Windows 11 26h1

35 CVEs product

Monthly

CVE-2026-25190 HIGH This Week

Untrusted search path in Windows GDI allows an unauthorized attacker to execute code locally. [CVSS 7.8 HIGH]

Authentication Bypass Microsoft Windows Server 2022 23h2 Windows Server 2022 Windows 11 26h1 +12
NVD VulDB
CVSS 3.1
7.8
EPSS
0.1%
CVE-2026-25188 HIGH This Week

Privilege escalation in Windows Telephony Service through heap buffer overflow affects Windows 10 1607, Windows 11 25h2, and Windows Server 2012, allowing adjacent network attackers to gain elevated system access without authentication. The vulnerability has a high CVSS score of 8.8 but currently lacks a patch, creating significant risk for exposed systems. Exploitation requires network proximity but no user interaction.

Buffer Overflow Heap Overflow Microsoft Windows 10 1607 Windows 11 25h2 +13
NVD VulDB
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-25187 HIGH This Week

Windows Winlogon's failure to properly validate symbolic links before file access enables local privilege escalation on affected Windows Server and Windows 10/11 systems. An authenticated attacker can exploit this vulnerability to gain elevated system privileges without user interaction. No patch is currently available for this high-severity issue affecting multiple Windows versions including Server 2025 and Windows 11 26h1.

Information Disclosure Windows Server 2025 Windows 10 22h2 Windows 11 26h1 Windows Server 2016 +11
NVD VulDB
CVSS 3.1
7.8
EPSS
0.1%
CVE-2026-25186 MEDIUM This Month

Unauthorized disclosure of sensitive information in Windows Accessibility Infrastructure (ATBroker.exe) affects Windows Server 2019, 2025, Windows 10 22h2, and Windows 11 25h2, allowing local authenticated attackers to read confidential data. The vulnerability requires user privileges and local access but poses no risk to system integrity or availability. No patch is currently available for this issue.

Information Disclosure Microsoft Windows Server 2019 Windows 10 22h2 Windows Server 2025 +12
NVD VulDB
CVSS 3.1
5.5
EPSS
0.1%
CVE-2026-25185 MEDIUM This Month

Windows Shell Link Processing leaks sensitive information over the network in Windows Server 2012, 2019, and 2022, enabling remote spoofing attacks without authentication or user interaction. An unauthenticated attacker can exploit this information disclosure to conduct spoofing attacks against affected systems. No patch is currently available.

Information Disclosure Microsoft Windows Server 2022 23h2 Windows Server 2012 Windows Server 2022 +12
NVD VulDB
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-25181 HIGH This Week

Information disclosure in Windows GDI+ affects Windows 11 (24h2, 25h2) and Windows Server 2012/2016, allowing unauthenticated attackers to read sensitive data remotely through an out-of-bounds memory access vulnerability. The flaw requires no user interaction and can be exploited over the network to compromise confidentiality without modifying system data or availability. No patch is currently available for this high-severity vulnerability.

Information Disclosure Buffer Overflow Microsoft Windows 11 24h2 Windows Server 2012 +13
NVD VulDB
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-25180 MEDIUM This Month

Microsoft Graphics Component contains an out-of-bounds read vulnerability affecting Windows 10 1607, Windows Server 2019, and 2022, enabling local attackers to read sensitive information from memory. The vulnerability requires user interaction and local access, posing a confidentiality risk without offering a currently available patch. Attack complexity is low, making it a practical concern for systems running affected Office and Windows versions.

Microsoft Information Disclosure Buffer Overflow Office Windows Server 2019 +13
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-25179 HIGH This Week

Windows Ancillary Function Driver for WinSock in Windows Server 2025, 2022, and Windows 10 1809 contains insufficient input validation that allows authenticated local users to escalate privileges. An attacker with local access and valid credentials can exploit this vulnerability to gain elevated system permissions, though no patch is currently available. This HIGH severity vulnerability affects multiple Windows Server and client versions with no active exploit mitigation path.

