CVE-2026-40397 [HIGH 7.8] Integer underflow (wrap or wraparound) in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-40382","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nUse after free in Windows Telephony Service allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40382","Title":"CVE-2026-40382 [HIGH 7.8] Use after free in Windows Telephony Service allows an authorized attacker to elevate privileges locally."},{"CvssScore":"MEDIUM 6.2","CveId":"CVE-2026-40380","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nHeap-based buffer overflow in Volume Manager Extension Driver allows an authorized attacker to execute code with a physical attack.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40380","Title":"CVE-2026-40380 [MEDIUM 6.2] Heap-based buffer overflow in Volume Manager Extension Driver allows an authorized attacker to execute code with a physical attack."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-40377","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nHeap-based buffer overflow in Windows Cryptographic Services allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40377","Title":"CVE-2026-40377 [HIGH 7.8] Heap-based buffer overflow in Windows Cryptographic Services allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-40369","Description":"Affected products:\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nUntrusted pointer dereference in Windows Kernel allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40369","Title":"CVE-2026-40369 [HIGH 7.8] Untrusted pointer dereference in Windows Kernel allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 8.3","CveId":"CVE-2026-35438","Description":"Affected products:\nWindows Admin Center\n\nDescription:\nMissing authorization in Windows Admin Center allows an authorized attacker to elevate privileges over a network.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35438","Title":"CVE-2026-35438 [HIGH 8.3] Missing authorization in Windows Admin Center allows an authorized attacker to elevate privileges over a network."},{"CvssScore":"MEDIUM 4.3","CveId":"CVE-2026-35429","Description":"Affected products:\nMicrosoft Edge for Android\n\nDescription:\nUser interface (ui) misrepresentation of critical information in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35429","Title":"CVE-2026-35429 [MEDIUM 4.3] User interface (ui) misrepresentation of critical information in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network."},{"CvssScore":"HIGH 7.5","CveId":"CVE-2026-35424","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nMissing release of memory after effective lifetime in Windows Internet Key Exchange (IKE) Protocol allows an unauthorized attacker to deny service over a network.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35424","Title":"CVE-2026-35424 [HIGH 7.5] Missing release of memory after effective lifetime in Windows Internet Key Exchange (IKE) Protocol allows an unauthorized attacker to deny service over a network."},{"CvssScore":"MEDIUM 5.4","CveId":"CVE-2026-35423","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nOut-of-bounds read in Telnet Client allows an unauthorized attacker to disclose information over a network.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35423","Title":"CVE-2026-35423 [MEDIUM 5.4] Out-of-bounds read in Telnet Client allows an unauthorized attacker to disclose information over a network."},{"CvssScore":"MEDIUM 6.5","CveId":"CVE-2026-35422","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nAuthentication bypass using an alternate path or channel in Windows TCP/IP allows an authorized attacker to bypass a security feature over a network.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35422","Title":"CVE-2026-35422 [MEDIUM 6.5] Authentication bypass using an alternate path or channel in Windows TCP/IP allows an authorized attacker to bypass a security feature over a network."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-35421","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nHeap-based buffer overflow in Windows GDI allows an unauthorized attacker to execute code locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35421","Title":"CVE-2026-35421 [HIGH 7.8] Heap-based buffer overflow in Windows GDI allows an unauthorized attacker to execute code locally."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-35420","Description":"Affected products:\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nHeap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35420","Title":"CVE-2026-35420 [HIGH 7.8] Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally."},{"CvssScore":"MEDIUM 5.5","CveId":"CVE-2026-35419","Description":"Affected products:\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nOut-of-bounds read in Windows DWM Core Library allows an authorized attacker to disclose information locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35419","Title":"CVE-2026-35419 [MEDIUM 5.5] Out-of-bounds read in Windows DWM Core Library allows an authorized attacker to disclose information locally."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-35418","Description":"Affected products:\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nUse after free in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35418","Title":"CVE-2026-35418 [HIGH 7.8] Use after free in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-35417","Description":"Affected products:\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nAccess of resource using incompatible type (\u0027type confusion\u0027) in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35417","Title":"CVE-2026-35417 [HIGH 7.8] Access of resource using incompatible type (\u0027type confusion\u0027) in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 7.0","CveId":"CVE-2026-35416","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nUse after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35416","Title":"CVE-2026-35416 [HIGH 7.0] Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-35415","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nInteger overflow or wraparound in Windows Storage Spaces Controller allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35415","Title":"CVE-2026-35415 [HIGH 7.8] Integer overflow or wraparound in Windows Storage Spaces Controller allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-34351","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nConcurrent execution using shared resource with improper synchronization (\u0027race condition\u0027) in Windows TCP/IP allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34351","Title":"CVE-2026-34351 [HIGH 7.8] Concurrent execution using shared resource with improper synchronization (\u0027race condition\u0027) in Windows TCP/IP allows an authorized attacker to elevate privileges locally."