Information Disclosure Microsoft Windows Server 2025 Windows Server 2022 Windows Server 2022 23h2 +12
NVD VulDB
CVSS 3.1
7.0
EPSS
0.0%
CVE-2026-25178 HIGH This Week

Windows Ancillary Function Driver for WinSock (AFD) in Windows 11 versions 24h2 and 26h1 contains a use-after-free vulnerability (CWE-416) that allows authenticated local attackers to escalate privileges through memory corruption. An attacker with local access could exploit this flaw to gain elevated system permissions, though no official patch is currently available.

Use After Free Microsoft Denial Of Service Memory Corruption Windows 11 26h1 +14
NVD VulDB
CVSS 3.1
7.0
EPSS
0.0%
CVE-2026-25177 HIGH This Week

Privilege escalation in Windows Active Directory Domain Services (AD DS) across Windows 11, Windows 10, and Windows Server platforms allows authenticated network attackers to gain elevated privileges by exploiting improper validation of resource naming restrictions. An attacker with valid domain credentials can leverage this vulnerability to escalate their access level without user interaction. Currently, no patch is available, leaving all affected Windows versions vulnerable.

Information Disclosure Windows 11 23h2 Windows 11 26h1 Windows Server 2025 Windows 10 22h2 +11
NVD VulDB
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-25176 HIGH This Week

Windows Ancillary Function Driver for WinSock in Windows 10 (all versions) and Windows 11 contains an access control weakness that enables authenticated local attackers to escalate privileges to system level. An attacker with standard user credentials can exploit this flaw to gain elevated rights on affected systems. No patch is currently available for this vulnerability.

Authentication Bypass Microsoft Windows 10 22h2 Windows 10 1607 Windows Server 2019 +12
NVD VulDB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-25174 HIGH This Week

Windows Extensible File Allocation (exFAT) contains an out-of-bounds read vulnerability affecting Windows Server 2022, Windows 10 1607, and Windows 11 versions 23h2/25h2, enabling authenticated local users to escalate privileges with high impact on confidentiality, integrity, and availability. The vulnerability requires local access and user-level privileges to exploit, with no patch currently available. This flaw carries a CVSS score of 7.8 and affects multiple supported Windows versions across server and client platforms.

Information Disclosure Buffer Overflow Microsoft Windows Server 2022 Windows 10 1607 +13
NVD VulDB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-25173 HIGH POC This Week

Remote code execution in Windows RRAS affects Windows 10 1607 and Windows Server 2022 23h2 through an integer overflow vulnerability exploitable by authenticated network attackers. Public exploit code exists for this vulnerability, enabling authenticated users to execute arbitrary code with high integrity and confidentiality impact. No patch is currently available, making this a critical exposure for affected Windows environments.

Microsoft Buffer Overflow Heap Overflow Windows Server 2022 23h2 Windows 10 1607 +13
NVD VulDB GitHub
CVSS 3.1
8.0
EPSS
0.1%
CVE-2026-25171 HIGH This Week

Privilege escalation in Windows Authentication Methods (Windows 10 22H2, Windows 11 26H1) stems from a use-after-free memory vulnerability that allows authenticated local attackers to gain elevated system privileges. The flaw requires low user privileges and manual interaction but provides complete system compromise through code execution. No patch is currently available for this high-severity vulnerability.

Use After Free Microsoft Denial Of Service Memory Corruption Windows 10 22h2 +14
NVD VulDB
CVSS 3.1
7.0
EPSS
0.0%
CVE-2026-25170 HIGH This Week

Use after free in Windows Hyper-V allows an authorized attacker to elevate privileges locally. [CVSS 7.0 HIGH]

Use After Free Microsoft Denial Of Service Memory Corruption Windows 11 23h2 +7
NVD VulDB
CVSS 3.1
7.0
EPSS
0.0%
CVE-2026-25169 MEDIUM This Month

A division by zero flaw in the Microsoft Graphics Component on Windows 10 and Windows 11 systems enables local attackers to trigger a denial of service condition without requiring special privileges or user interaction. The vulnerability affects multiple Windows versions including Windows 10 1607, 22h2 and Windows 11 25h2, 26h1, with no patch currently available.