},{"CvssScore":"MEDIUM 6.5","CveId":"CVE-2026-34350","Description":"Affected products:\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nNull pointer dereference in Windows Storport Miniport Driver allows an unauthorized attacker to deny service over a network.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34350","Title":"CVE-2026-34350 [MEDIUM 6.5] Null pointer dereference in Windows Storport Miniport Driver allows an unauthorized attacker to deny service over a network."},{"CvssScore":"HIGH 7.0","CveId":"CVE-2026-34347","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nUse after free in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34347","Title":"CVE-2026-34347 [HIGH 7.0] Use after free in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 7.0","CveId":"CVE-2026-34345","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nConcurrent execution using shared resource with improper synchronization (\u0027race condition\u0027) in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34345","Title":"CVE-2026-34345 [HIGH 7.0] Concurrent execution using shared resource with improper synchronization (\u0027race condition\u0027) in Windows Ancillary Function Driver for WinSock allows an authorized attacker to "},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-34344","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nAccess of resource using incompatible type (\u0027type confusion\u0027) in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34344","Title":"CVE-2026-34344 [HIGH 7.8] Access of resource using incompatible type (\u0027type confusion\u0027) in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-34343","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nHeap-based buffer overflow in Windows Application Identity (AppID) Subsystem allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34343","Title":"CVE-2026-34343 [HIGH 7.8] Heap-based buffer overflow in Windows Application Identity (AppID) Subsystem allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 7.0","CveId":"CVE-2026-34342","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nConcurrent execution using shared resource with improper synchronization (\u0027race condition\u0027) in Windows Print Spooler Components allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34342","Title":"CVE-2026-34342 [HIGH 7.0] Concurrent execution using shared resource with improper synchronization (\u0027race condition\u0027) in Windows Print Spooler Components allows an authorized attacker to elevate privi"},{"CvssScore":"HIGH 7.0","CveId":"CVE-2026-34341","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nDouble free in Windows Link-Layer Discovery Protocol (LLDP) allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34341","Title":"CVE-2026-34341 [HIGH 7.0] Double free in Windows Link-Layer Discovery Protocol (LLDP) allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 7.0","CveId":"CVE-2026-34340","Description":"Affected products:\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nUse after free in Windows Projected File System allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34340","Title":"CVE-2026-34340 [HIGH 7.0] Use after free in Windows Projected File System allows an authorized attacker to elevate privileges locally."},{"CvssScore":"MEDIUM 5.5","CveId":"CVE-2026-34339","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nNull pointer dereference in Windows LDAP - Lightweight Directory Access Protocol allows an authorized attacker to deny service locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34339","Title":"CVE-2026-34339 [MEDIUM 5.5] Null pointer dereference in Windows LDAP - Lightweight Directory Access Protocol allows an authorized attacker to deny service locally."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-34338","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nUse after free in Windows Telephony Service allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34338","Title":"CVE-2026-34338 [HIGH 7.8] Use after free in Windows Telephony Service allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-34337","Description":"Affected products:\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nUse after free in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34337","Title":"CVE-2026-34337 [HIGH 7.8] Use after free in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-34336","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nBuffer over-read in Windows DWM Core Library allows an authorized attacker to disclose information locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34336","Title":"CVE-2026-34336 [HIGH 7.8] Buffer over-read in Windows DWM Core Library allows an authorized attacker to disclose information locally."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-34334","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nConcurrent execution using shared resource with improper synchronization (\u0027race condition\u0027) in Windows TCP/IP allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34334","Title":"CVE-2026-34334 [HIGH 7.8] Concurrent execution using shared resource with improper synchronization (\u0027race condition\u0027) in Windows TCP/IP allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-34333","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nUse after free in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34333","Title":"CVE-2026-34333 [HIGH 7.8] Use after free in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 8.0","CveId":"CVE-2026-34332","Description":"Affected products:\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nUse after free in Windows Kernel-Mode Drivers allows an authorized attacker to execute code over a network.