Microsoft Authentication Bypass Windows 10 1607 Windows 11 25h2 Windows 11 26h1 +11
NVD VulDB
CVSS 3.1
6.2
EPSS
0.0%
CVE-2026-25168 MEDIUM This Month

Microsoft Graphics Component on Windows 10 21H2, Windows Server 2016, and Windows 11 25H2 is vulnerable to a null pointer dereference that enables local denial of service attacks. An attacker with local access can trigger the vulnerability without requiring elevated privileges or user interaction to crash the graphics component and render the system unavailable. No patch is currently available for this medium-severity vulnerability.

Microsoft Null Pointer Dereference Denial Of Service Windows 10 21h2 Windows Server 2016 +12
NVD VulDB
CVSS 3.1
6.2
EPSS
0.0%
CVE-2026-25167 HIGH This Week

Privilege escalation in Microsoft's Brokering File System on Windows 11 (24h2 and 25h2) stems from a use-after-free vulnerability that allows local attackers to gain elevated system privileges. An attacker with local access can exploit memory corruption to execute arbitrary code with higher privileges, potentially compromising system integrity. No patch is currently available for this vulnerability.

Microsoft Use After Free Denial Of Service Memory Corruption Windows 11 24h2 +3
NVD VulDB
CVSS 3.1
7.4
EPSS
0.0%
CVE-2026-25166 HIGH This Week

Local code execution in Windows System Image Manager (Windows 11 23h2, Windows Server 2019/2022) through unsafe deserialization of untrusted data. An authenticated local attacker can exploit this vulnerability to execute arbitrary code with elevated privileges. No patch is currently available.

Deserialization Microsoft Windows 11 23h2 Windows Server 2019 Windows Server 2022 23h2 +10
NVD VulDB
CVSS 3.1
7.8
EPSS
0.6%
CVE-2026-25165 HIGH This Week

Privilege escalation in Windows Performance Counters via null pointer dereference affects Windows Server 2019 and Windows 11 systems, enabling authenticated local attackers to gain elevated privileges. The vulnerability impacts systems where users have standard account access, allowing them to escalate to higher privilege levels on affected machines. No patch is currently available.

Null Pointer Dereference Microsoft Denial Of Service Windows Server 2019 Windows 11 26h1 +13
NVD VulDB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-24296 HIGH This Week

Privilege escalation in Windows Device Association Service (Windows 10 versions 1607, 1809, and 21H2) stems from improper synchronization of shared resources, enabling local authenticated users to gain elevated system privileges. The vulnerability requires high attack complexity and no user interaction, making it exploitable by insiders or compromised local accounts. No patch is currently available.

Race Condition Microsoft Information Disclosure Windows Server 2022 23h2 Windows Server 2019 +13
NVD VulDB
CVSS 3.1
7.0
EPSS
0.0%
CVE-2026-24295 HIGH This Week

Privilege escalation in Windows Device Association Service across Windows 10, 11, and Server 2022 stems from improper synchronization of shared resources, enabling local authenticated users to gain elevated system privileges. The vulnerability requires local access and specific timing conditions but poses high risk due to its impact on confidentiality, integrity, and availability. No patch is currently available.

Race Condition Microsoft Information Disclosure Windows Server 2022 23h2 Windows 11 24h2 +12
NVD VulDB
CVSS 3.1
7.0
EPSS
0.0%
CVE-2026-24293 HIGH This Week

Privilege escalation in Windows Ancillary Function Driver for WinSock affects Windows 11 24H2, Windows Server 2022, and Windows Server 2025, allowing authenticated local attackers to gain system-level access through null pointer dereference. The vulnerability requires valid user credentials and local access but no user interaction to exploit. No patch is currently available.

Null Pointer Dereference Microsoft Denial Of Service Windows Server 2022 Windows 11 24h2 +8
NVD VulDB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-24292 HIGH This Week

Privilege escalation in Windows Connected Devices Platform Service (Cdpsvc) exploits a use-after-free memory vulnerability, affecting Windows 10 22h2 and Windows 11 (25h2, 26h1). An authenticated local attacker can leverage this flaw to gain system-level privileges on vulnerable systems. No patch is currently available for this high-severity vulnerability.

Use After Free Denial Of Service Memory Corruption Windows 10 22h2 Windows 11 25h2 +10
NVD VulDB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-24291 HIGH This Week

Privilege escalation in Windows Accessibility Infrastructure (ATBroker.exe) across Windows 10, Windows 11, and Windows Server 2022 stems from improper permission assignments on a critical resource. A local authenticated attacker can exploit this misconfiguration to gain elevated privileges without user interaction. No patch is currently available for this vulnerability.

Information Disclosure Microsoft Windows Server 2022 Windows 11 25h2 Windows 11 23h2 +12
NVD VulDB
CVSS 3.1
7.8
EPSS
0.1%
CVE-2026-24290 HIGH This Week

Windows Projected File System in Windows 11 and Server 2022 contains improper access control that enables authenticated local users to escalate privileges to system level. An attacker with valid credentials can exploit this vulnerability to gain elevated permissions without user interaction. Currently, no patch is available to address this issue.

Microsoft Authentication Bypass Windows 11 24h2 Windows Server 2022 23h2 Windows 11 26h1 +9
NVD VulDB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-24289 HIGH This Week

Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally. [CVSS 7.8 HIGH]

Use After Free Microsoft Denial Of Service Memory Corruption Windows 10 22h2 +14
NVD VulDB
CVSS 3.1
7.8
EPSS
0.1%
CVE-2026-24287 HIGH This Week

Windows Kernel path traversal vulnerability in Server 2025, Server 2022, Windows 11 24h2, and Windows 10 22h2 enables authenticated local attackers to achieve full system compromise through privilege escalation. The flaw allows an authorized user to manipulate file name or path parameters, bypassing access controls and gaining kernel-level privileges. No patch is currently available.

Information Disclosure Microsoft Windows Server 2025 Windows 11 24h2 Windows Server 2022 23h2 +9
NVD VulDB
CVSS 3.1
7.8
EPSS
0.1%
CVE-2026-24283 HIGH This Week

Privilege escalation in Windows 11 (24h2, 26h1) and Windows Server 2022 (23h2) via heap overflow allows authenticated local users to gain system-level access. The vulnerability requires valid credentials but no user interaction, making it a direct path to complete system compromise. No patch is currently available.

Buffer Overflow Heap Overflow Microsoft Windows 11 24h2 Windows 11 26h1 +4
NVD VulDB
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-24282 MEDIUM This Month

Windows Push Message Routing Service contains an out-of-bounds read vulnerability that enables authenticated local users to access sensitive information on affected systems running Windows 10 and Windows 11. The vulnerability requires valid credentials to exploit and poses a confidentiality risk, though no patch is currently available. This affects multiple Windows versions including 21H2, 22H2, and 23H2 releases.

Buffer Overflow Information Disclosure Windows 10 21h2 Windows 10 1607 Windows 11 25h2 +6
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23674 HIGH This Week

Windows MapUrlToZone security bypass in Windows 11 24H2, Windows 10 21H2, and Windows Server 2016/2025 allows unauthenticated remote attackers to circumvent zone-based security restrictions through improper path equivalence resolution. An attacker can exploit this network-accessible vulnerability without user interaction to bypass intended access controls. No patch is currently available for this high-severity vulnerability.

Microsoft Authentication Bypass Windows 11 24h2 Windows 10 21h2 Windows Server 2025 +12
NVD VulDB
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-23673 HIGH This Week

Windows ReFS contains an out-of-bounds read vulnerability affecting Server 2019, 2022, 2025, and Windows 11 26h1 that enables authenticated local users to escalate privileges with high impact to confidentiality, integrity, and availability. The vulnerability requires low attack complexity and no user interaction, making it exploitable by any authenticated user on the system. No patch is currently available for this HIGH severity issue.

Information Disclosure Microsoft Buffer Overflow Windows Server 2019 Windows Server 2025 +13
NVD VulDB
CVSS 3.1
7.8
EPSS
0.1%
CVE-2026-23672 HIGH This Week

Windows Universal Disk Format File System Driver (UDFS) Elevation of Privilege Vulnerability [CVSS 7.8 HIGH]

Information Disclosure Buffer Overflow Microsoft Windows 11 25h2 Windows Server 2019 +13
NVD VulDB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-23671 HIGH This Week

Privilege escalation in the Windows Bluetooth RFCOM Protocol Driver across Windows 11 26h1, Windows Server 2025, and Windows 10 1809 stems from improper synchronization of concurrent access to shared resources. An authenticated local attacker can exploit this race condition to gain elevated privileges on affected systems. No patch is currently available for this vulnerability.