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34332","Title":"CVE-2026-34332 [HIGH 8.0] Use after free in Windows Kernel-Mode Drivers allows an authorized attacker to execute code over a network."},{"CvssScore":"HIGH 7.0","CveId":"CVE-2026-34331","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nConcurrent execution using shared resource with improper synchronization (\u0027race condition\u0027) in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34331","Title":"CVE-2026-34331 [HIGH 7.0] Concurrent execution using shared resource with improper synchronization (\u0027race condition\u0027) in Windows Win32K - GRFX allows an authorized attacker to elevate privileges local"},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-34330","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nInteger overflow or wraparound in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34330","Title":"CVE-2026-34330 [HIGH 7.8] Integer overflow or wraparound in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 8.8","CveId":"CVE-2026-34329","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nHeap-based buffer overflow in Windows Message Queuing allows an unauthorized attacker to execute code over an adjacent network.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34329","Title":"CVE-2026-34329 [HIGH 8.8] Heap-based buffer overflow in Windows Message Queuing allows an unauthorized attacker to execute code over an adjacent network."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-33841","Description":"Affected products:\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows 11 Version 26H1\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nHeap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33841","Title":"CVE-2026-33841 [HIGH 7.8] Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-33840","Description":"Affected products:\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nUse after free in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33840","Title":"CVE-2026-33840 [HIGH 7.8] Use after free in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 7.0","CveId":"CVE-2026-33839","Description":"Affected products:\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nConcurrent execution using shared resource with improper synchronization (\u0027race condition\u0027) in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33839","Title":"CVE-2026-33839 [HIGH 7.0] Concurrent execution using shared resource with improper synchronization (\u0027race condition\u0027) in Windows Win32K - GRFX allows an authorized attacker to elevate privileges local"},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-33838","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nDouble free in Windows Message Queuing allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33838","Title":"CVE-2026-33838 [HIGH 7.8] Double free in Windows Message Queuing allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-33837","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nHeap-based buffer overflow in Windows TCP/IP allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33837","Title":"CVE-2026-33837 [HIGH 7.8] Heap-based buffer overflow in Windows TCP/IP allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-33835","Description":"Affected products:\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nUse after free in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33835","Title":"CVE-2026-33835 [HIGH 7.8] Use after free in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 7.8","CveId":"CVE-2026-33834","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nImproper access control in Windows Event Logging Service allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33834","Title":"CVE-2026-33834 [HIGH 7.8] Improper access control in Windows Event Logging Service allows an authorized attacker to elevate privileges locally."},{"CvssScore":"MEDIUM 4.4","CveId":"CVE-2026-32209","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nImproper access control in Windows Filtering Platform (WFP) allows an authorized attacker to bypass a security feature locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32209","Title":"CVE-2026-32209 [MEDIUM 4.4] Improper access control in Windows Filtering Platform (WFP) allows an authorized attacker to bypass a security feature locally."},{"CvssScore":"HIGH 7.3","CveId":"CVE-2026-32177","Description":"Affected products:\n.NET 10.0\n.NET 8.0\n.NET 9.0\nMicrosoft .NET Framework 3.5\nMicrosoft .NET Framework 3.5 AND 4.7.2\nMicrosoft .NET Framework 3.5 AND 4.8\nMicrosoft .NET Framework 3.5 AND 4.8.1\nMicrosoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2\nMicrosoft .NET Framework 4.8\nMicrosoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)\nMicrosoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)\nMicrosoft Visual Studio 2022 version 17.12\nMicrosoft Visual Studio 2022 version 17.14\nMicrosoft Visual Studio 2026 version 18.5\n\nDescription:\nHeap-based buffer overflow in .NET allows an unauthorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32177","Title":"CVE-2026-32177 [HIGH 7.3] Heap-based buffer overflow in .NET allows an unauthorized attacker to elevate privileges locally."},{"CvssScore":"MEDIUM 4.3","CveId":"CVE-2026-32175","Description":"Affected products:\n.NET 10.0\n.NET 8.0\n.NET 9.0\nMicrosoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)\nMicrosoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)\nMicrosoft Visual Studio 2022 version 17.12\nMicrosoft Visual Studio 2022 version 17.14\nMicrosoft Visual Studio 2026 version 18.5\n\nDescription:\nA tampering vulnerability exists when .NET Core improperly handles specially crafted files. An attacker who successfully exploited this vulnerability could write arbitrary files and directories to certain locations on a vulnerable system. However, an attacker would have limited control over the destination of the files and directories.