Race Condition Information Disclosure Microsoft Windows 11 26h1 Windows Server 2025 +12
NVD VulDB
CVSS 3.1
7.0
EPSS
0.0%
CVE-2026-23667 HIGH This Week

Use after free in Broadcast DVR allows an authorized attacker to elevate privileges locally. [CVSS 7.0 HIGH]

Use After Free Windows 10 1809 Windows 11 26h1 Windows 11 24h2 Windows 11 25h2 +4
NVD VulDB
CVSS 3.1
7.0
EPSS
0.0%
CVE-2026-25190
EPSS 0% CVSS 7.8
HIGH This Week

Untrusted search path in Windows GDI allows an unauthorized attacker to execute code locally. [CVSS 7.8 HIGH]

Authentication Bypass Microsoft Windows Server 2022 23h2 +14
NVD VulDB
CVE-2026-25188
EPSS 0% CVSS 8.8
HIGH This Week

Privilege escalation in Windows Telephony Service through heap buffer overflow affects Windows 10 1607, Windows 11 25h2, and Windows Server 2012, allowing adjacent network attackers to gain elevated system access without authentication. The vulnerability has a high CVSS score of 8.8 but currently lacks a patch, creating significant risk for exposed systems. Exploitation requires network proximity but no user interaction.

Buffer Overflow Heap Overflow Microsoft +15
NVD VulDB
CVE-2026-25187
EPSS 0% CVSS 7.8
HIGH This Week

Windows Winlogon's failure to properly validate symbolic links before file access enables local privilege escalation on affected Windows Server and Windows 10/11 systems. An authenticated attacker can exploit this vulnerability to gain elevated system privileges without user interaction. No patch is currently available for this high-severity issue affecting multiple Windows versions including Server 2025 and Windows 11 26h1.

Information Disclosure Windows Server 2025 Windows 10 22h2 +13
NVD VulDB
CVE-2026-25186
EPSS 0% CVSS 5.5
MEDIUM This Month

Unauthorized disclosure of sensitive information in Windows Accessibility Infrastructure (ATBroker.exe) affects Windows Server 2019, 2025, Windows 10 22h2, and Windows 11 25h2, allowing local authenticated attackers to read confidential data. The vulnerability requires user privileges and local access but poses no risk to system integrity or availability. No patch is currently available for this issue.

Information Disclosure Microsoft Windows Server 2019 +14
NVD VulDB
CVE-2026-25185
EPSS 0% CVSS 5.3
MEDIUM This Month

Windows Shell Link Processing leaks sensitive information over the network in Windows Server 2012, 2019, and 2022, enabling remote spoofing attacks without authentication or user interaction. An unauthenticated attacker can exploit this information disclosure to conduct spoofing attacks against affected systems. No patch is currently available.

Information Disclosure Microsoft Windows Server 2022 23h2 +14
NVD VulDB
CVE-2026-25181
EPSS 0% CVSS 7.5
HIGH This Week

Information disclosure in Windows GDI+ affects Windows 11 (24h2, 25h2) and Windows Server 2012/2016, allowing unauthenticated attackers to read sensitive data remotely through an out-of-bounds memory access vulnerability. The flaw requires no user interaction and can be exploited over the network to compromise confidentiality without modifying system data or availability. No patch is currently available for this high-severity vulnerability.

Information Disclosure Buffer Overflow Microsoft +15
NVD VulDB
CVE-2026-25180
EPSS 0% CVSS 5.5
MEDIUM This Month

Microsoft Graphics Component contains an out-of-bounds read vulnerability affecting Windows 10 1607, Windows Server 2019, and 2022, enabling local attackers to read sensitive information from memory. The vulnerability requires user interaction and local access, posing a confidentiality risk without offering a currently available patch. Attack complexity is low, making it a practical concern for systems running affected Office and Windows versions.

Microsoft Information Disclosure Buffer Overflow +15
NVD VulDB
CVE-2026-25179
EPSS 0% CVSS 7.0
HIGH This Week

Windows Ancillary Function Driver for WinSock in Windows Server 2025, 2022, and Windows 10 1809 contains insufficient input validation that allows authenticated local users to escalate privileges. An attacker with local access and valid credentials can exploit this vulnerability to gain elevated system permissions, though no patch is currently available. This HIGH severity vulnerability affects multiple Windows Server and client versions with no active exploit mitigation path.

Information Disclosure Microsoft Windows Server 2025 +14
NVD VulDB
CVE-2026-25178
EPSS 0% CVSS 7.0
HIGH This Week

Windows Ancillary Function Driver for WinSock (AFD) in Windows 11 versions 24h2 and 26h1 contains a use-after-free vulnerability (CWE-416) that allows authenticated local attackers to escalate privileges through memory corruption. An attacker with local access could exploit this flaw to gain elevated system permissions, though no official patch is currently available.

Use After Free Microsoft Denial Of Service +16
NVD VulDB
CVE-2026-25177
EPSS 0% CVSS 8.8
HIGH This Week

Privilege escalation in Windows Active Directory Domain Services (AD DS) across Windows 11, Windows 10, and Windows Server platforms allows authenticated network attackers to gain elevated privileges by exploiting improper validation of resource naming restrictions. An attacker with valid domain credentials can leverage this vulnerability to escalate their access level without user interaction. Currently, no patch is available, leaving all affected Windows versions vulnerable.

Information Disclosure Windows 11 23h2 Windows 11 26h1 +13
NVD VulDB
CVE-2026-25176
EPSS 0% CVSS 7.8
HIGH This Week

Windows Ancillary Function Driver for WinSock in Windows 10 (all versions) and Windows 11 contains an access control weakness that enables authenticated local attackers to escalate privileges to system level. An attacker with standard user credentials can exploit this flaw to gain elevated rights on affected systems. No patch is currently available for this vulnerability.

Authentication Bypass Microsoft Windows 10 22h2 +14
NVD VulDB
CVE-2026-25174
EPSS 0% CVSS 7.8
HIGH This Week

Windows Extensible File Allocation (exFAT) contains an out-of-bounds read vulnerability affecting Windows Server 2022, Windows 10 1607, and Windows 11 versions 23h2/25h2, enabling authenticated local users to escalate privileges with high impact on confidentiality, integrity, and availability. The vulnerability requires local access and user-level privileges to exploit, with no patch currently available. This flaw carries a CVSS score of 7.8 and affects multiple supported Windows versions across server and client platforms.

Information Disclosure Buffer Overflow Microsoft +15
NVD VulDB
CVE-2026-25173
EPSS 0% CVSS 8.0
HIGH POC This Week

Remote code execution in Windows RRAS affects Windows 10 1607 and Windows Server 2022 23h2 through an integer overflow vulnerability exploitable by authenticated network attackers. Public exploit code exists for this vulnerability, enabling authenticated users to execute arbitrary code with high integrity and confidentiality impact. No patch is currently available, making this a critical exposure for affected Windows environments.

Microsoft Buffer Overflow Heap Overflow +15
NVD VulDB GitHub
CVE-2026-25171
EPSS 0% CVSS 7.0
HIGH This Week

Privilege escalation in Windows Authentication Methods (Windows 10 22H2, Windows 11 26H1) stems from a use-after-free memory vulnerability that allows authenticated local attackers to gain elevated system privileges. The flaw requires low user privileges and manual interaction but provides complete system compromise through code execution. No patch is currently available for this high-severity vulnerability.

Use After Free Microsoft Denial Of Service +16
NVD VulDB
CVE-2026-25170
EPSS 0% CVSS 7.0
HIGH This Week

Use after free in Windows Hyper-V allows an authorized attacker to elevate privileges locally. [CVSS 7.0 HIGH]

Use After Free Microsoft Denial Of Service +9
NVD VulDB
CVE-2026-25169
EPSS 0% CVSS 6.2
MEDIUM This Month

A division by zero flaw in the Microsoft Graphics Component on Windows 10 and Windows 11 systems enables local attackers to trigger a denial of service condition without requiring special privileges or user interaction. The vulnerability affects multiple Windows versions including Windows 10 1607, 22h2 and Windows 11 25h2, 26h1, with no patch currently available.