\nTo exploit the vulnerability, an attacker must send a specially crafted file to a vulnerable system.\nThe security update fixes the vulnerability by ensuring .NET Core properly handles files.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32175","Title":"CVE-2026-32175 [MEDIUM 4.3] A tampering vulnerability exists when .NET Core improperly handles specially crafted files. An attacker who successfully exploited this vulnerability could write arbitrary "},{"CvssScore":"MEDIUM 6.7","CveId":"CVE-2026-32170","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nDouble free in Windows Rich Text Edit Control allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32170","Title":"CVE-2026-32170 [MEDIUM 6.7] Double free in Windows Rich Text Edit Control allows an authorized attacker to elevate privileges locally."},{"CvssScore":"HIGH 7.5","CveId":"CVE-2026-32161","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nConcurrent execution using shared resource with improper synchronization (\u0027race condition\u0027) in Windows Native WiFi Miniport Driver allows an unauthorized attacker to execute code over an adjacent network.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32161","Title":"CVE-2026-32161 [HIGH 7.5] Concurrent execution using shared resource with improper synchronization (\u0027race condition\u0027) in Windows Native WiFi Miniport Driver allows an unauthorized attacker to execute "},{"CvssScore":"MEDIUM 6.7","CveId":"CVE-2026-21530","Description":"Affected products:\nWindows 10 Version 1607\nWindows 10 Version 1809\nWindows 10 Version 21H2\nWindows 10 Version 22H2\nWindows 11 version 22H3\nWindows 11 Version 23H2\nWindows 11 Version 24H2\nWindows 11 Version 25H2\nWindows 11 version 26H1\nWindows Server 2012\nWindows Server 2012 (Server Core installation)\nWindows Server 2012 R2\nWindows Server 2012 R2 (Server Core installation)\nWindows Server 2016\nWindows Server 2016 (Server Core installation)\nWindows Server 2019\nWindows Server 2019 (Server Core installation)\nWindows Server 2022\nWindows Server 2022, 23H2 Edition (Server Core installation)\nWindows Server 2025\nWindows Server 2025 (Server Core installation)\n\nDescription:\nDouble free in Windows Rich Text Edit allows an authorized attacker to elevate privileges locally.","Link":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21530","Title":"CVE-2026-21530 [MEDIUM 6.7] Double free in Windows Rich Text Edit allows an authorized attacker to elevate privileges locally."},{"CvssScore":" 0.0","CveId":"CVE-2026-20914","Description":"Affected products:\nIntel(R) QAT software drivers for Windows\n\nDescription:\nNull pointer dereference for some Intel(R) QAT software drivers for Windows before version 2.6.0 within Ring 3: User Applications may allow a denial of service. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable denial of service. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.","Link":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01387.html","Title":"CVE-2026-20914 [ 0.0] Null pointer dereference for some Intel(R) QAT software drivers for Windows before version 2.6.0 within Ring 3: User Applications may allow a denial of service. Unprivileged soft"},{"CvssScore":" 0.0","CveId":"CVE-2026-20905","Description":"Affected products:\nIntel(R) QAT software drivers for Windows\n\nDescription:\nImproper input validation for some Intel(R) QAT software drivers for Windows before version 2.6 within Ring 3: User Applications may allow a denial of service. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable denial of service. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (low), integrity (low) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.","Link":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01387.html","Title":"CVE-2026-20905 [ 0.0] Improper input validation for some Intel(R) QAT software drivers for Windows before version 2.6 within Ring 3: User Applications may allow a denial of service. Unprivileged softw"},{"CvssScore":" 0.0","CveId":"CVE-2026-20881","Description":"Affected products:\nIntel(R) QAT software drivers for Windows\n\nDescription:\nDivide by zero for some Intel(R) QAT software drivers for Windows before version 1.13 within Ring 3: User Applications may allow a denial of service. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable denial of service. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.","Link":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01387.html","Title":"CVE-2026-20881 [ 0.0] Divide by zero for some Intel(R) QAT software drivers for Windows before version 1.13 within Ring 3: User Applications may allow a denial of service. Unprivileged software advers"},{"CvssScore":" 0.0","CveId":"CVE-2026-20793","Description":"Affected products:\nIntel(R) QAT software drivers for Windows\n\nDescription:\nUnchecked return value for some Intel(R) QAT software drivers for Windows before version 1.13 within Ring 3: User Applications may allow a denial of service. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable denial of service. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (low) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.","Link":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01387.html","Title":"CVE-2026-20793 [ 0.0] Unchecked return value for some Intel(R) QAT software drivers for Windows before version 1.13 within Ring 3: User Applications may allow a denial of service. Unprivileged softwar"},{"CvssScore":" 0.0","CveId":"CVE-2026-20782","Description":"Affected products:\nIntel(R) QAT software drivers for Windows\n\nDescription:\nBuffer overflow for some Intel(R) QAT software drivers for Windows before version 1.13 within Ring 3: User Applications may allow a denial of service. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable denial of service. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (low), integrity (low) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.","Link":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01387.html","Title":"CVE-2026-20782 [ 0.0] Buffer overflow for some Intel(R) QAT software drivers for Windows before version 1.13 within Ring 3: User Applications may allow a denial of service. Unprivileged software adver"},{"CvssScore":" 0.0","CveId":"CVE-2026-20771","Description":"Affected products:\nIntel(R) QAT software drivers for Windows\n\nDescription:\nNull pointer dereference for some Intel(R) QAT software drivers for Windows before version 1.13 within Ring 3: User Applications may allow a denial of service. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable denial of service. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (low), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.","Link":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01387.html","Title":"CVE-2026-20771 [ 0.0] Null pointer dereference for some Intel(R) QAT software drivers for Windows before version 1.13 within Ring 3: User Applications may allow a denial of service. Unprivileged softw"},{"CvssScore":" 0.0","CveId":"CVE-2026-20767","Description":"Affected products:\nIntel(R) QAT software drivers for Windows\n\nDescription:\nImproper input validation for some Intel(R) QAT software drivers for Windows before version 1.13 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.","Link":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01387.html","Title":"CVE-2026-20767 [ 0.0] Improper input validation for some Intel(R) QAT software drivers for Windows before version 1.13 within Ring 3: User Applications may allow an escalation of privilege. Unprivileg"},{"CvssScore":" 0.0","CveId":"CVE-2026-20753","Description":"Affected products:\nSlim Bootloader may allow an escalation of privilege. System software adversary with a privileged user combined with a low complexity attack may enable local code execution. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (high), integrity (high) and availability (high) impacts.\n\nDescription:\nInteger overflow in the UEFI firmware for the Slim Bootloader may allow an escalation of privilege. System software adversary with a privileged user combined with a low complexity attack may enable local code execution. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (high), integrity (high) and availability (high) impacts.","Link":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01425.html","Title":"CVE-2026-20753 [ 0.0] Integer overflow in the UEFI firmware for the Slim Bootloader may allow an escalation of privilege. System software adversary with a privileged user combined with a low complexit"},{"CvssScore":" 0.0","CveId":"CVE-2026-20753","Description":"Affected products:\nSlim Bootloader may allow an escalation of privilege. System software adversary with a privileged user combined with a low complexity attack may enable local code execution. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (high), integrity (high) and availability (high) impacts.\n\nDescription:\nInteger overflow in the UEFI firmware for the Slim Bootloader may allow an escalation of privilege. System software adversary with a privileged user combined with a low complexity attack may enable local code execution. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (high), integrity (high) and availability (high) impacts.","Link":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01425.html","Title":"CVE-2026-20753 [ 0.0] Integer overflow in the UEFI firmware for the Slim Bootloader may allow an escalation of privilege. System software adversary with a privileged user combined with a low complexit"},{"CvssScore":" 0.0","CveId":"CVE-2026-20717","Description":"Affected products:\nIntel(R) QAT software drivers for Windows\n\nDescription:\nImproper input validation for some Intel(R) QAT software drivers for Windows before version 1.13 within Ring 3: User Applications may allow a denial of service. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable denial of service. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (low), integrity (low) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.","Link":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01387.html","Title":"CVE-2026-20717 [ 0.0] Improper input validation for some Intel(R) QAT software drivers for Windows before version 1.13 within Ring 3: User Applications may allow a denial of service. Unprivileged soft"},{"CvssScore":" 0.0","CveId":"CVE-2026-20714","Description":"Affected products:\nIntel(R) QAT software drivers for Windows\n\nDescription:\nOut-of-bounds write for some Intel(R) QAT software drivers for Windows before version 1.13 within Ring 3: User Applications may allow a escalation of privilege. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.","Link":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01387.html","Title":"CVE-2026-20714 [ 0.0] Out-of-bounds write for some Intel(R) QAT software drivers for Windows before version 1.13 within Ring 3: User Applications may allow a escalation of privilege. Unprivileged soft"},{"CvssScore":" 0.0","CveId":"CVE-2025-36510","Description":"Affected products:\nDisplay Virtualization for Windows OS driver software\n\nDescription:\nImproper buffer restrictions for some Display Virtualization for Windows OS driver software within Ring 2: Device Drivers may allow a denial of service. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable denial of service. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.","Link":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01430.html","Title":"CVE-2025-36510 [ 0.0] Improper buffer restrictions for some Display Virtualization for Windows OS driver software within Ring 2: Device Drivers may allow a denial of service. Unprivileged software adv"}],"Timestamp":"2026-05-13T01:44:02.9139271+02:00","Youless":true,"Zabbix":true}