Microsoft Authentication Bypass Windows 10 1607 +13
NVD VulDB
CVE-2026-25168
EPSS 0% CVSS 6.2
MEDIUM This Month

Microsoft Graphics Component on Windows 10 21H2, Windows Server 2016, and Windows 11 25H2 is vulnerable to a null pointer dereference that enables local denial of service attacks. An attacker with local access can trigger the vulnerability without requiring elevated privileges or user interaction to crash the graphics component and render the system unavailable. No patch is currently available for this medium-severity vulnerability.

Microsoft Null Pointer Dereference Denial Of Service +14
NVD VulDB
CVE-2026-25167
EPSS 0% CVSS 7.4
HIGH This Week

Privilege escalation in Microsoft's Brokering File System on Windows 11 (24h2 and 25h2) stems from a use-after-free vulnerability that allows local attackers to gain elevated system privileges. An attacker with local access can exploit memory corruption to execute arbitrary code with higher privileges, potentially compromising system integrity. No patch is currently available for this vulnerability.

Microsoft Use After Free Denial Of Service +5
NVD VulDB
CVE-2026-25166
EPSS 1% CVSS 7.8
HIGH This Week

Local code execution in Windows System Image Manager (Windows 11 23h2, Windows Server 2019/2022) through unsafe deserialization of untrusted data. An authenticated local attacker can exploit this vulnerability to execute arbitrary code with elevated privileges. No patch is currently available.

Deserialization Microsoft Windows 11 23h2 +12
NVD VulDB
CVE-2026-25165
EPSS 0% CVSS 7.8
HIGH This Week

Privilege escalation in Windows Performance Counters via null pointer dereference affects Windows Server 2019 and Windows 11 systems, enabling authenticated local attackers to gain elevated privileges. The vulnerability impacts systems where users have standard account access, allowing them to escalate to higher privilege levels on affected machines. No patch is currently available.

Null Pointer Dereference Microsoft Denial Of Service +15
NVD VulDB
CVE-2026-24296
EPSS 0% CVSS 7.0
HIGH This Week

Privilege escalation in Windows Device Association Service (Windows 10 versions 1607, 1809, and 21H2) stems from improper synchronization of shared resources, enabling local authenticated users to gain elevated system privileges. The vulnerability requires high attack complexity and no user interaction, making it exploitable by insiders or compromised local accounts. No patch is currently available.

Race Condition Microsoft Information Disclosure +15
NVD VulDB
CVE-2026-24295
EPSS 0% CVSS 7.0
HIGH This Week

Privilege escalation in Windows Device Association Service across Windows 10, 11, and Server 2022 stems from improper synchronization of shared resources, enabling local authenticated users to gain elevated system privileges. The vulnerability requires local access and specific timing conditions but poses high risk due to its impact on confidentiality, integrity, and availability. No patch is currently available.

Race Condition Microsoft Information Disclosure +14
NVD VulDB
CVE-2026-24293
EPSS 0% CVSS 7.8
HIGH This Week

Privilege escalation in Windows Ancillary Function Driver for WinSock affects Windows 11 24H2, Windows Server 2022, and Windows Server 2025, allowing authenticated local attackers to gain system-level access through null pointer dereference. The vulnerability requires valid user credentials and local access but no user interaction to exploit. No patch is currently available.

Null Pointer Dereference Microsoft Denial Of Service +10
NVD VulDB
CVE-2026-24292
EPSS 0% CVSS 7.8
HIGH This Week

Privilege escalation in Windows Connected Devices Platform Service (Cdpsvc) exploits a use-after-free memory vulnerability, affecting Windows 10 22h2 and Windows 11 (25h2, 26h1). An authenticated local attacker can leverage this flaw to gain system-level privileges on vulnerable systems. No patch is currently available for this high-severity vulnerability.

Use After Free Denial Of Service Memory Corruption +12
NVD VulDB
CVE-2026-24291
EPSS 0% CVSS 7.8
HIGH This Week

Privilege escalation in Windows Accessibility Infrastructure (ATBroker.exe) across Windows 10, Windows 11, and Windows Server 2022 stems from improper permission assignments on a critical resource. A local authenticated attacker can exploit this misconfiguration to gain elevated privileges without user interaction. No patch is currently available for this vulnerability.

Information Disclosure Microsoft Windows Server 2022 +14
NVD VulDB
CVE-2026-24290
EPSS 0% CVSS 7.8
HIGH This Week

Windows Projected File System in Windows 11 and Server 2022 contains improper access control that enables authenticated local users to escalate privileges to system level. An attacker with valid credentials can exploit this vulnerability to gain elevated permissions without user interaction. Currently, no patch is available to address this issue.

Microsoft Authentication Bypass Windows 11 24h2 +11
NVD VulDB
CVE-2026-24289
EPSS 0% CVSS 7.8
HIGH This Week

Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally. [CVSS 7.8 HIGH]

Use After Free Microsoft Denial Of Service +16
NVD VulDB
CVE-2026-24287
EPSS 0% CVSS 7.8
HIGH This Week

Windows Kernel path traversal vulnerability in Server 2025, Server 2022, Windows 11 24h2, and Windows 10 22h2 enables authenticated local attackers to achieve full system compromise through privilege escalation. The flaw allows an authorized user to manipulate file name or path parameters, bypassing access controls and gaining kernel-level privileges. No patch is currently available.

Information Disclosure Microsoft Windows Server 2025 +11
NVD VulDB
CVE-2026-24283
EPSS 0% CVSS 8.8
HIGH This Week

Privilege escalation in Windows 11 (24h2, 26h1) and Windows Server 2022 (23h2) via heap overflow allows authenticated local users to gain system-level access. The vulnerability requires valid credentials but no user interaction, making it a direct path to complete system compromise. No patch is currently available.

Buffer Overflow Heap Overflow Microsoft +6
NVD VulDB
CVE-2026-24282
EPSS 0% CVSS 5.5
MEDIUM This Month

Windows Push Message Routing Service contains an out-of-bounds read vulnerability that enables authenticated local users to access sensitive information on affected systems running Windows 10 and Windows 11. The vulnerability requires valid credentials to exploit and poses a confidentiality risk, though no patch is currently available. This affects multiple Windows versions including 21H2, 22H2, and 23H2 releases.

Buffer Overflow Information Disclosure Windows 10 21h2 +8
NVD VulDB
CVE-2026-23674
EPSS 0% CVSS 7.5
HIGH This Week

Windows MapUrlToZone security bypass in Windows 11 24H2, Windows 10 21H2, and Windows Server 2016/2025 allows unauthenticated remote attackers to circumvent zone-based security restrictions through improper path equivalence resolution. An attacker can exploit this network-accessible vulnerability without user interaction to bypass intended access controls. No patch is currently available for this high-severity vulnerability.

Microsoft Authentication Bypass Windows 11 24h2 +14
NVD VulDB
CVE-2026-23673
EPSS 0% CVSS 7.8
HIGH This Week

Windows ReFS contains an out-of-bounds read vulnerability affecting Server 2019, 2022, 2025, and Windows 11 26h1 that enables authenticated local users to escalate privileges with high impact to confidentiality, integrity, and availability. The vulnerability requires low attack complexity and no user interaction, making it exploitable by any authenticated user on the system. No patch is currently available for this HIGH severity issue.

Information Disclosure Microsoft Buffer Overflow +15
NVD VulDB
CVE-2026-23672
EPSS 0% CVSS 7.8
HIGH This Week

Windows Universal Disk Format File System Driver (UDFS) Elevation of Privilege Vulnerability [CVSS 7.8 HIGH]

Information Disclosure Buffer Overflow Microsoft +15
NVD VulDB
CVE-2026-23671
EPSS 0% CVSS 7.0
HIGH This Week

Privilege escalation in the Windows Bluetooth RFCOM Protocol Driver across Windows 11 26h1, Windows Server 2025, and Windows 10 1809 stems from improper synchronization of concurrent access to shared resources. An authenticated local attacker can exploit this race condition to gain elevated privileges on affected systems. No patch is currently available for this vulnerability.

Race Condition Information Disclosure Microsoft +14
NVD VulDB
CVE-2026-23667
EPSS 0% CVSS 7.0
HIGH This Week

Use after free in Broadcast DVR allows an authorized attacker to elevate privileges locally. [CVSS 7.0 HIGH]

Use After Free Windows 10 1809 Windows 11 26h1 +6
NVD VulDB

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy