Windows

1607 CVEs product

Monthly

CVE-2026-23565 MEDIUM This Month

TeamViewer DEX Client versions prior to 26.1 contain a null pointer dereference in the NomadBranch.exe Content Distribution Service that allows adjacent network attackers to crash the process without authentication. An attacker can exploit this vulnerability to disable the Content Distribution Service, causing a denial-of-service condition on affected Windows systems. No patch is currently available.

Windows Digital Employee Experience
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-23564 MEDIUM This Month

Digital Employee Experience is affected by cleartext transmission of sensitive information (CVSS 6.5).

Windows Digital Employee Experience
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-23563 MEDIUM This Month

Digital Employee Experience versions up to 26.1 is affected by improper link resolution before file access (CVSS 5.7).

Windows Digital Employee Experience
NVD
CVSS 3.1
5.7
EPSS
0.0%
CVE-2026-25067 MEDIUM This Month

SmarterMail before build 9518 allows unauthenticated attackers to exploit a path traversal flaw in the background preview endpoint by supplying base64-encoded UNC paths, forcing the Windows service to initiate SMB connections to attacker-controlled servers. This enables credential coercion and NTLM relay attacks without requiring authentication or user interaction. No patch is currently available for this vulnerability.

Windows Smartermail
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-24739 MEDIUM POC PATCH This Month

Symfony versions up to 5.4.51 contains a vulnerability that allows attackers to operations being performed on an unintended path, up to and including deletion o (CVSS 6.3).

Windows PHP Symfony
NVD GitHub
CVSS 3.1
6.3
EPSS
0.0%
CVE-2025-33237 MEDIUM This Month

NVIDIA HD Audio Driver for Windows contains a vulnerability where an attacker could exploit a NULL pointer dereference issue. A successful exploit of this vulnerability might lead to a denial of service. [CVSS 5.5 MEDIUM]

Windows Null Pointer Dereference Denial Of Service
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-33218 HIGH This Week

NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys), where an attacker could cause an integer overflow. [CVSS 7.8 HIGH]

Linux Windows Integer Overflow Denial Of Service Privilege Escalation +1
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-33217 HIGH This Week

NVIDIA Display Driver for Windows contains a vulnerability where an attacker could trigger a use after free. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, and information disclosure. [CVSS 7.8 HIGH]

Windows Use After Free Denial Of Service Privilege Escalation Information Disclosure
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-13919 MEDIUM This Month

Symantec Endpoint Protection, prior to 14.3 RU10 Patch 1, RU9 Patch 2, and RU8 Patch 3, may be susceptible to a COM Hijacking vulnerability, which is a type of issue whereby an attacker attempts to establish persistence and evade detection by hijacking COM references in the Windows Registry. [CVSS 4.4 MEDIUM]

Windows
NVD
CVSS 3.1
4.4
EPSS
0.0%
CVE-2020-36990 HIGH POC This Week

its Windows service configuration contains a vulnerability that allows attackers to execute code with elevated privileges (CVSS 7.8).

Windows
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2020-36985 HIGH POC This Week

its Windows service configuration contains a vulnerability that allows attackers to execute arbitrary code (CVSS 7.8).

Windows
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2020-36980 HIGH POC This Week

its Windows service configuration contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

Windows Privilege Escalation
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2020-36979 HIGH POC This Week

Atheros Coex Service Application 8.0.0.255 contains an unquoted service path vulnerability in its Windows service configuration. Attackers can exploit the unquoted path by placing malicious executables in the service path to gain elevated system privileges during service startup. [CVSS 7.8 HIGH]

Windows
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-0705 MEDIUM This Month

Acronis Cloud Manager for Windows before build 6.4.25342.354 is vulnerable to local privilege escalation through improperly configured folder permissions, allowing authenticated users with low privileges to escalate to higher privileges. An attacker with local access and user interaction can exploit this vulnerability to gain full system control. No patch is currently available for this vulnerability.

Windows Privilege Escalation
NVD
CVSS 3.0
6.7
EPSS
0.0%
CVE-2026-21408 HIGH This Week

beat-access for Windows version 3.0.3 and prior allows local attackers with user privileges to execute arbitrary code with SYSTEM-level permissions through insecure DLL search path resolution. An attacker can exploit this vulnerability by placing a malicious DLL in a predictable location, which the application will load and execute during normal operation. No patch is currently available for this vulnerability.

Windows
NVD
CVSS 3.0
7.3
EPSS
0.0%
CVE-2025-30248 Monitor

DLL hijacking in the WD Discovery Installer in Western Digital WD Discovery 5.2.730 on Windows allows a local attacker to execute arbitrary code via placement of a crafted dll in the installer's search path.

Windows
NVD
EPSS
0.0%
CVE-2026-24131 MEDIUM POC PATCH This Month

pnpm versions before 10.28.2 fail to validate the `directories.bin` field during package processing, allowing malicious packages to use path traversal (e.g., `../../../../tmp`) to escape the package root and chmod 755 files at arbitrary locations on Unix-like systems. Public exploit code exists for this vulnerability. The issue affects Linux, macOS, and Node.js environments but not Windows due to platform-specific protections.

Linux Windows macOS Node.js Pnpm +2
NVD GitHub
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23889 MEDIUM POC PATCH This Month

Path traversal in pnpm's tarball extraction on Windows allows attackers to write files outside the intended package directory by exploiting incomplete path normalization that fails to block backslash-based traversal sequences. Public exploit code exists for this vulnerability, which affects Windows developers and CI/CD pipelines (GitHub Actions, Azure DevOps) and could result in overwriting sensitive configuration files like .npmrc or build configurations. A patch is available in pnpm version 10.28.1 and later.

Windows Node.js Azure Github Path Traversal +2
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-71178 Monitor

Crucial Storage Executive installer versions prior to 11.08.082025.00 contain a DLL preloading vulnerability. During installation, the installer runs with elevated privileges and loads Windows DLLs using an uncontrolled search path, which can cause a malicious DLL placed alongside the installer to be loaded instead of the intended system library. A local attacker who can convince a victim to run the installer from a directory containing the attacker-supplied DLL can achieve arbitrary code exe...

Windows RCE
NVD
EPSS
0.0%
CVE-2020-36958 HIGH POC This Week

KiteService Windows service contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

Windows
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-59105 Monitor

With physical access to the device and enough time an attacker can desolder the flash memory, modify it and then reinstall it because of missing encryption.

Linux Windows Ssh SQLi
NVD
EPSS
0.0%
CVE-2025-59103 Monitor

with the restriction that the password is only randomized if the configured date versions up to 2022. contains a security vulnerability.

Linux Windows Ssh
NVD
EPSS
0.1%
CVE-2020-36937 HIGH POC This Week

MEmusvc Windows service contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

Windows
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2020-36936 HIGH POC This Week

Magic Mouse 2 Utilities 2.20 contains an unquoted service path vulnerability in its Windows service configuration. Attackers can exploit the unquoted path to inject malicious executables and gain elevated system privileges by placing a malicious file in the service path. [CVSS 7.8 HIGH]

Windows
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2020-36934 HIGH POC This Week

DeepNetworkService contains a vulnerability that allows attackers to potentially execute code with elevated privileges (CVSS 7.8).

Windows
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2021-47881 HIGH POC This Week

dataSIMS Avionics ARINC 664-1 version 4.5.3 contains a local buffer overflow vulnerability that allows attackers to overwrite memory by manipulating the milstd1553result.txt file. [CVSS 8.4 HIGH]

Windows Industrial Buffer Overflow
NVD Exploit-DB
CVSS 3.1
8.4
EPSS
0.0%
CVE-2026-23764 Monitor

VB-Audio Voicemeeter, Voicemeeter Banana, and Voicemeeter Potato (versions ending in 1.1.1.9, 2.1.1.9, and 3.1.1.9 and earlier, respectively), as well as VB-Audio Matrix and Matrix Coconut (versions ending in 1.0.2.2 and 2.0.2.2 and earlier, respectively), contain a vulnerability in their virtual audio drivers (vbvoicemeetervaio64*.sys, vbmatrixvaio64*.sys, vbaudio_vmauxvaio*.sys, vbaudio_vmvaio*.sys, and vbaudio_vmvaio3*.sys).

Linux Windows Denial Of Service
NVD GitHub
EPSS
0.0%
CVE-2026-23762 Monitor

VB-Audio Voicemeeter, Voicemeeter Banana, and Voicemeeter Potato (versions ending in 1.1.1.9, 2.1.1.9, and 3.1.1.9 and earlier, respectively), as well as VB-Audio Matrix and Matrix Coconut (versions ending in 1.0.2.2 and 2.0.2.2 and earlier, respectively), contain a vulnerability in their virtual audio drivers (vbvoicemeetervaio64*.sys, vbmatrixvaio64*.sys, vbaudio_vmauxvaio*.sys, vbaudio_vmvaio*.sys, and vbaudio_vmvaio3*.sys).

Linux Windows Denial Of Service
NVD GitHub
EPSS
0.0%
CVE-2026-23761 Monitor

VB-Audio Voicemeeter, Voicemeeter Banana, and Voicemeeter Potato (versions ending in 1.1.1.9, 2.1.1.9, and 3.1.1.9 and earlier, respectively), as well as VB-Audio Matrix and Matrix Coconut (versions ending in 1.0.2.2 and 2.0.2.2 and earlier, respectively), contain a vulnerability in their virtual audio drivers (vbvoicemeetervaio64*.sys, vbmatrixvaio64*.sys, vbaudio_vmauxvaio*.sys, vbaudio_vmvaio*.sys, and vbaudio_vmvaio3*.sys).

Linux Windows Denial Of Service
NVD GitHub
EPSS
0.0%
CVE-2025-14295 Monitor

from 6.0 versions up to 9.0 contains a vulnerability that allows attackers to access stored passwords in a recoverable format which makes them subject to pass.

Windows
NVD
EPSS
0.0%
CVE-2026-23951 MEDIUM POC This Month

SumatraPDF on Windows is vulnerable to a denial-of-service attack through a maliciously crafted Mobi file that triggers an integer underflow in record validation, causing an out-of-bounds heap read and application crash. The vulnerability stems from an off-by-one error in the PalmDbReader::GetRecord function that only occurs with exactly 2 records, and public exploit code is available. No patch has been released at this time.

Windows Integer Overflow Denial Of Service Sumatrapdf
NVD GitHub
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23518 CRITICAL PATCH Act Now

Fleet device management software has a signature verification bypass that allows attackers to install malicious firmware on managed devices across the fleet.

Windows Azure Fleet Suse
NVD GitHub
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-22808 MEDIUM PATCH This Month

fleetdm/fleet is open source device management software. [CVSS 5.4 MEDIUM]

Windows XSS Fleet Suse
NVD GitHub
CVSS 3.1
5.4
EPSS
0.1%
CVE-2021-47882 HIGH POC This Week

its Windows service configuration contains a vulnerability that allows attackers to execute arbitrary code (CVSS 7.8).

Windows
NVD GitHub Exploit-DB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2021-47874 HIGH POC This Week

GVFS.Service Windows service contains a vulnerability that allows attackers to execute code with elevated privileges (CVSS 7.8).

Windows
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2021-47863 HIGH POC This Week

its Encrypto Service configuration contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

Windows
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-22444 HIGH PATCH This Week

Apache Solr 8.6 through 9.10.0 in standalone mode fails to properly validate the "create core" API parameters, allowing authenticated users to bypass the allowPaths security restriction and access unauthorized filesystem locations. On Windows systems configured with UNC path support, this vulnerability can lead to NTLM credential hash disclosure. Affected deployments using the allowPaths setting are at risk of unauthorized core creation and information exposure.

Windows Apache Solr Redhat
NVD HeroDevs
CVSS 3.1
7.1
EPSS
0.0%
CVE-2026-24016 HIGH This Week

Arbitrary code execution in ServerView Agents for Windows installer results from insecure DLL loading, allowing local attackers with user privileges to execute malicious code with administrator rights during installation. The vulnerability affects Fsas Technologies Inc.'s installer component and currently has no available patch. An attacker with physical or local access can exploit this during the installation process to achieve full system compromise.

Windows
NVD
CVSS 3.0
7.8
EPSS
0.0%
CVE-2026-21986 HIGH This Week

Vm Virtualbox versions up to 7.1.14 contains a vulnerability that allows attackers to unauthorized ability to cause a hang or frequently repeatable crash (complete DO (CVSS 7.1).

Oracle Windows Virtualbox Denial Of Service Vm Virtualbox
NVD
CVSS 3.1
7.1
EPSS
0.0%
CVE-2025-58744 HIGH This Week

Imagedirector Capture versions up to 7.6.3.25808. is affected by use of hard-coded credentials (CVSS 7.5).

Windows Imagedirector Capture
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-58743 HIGH This Week

Imagedirector Capture versions up to 7.6.3.25808. is affected by use of a broken or risky cryptographic algorithm (CVSS 7.5).

Windows Imagedirector Capture
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-58742 MEDIUM This Month

Imagedirector Capture versions up to 7.6.3.25808. is affected by insufficiently protected credentials (CVSS 5.9).

Windows Imagedirector Capture
NVD
CVSS 3.1
5.9
EPSS
0.0%
CVE-2025-58740 MEDIUM This Month

Imagedirector Capture versions up to 7.6.3.25808. is affected by use of hard-coded cryptographic key (CVSS 5.5).

Windows Imagedirector Capture
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-33231 MEDIUM PATCH This Month

NVIDIA Nsight Systems for Windows contains a vulnerability in the application’s DLL loading mechanism where an attacker could cause an uncontrolled search path element by exploiting insecure DLL search paths. [CVSS 6.7 MEDIUM]

Windows Denial Of Service Privilege Escalation Information Disclosure Cuda Toolkit
NVD
CVSS 3.1
6.7
EPSS
0.0%
CVE-2025-33229 HIGH PATCH This Week

NVIDIA Nsight Visual Studio for Windows contains a vulnerability in Nsight Monitor where an attacker can execute arbitrary code with the same privileges as the NVIDIA Nsight Visual Studio Edition Monitor application. [CVSS 7.3 HIGH]

Windows Denial Of Service Privilege Escalation Information Disclosure Cuda Toolkit +1
NVD
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-0903 MEDIUM PATCH This Month

Google Chrome's Downloads feature on Windows versions before 144.0.7559.59 fails to properly validate file types, enabling remote attackers to circumvent safety protections for dangerous files through crafted malicious uploads. An unauthenticated attacker can exploit this via a specially designed file to bypass download security warnings. No patch is currently available for this medium-severity vulnerability.

Google Windows Chrome Suse
NVD
CVSS 3.1
5.4
EPSS
0.0%
CVE-2025-15032 HIGH This Week

blank indicator in custom-sized new windows in Dia versions up to 1.9.0 is affected by improper restriction of rendered ui layers or frames (CVSS 7.4).

Windows macOS
NVD
CVSS 3.1
7.4
EPSS
0.0%
CVE-2021-47845 HIGH POC This Week

its Windows service configurations contains a vulnerability that allows attackers to execute code with elevated privileges (CVSS 7.8).

Windows
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2021-47828 HIGH POC This Week

BOOTP Turbo 2.0.0.1253 contains an unquoted service path vulnerability in its Windows service configuration. Attackers can exploit the unquoted path to execute arbitrary code with elevated LocalSystem privileges during system startup or reboot. [CVSS 7.8 HIGH]

Windows
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2021-47818 HIGH POC This Week

DupTerminator 1.4.5639.37199 contains a denial of service vulnerability that allows attackers to crash the application by inputting a long character string in the Excluded text box. Attackers can generate a payload of 8000 repeated characters to trigger the application to stop working on Windows 10. [CVSS 7.5 HIGH]

Windows Denial Of Service
NVD Exploit-DB
CVSS 3.1
7.5
EPSS
0.0%
CVE-2021-47809 HIGH POC This Week

Disk Sorter versions up to 13.6.12 contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

Windows Disk Sorter
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2021-47807 HIGH POC This Week

Sync Breeze versions up to 13.6.18 contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

Windows Sync Breeze
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2021-47806 HIGH POC This Week

Dup Scout versions up to 13.5.28 contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

Windows Dup Scout
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2021-47805 HIGH POC This Week

Disksavvy versions up to 13.6.14 contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

Windows Disksavvy
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2020-36929 HIGH POC This Week

Brprint Auditor versions up to 3.0.7 contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

Windows Brprint Auditor
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2020-36927 HIGH POC This Week

Diskpulse versions up to 13.6.14 contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

Windows Diskpulse
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-22864 HIGH POC PATCH This Week

Arbitrary code execution in Deno runtime versions before 2.5.6 allows unauthenticated attackers to bypass shell script execution restrictions by using alternate casing in batch file extensions (e.g., .BAT, .Bat instead of .bat). The case-sensitive validation flaw enables attackers to spawn blocked Windows batch and command files, achieving remote code execution. Public exploit code exists and no patch is currently available for affected systems.

Windows Deno Suse
NVD GitHub
CVSS 3.1
8.1
EPSS
0.0%
CVE-2021-47759 MEDIUM POC This Month

MTPutty 1.0.1.21 contains a sensitive information disclosure vulnerability that allows local attackers to view SSH connection passwords through Windows PowerShell process listing. [CVSS 6.2 MEDIUM]

Windows Ssh Information Disclosure
NVD Exploit-DB
CVSS 3.1
6.2
EPSS
0.0%
CVE-2026-23512 HIGH POC PATCH This Week

SumatraPDF 3.5.2 and earlier on Windows contains an untrusted search path vulnerability in the Advanced Options feature that allows arbitrary code execution through a malicious notepad.exe placed in the application directory. An attacker with local access can exploit this when a user triggers the Advanced Options setting, as the application fails to specify an absolute path when launching notepad.exe. Public exploit code exists for this vulnerability, and a patch is available.

Windows Sumatrapdf
NVD GitHub
CVSS 3.1
8.6
EPSS
0.0%
CVE-2025-9142 HIGH This Week

A local user can trigger Harmony SASE Windows client to write or delete files outside the intended certificate working directory. [CVSS 7.5 HIGH]

Windows
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-71104 MEDIUM PATCH This Month

In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer When advancing the target expiration for the guest's APIC timer in periodic mode, set the expiration to "now" if the target expiration is in the past (similar to what is done in update_target_expiration()).

Linux Microsoft Buffer Overflow Intel Windows +3
NVD VulDB
CVSS 3.1
5.5
EPSS
0.1%
CVE-2023-54330 CRITICAL POC Act Now

Inbit Messenger 4.6.0-4.9.0 has a second stack buffer overflow in the network handler. SEH overwrite leads to shellcode execution on Windows. PoC available.

Windows Buffer Overflow Stack Overflow Inbit Messenger
NVD GitHub Exploit-DB
CVSS 3.1
9.8
EPSS
0.4%
CVE-2022-50935 CRITICAL POC Act Now

Flame II HSPA USB Modem has an unquoted service path vulnerability that enables privilege escalation to SYSTEM on Windows. PoC available.

Windows
NVD Exploit-DB
CVSS 3.1
9.8
EPSS
0.1%
CVE-2022-50928 HIGH POC This Week

Bluesoleilcs versions up to 5.4.277 contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

Windows Bluesoleilcs
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2022-50920 HIGH POC This Week

SbieSvc Windows service contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 8.4).

Windows
NVD Exploit-DB
CVSS 3.1
8.4
EPSS
0.0%
CVE-2025-68947 MEDIUM This Month

NSecsoft 'NSecKrnl' is a Windows driver that allows a local, authenticated attacker to terminate processes owned by other users, including SYSTEM and Protected Processes by issuing crafted IOCTL requests to the driver. [CVSS 4.7 MEDIUM]

Windows
NVD GitHub
CVSS 3.1
4.7
EPSS
0.0%
CVE-2026-21265 MEDIUM This Month

Windows Secure Boot stores Microsoft certificates in the UEFI KEK and DB. [CVSS 6.4 MEDIUM]

Microsoft Windows Windows 10 22h2 Windows 10 1607 Windows 11 25h2 +10
NVD
CVSS 3.1
6.4
EPSS
0.3%
CVE-2026-20965 HIGH This Week

Windows Admin Center fails to properly validate cryptographic signatures, enabling high-privileged users to bypass security controls and gain elevated system access on local machines. This vulnerability affects both Windows and Windows Admin Center installations and requires an authenticated attacker with administrative credentials to exploit. No patch is currently available for this issue.

Windows Windows Admin Center
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-20941 HIGH This Week

Privilege escalation in Windows Task Host Process affects Windows 11 and Server 2025 through unsafe symbolic link handling, allowing authenticated local users to gain elevated system privileges. An attacker with standard user access can exploit improper link resolution to bypass access controls and execute arbitrary actions with SYSTEM-level permissions. Currently no patch is available for this vulnerability.

Windows Windows Server 2025 Windows 11 25h2 Windows 11 24h2 Microsoft
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-20940 HIGH This Week

Windows Cloud Files Mini Filter Driver contains a heap-based buffer overflow that enables local privilege escalation on Windows 10 1809, Windows Server 2016, and Windows Server 2022. An authenticated attacker can exploit this vulnerability to gain elevated system privileges without user interaction. No patch is currently available.

Windows Buffer Overflow Heap Overflow Windows 10 1809 Windows Server 2022 +9
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-20939 MEDIUM This Month

Windows File Explorer information disclosure affects Windows 10 and 11 systems, allowing local authenticated attackers to access sensitive data through improper access controls. The vulnerability requires valid user credentials and local system access, posing a risk in multi-user or shared computing environments where sensitive files may be exposed to other authorized users.

Windows Windows Server 2022 23h2 Windows 11 24h2 Windows 10 21h2 Windows 10 1607 +9
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-20938 HIGH This Week

Windows Virtualization-Based Security (VBS) Enclave contains an untrusted pointer dereference vulnerability that allows authenticated local users to achieve privilege escalation. The vulnerability affects Windows 11 versions 23h2, 24h2, and 25h2, and currently has no available patch. An attacker with local access can exploit this memory safety flaw to gain elevated system privileges.

Windows Windows 11 23h2 Windows 11 25h2 Windows 11 24h2 Microsoft
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-20937 MEDIUM This Month

Windows File Explorer improperly restricts access to sensitive information, enabling authenticated local users to read confidential data without authorization. This vulnerability affects Windows 10 across multiple versions (1607, 1809, 21H2, 22H2) and requires valid user credentials and local system access to exploit. Currently, no patch is available to remediate this information disclosure issue.

Windows Windows Server 2022 Windows 10 21h2 Windows 10 22h2 Windows 10 1607 +9
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-20936 MEDIUM This Month

Information disclosure in Windows NDIS allows a privileged local attacker with physical access to read sensitive kernel memory regions on Windows 10 and Windows 11 systems. The vulnerability requires both authentication and direct hardware interaction, limiting its practical exploitation to scenarios where an attacker has already compromised system access. No patch is currently available for affected Windows versions including 10 (21h2, 22h2) and 11 (25h2).

Windows Windows 10 22h2 Windows 10 21h2 Windows 11 25h2 Windows Server 2012 +11
NVD
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-20935 MEDIUM This Month

Information disclosure in Windows VBS Enclave protection across Windows 11 versions (23h2, 24h2, 25h2) results from unsafe pointer handling that allows local attackers to read sensitive data without authentication. The vulnerability requires local access and carries medium severity with no available patch, making it a persistent risk for systems relying on virtualization-based security controls.

Windows Windows 11 24h2 Windows 11 25h2 Windows 11 23h2 Microsoft
NVD
CVSS 3.1
6.2
EPSS
0.0%
CVE-2026-20934 HIGH This Week

Privilege escalation in Windows SMB Server (Server 2025, Windows 11 24H2, Windows 10 22H2) stems from improper synchronization of shared resources during concurrent execution, enabling authenticated network attackers to gain elevated privileges. The vulnerability requires high complexity exploitation but carries high impact across confidentiality, integrity, and availability. No patch is currently available.

Windows Race Condition Windows Server 2025 Windows 11 24h2 Windows 10 22h2 +11
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-20932 MEDIUM This Month

Windows File Explorer information disclosure allows local authenticated users to access sensitive data without authorization. This medium-severity vulnerability affects multiple Windows versions including Windows 11 (24h2 and 25h2), Windows 10 1809, and Windows Server 2019, but no patch is currently available.

Windows Windows 11 24h2 Windows Server 2019 Windows 11 25h2 Windows 10 1809 +9
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-20931 HIGH This Week

Windows Telephony Service on multiple Windows versions (10, 11, Server 2008/2022) contains an improper file path control vulnerability that enables authenticated attackers on the same network to escalate privileges to system level. An attacker with local user credentials can manipulate file name or path parameters to achieve elevated privileges without user interaction. No patch is currently available, though the vulnerability has high exploitability potential (EPSS 0.8%).

Windows Windows 11 23h2 Windows Server 2022 23h2 Windows Server 2008 Windows 10 1607 +11
NVD
CVSS 3.1
8.0
EPSS
0.8%
CVE-2026-20929 HIGH This Week

Windows HTTP.sys contains an access control weakness that enables authenticated network attackers to escalate privileges on affected Windows systems including Windows 10 and Windows Server 2016/2019. The vulnerability requires low attack complexity and existing user credentials but grants complete compromise of confidentiality, integrity, and availability. No patch is currently available for this HIGH severity issue.

Windows Windows 10 22h2 Windows Server 2019 Windows Server 2016 Windows 10 1809 +8
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-20927 MEDIUM This Month

Windows SMB Server denial of service via race condition affects Windows 10 21h2, Windows 11 24h2, and Windows Server 2022, allowing authenticated attackers to disrupt service availability through improper synchronization of shared resources. The vulnerability requires network access and specific conditions to trigger but carries no patch availability at this time. Impact is limited to availability with no confidentiality or integrity compromise.

Windows Race Condition Windows Server 2022 Windows 11 24h2 Windows 10 21h2 +12
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-20926 HIGH This Week

Privilege escalation in Windows SMB Server (versions 10 22h2, 11 23h2, and 11 25h2) stems from improper synchronization of shared resources, allowing authenticated network attackers to elevate privileges. The race condition vulnerability requires specific timing conditions but carries high impact across confidentiality, integrity, and availability. No patch is currently available for this vulnerability.

Windows Race Condition Windows 11 23h2 Windows 11 25h2 Windows 10 22h2 +11
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-20925 MEDIUM This Month

Windows NTLM authentication across multiple Windows versions (10, Server 2008/2019) allows remote attackers to manipulate file name or path parameters without authentication, enabling network-based identity spoofing attacks. The vulnerability requires user interaction and has no available patch, affecting systems still running older Windows Server editions alongside current Windows 10 releases. An attacker could impersonate legitimate services or users to compromise trust in networked communications.

Windows Windows 10 22h2 Windows Server 2008 Windows 10 1607 Windows Server 2019 +11
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-20924 HIGH This Week

Privilege escalation in Windows Management Services via use-after-free memory corruption affects Windows 10, Windows 11, and Windows Server 2019, enabling authenticated local attackers to gain elevated system privileges. An authorized user can exploit this vulnerability through a race condition to execute arbitrary code with higher privileges. No patch is currently available for this vulnerability.

Windows Use After Free Windows 11 25h2 Windows Server 2019 Windows 10 22h2 +8
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-20923 HIGH This Week

Privilege escalation in Windows Management Services affects Windows Server 2019, 2022 23h2, and 2025 through a use-after-free vulnerability that allows authenticated local attackers to gain elevated system privileges. The flaw requires low privileges and manual user interaction to trigger, potentially giving attackers complete system control. No patch is currently available for this vulnerability.

Windows Use After Free Windows Server 2022 23h2 Windows Server 2025 Windows Server 2019 +8
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-20922 HIGH This Week

Heap-based buffer overflow in Windows NTFS allows an authorized attacker to execute code locally. [CVSS 7.8 HIGH]

Windows Buffer Overflow Heap Overflow Windows 10 1607 Windows 11 25h2 +13
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-20921 HIGH This Week

Privilege escalation in Windows SMB Server (2022, 2025) stems from improper synchronization of concurrent resource access, enabling authenticated network attackers to gain elevated privileges. The vulnerability requires specific conditions to trigger but provides high-impact unauthorized access when successfully exploited. No patch is currently available for affected systems.

Windows Race Condition Windows Server 2022 23h2 Windows Server 2022 Windows Server 2025 +12
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-20920 HIGH This Week

Windows Win32K use-after-free vulnerability in ICOMP affects Windows 11 23h2 and Windows Server 2022 23h2, enabling authenticated local attackers to achieve privilege escalation with high impact on confidentiality, integrity, and availability. Currently no patch is available, and exploitation requires local access with user-level privileges.

Windows Use After Free Windows Server 2022 23h2 Windows 11 23h2 Windows Server 2022 +1
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-20919 HIGH This Week

Windows SMB Server contains a race condition in concurrent resource handling that enables authenticated network attackers to escalate privileges on affected systems including Windows 10 22H2, Windows 10 1607, and Windows Server 2025. The vulnerability requires low attack complexity and network access from an authenticated user, but carries high impact across confidentiality, integrity, and availability. No patch is currently available for this HIGH severity issue (CVSS 7.5).

Windows Race Condition Windows 10 22h2 Windows Server 2025 Windows 10 1607 +11
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-20918 HIGH This Week

Windows Management Services on Windows 10 and 11 contains a race condition in shared resource synchronization that enables authenticated local users to escalate privileges to system level. The vulnerability affects multiple Windows versions including 22h2, 21h2, and 25h2 builds, with no patch currently available.

Windows Race Condition Windows 11 25h2 Windows 10 22h2 Windows 10 21h2 +8
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-20877 HIGH This Week

Privilege escalation in Windows Management Services affects Windows 10 22h2, Windows Server 2022 23h2, and Windows 11 23h2 through a use-after-free memory flaw. An authenticated local attacker can exploit this vulnerability to gain elevated system privileges. Currently, no patch is available.

Windows Use After Free Windows 10 22h2 Windows Server 2022 23h2 Windows 11 23h2 +8
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-23565
EPSS 0% CVSS 6.5
MEDIUM This Month

TeamViewer DEX Client versions prior to 26.1 contain a null pointer dereference in the NomadBranch.exe Content Distribution Service that allows adjacent network attackers to crash the process without authentication. An attacker can exploit this vulnerability to disable the Content Distribution Service, causing a denial-of-service condition on affected Windows systems. No patch is currently available.

Windows Digital Employee Experience
NVD
CVE-2026-23564
EPSS 0% CVSS 6.5
MEDIUM This Month

Digital Employee Experience is affected by cleartext transmission of sensitive information (CVSS 6.5).

Windows Digital Employee Experience
NVD
CVE-2026-23563
EPSS 0% CVSS 5.7
MEDIUM This Month

Digital Employee Experience versions up to 26.1 is affected by improper link resolution before file access (CVSS 5.7).

Windows Digital Employee Experience
NVD
CVE-2026-25067
EPSS 0% CVSS 5.3
MEDIUM This Month

SmarterMail before build 9518 allows unauthenticated attackers to exploit a path traversal flaw in the background preview endpoint by supplying base64-encoded UNC paths, forcing the Windows service to initiate SMB connections to attacker-controlled servers. This enables credential coercion and NTLM relay attacks without requiring authentication or user interaction. No patch is currently available for this vulnerability.

Windows Smartermail
NVD
CVE-2026-24739
EPSS 0% CVSS 6.3
MEDIUM POC PATCH This Month

Symfony versions up to 5.4.51 contains a vulnerability that allows attackers to operations being performed on an unintended path, up to and including deletion o (CVSS 6.3).

Windows PHP Symfony
NVD GitHub
CVE-2025-33237
EPSS 0% CVSS 5.5
MEDIUM This Month

NVIDIA HD Audio Driver for Windows contains a vulnerability where an attacker could exploit a NULL pointer dereference issue. A successful exploit of this vulnerability might lead to a denial of service. [CVSS 5.5 MEDIUM]

Windows Null Pointer Dereference Denial Of Service
NVD
CVE-2025-33218
EPSS 0% CVSS 7.8
HIGH This Week

NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys), where an attacker could cause an integer overflow. [CVSS 7.8 HIGH]

Linux Windows Integer Overflow +3
NVD
CVE-2025-33217
EPSS 0% CVSS 7.8
HIGH This Week

NVIDIA Display Driver for Windows contains a vulnerability where an attacker could trigger a use after free. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, and information disclosure. [CVSS 7.8 HIGH]

Windows Use After Free Denial Of Service +2
NVD
CVE-2025-13919
EPSS 0% CVSS 4.4
MEDIUM This Month

Symantec Endpoint Protection, prior to 14.3 RU10 Patch 1, RU9 Patch 2, and RU8 Patch 3, may be susceptible to a COM Hijacking vulnerability, which is a type of issue whereby an attacker attempts to establish persistence and evade detection by hijacking COM references in the Windows Registry. [CVSS 4.4 MEDIUM]

Windows
NVD
CVE-2020-36990
EPSS 0% CVSS 7.8
HIGH POC This Week

its Windows service configuration contains a vulnerability that allows attackers to execute code with elevated privileges (CVSS 7.8).

Windows
NVD Exploit-DB
CVE-2020-36985
EPSS 0% CVSS 7.8
HIGH POC This Week

its Windows service configuration contains a vulnerability that allows attackers to execute arbitrary code (CVSS 7.8).

Windows
NVD Exploit-DB
CVE-2020-36980
EPSS 0% CVSS 7.8
HIGH POC This Week

its Windows service configuration contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

Windows Privilege Escalation
NVD Exploit-DB
CVE-2020-36979
EPSS 0% CVSS 7.8
HIGH POC This Week

Atheros Coex Service Application 8.0.0.255 contains an unquoted service path vulnerability in its Windows service configuration. Attackers can exploit the unquoted path by placing malicious executables in the service path to gain elevated system privileges during service startup. [CVSS 7.8 HIGH]

Windows
NVD Exploit-DB
CVE-2026-0705
EPSS 0% CVSS 6.7
MEDIUM This Month

Acronis Cloud Manager for Windows before build 6.4.25342.354 is vulnerable to local privilege escalation through improperly configured folder permissions, allowing authenticated users with low privileges to escalate to higher privileges. An attacker with local access and user interaction can exploit this vulnerability to gain full system control. No patch is currently available for this vulnerability.

Windows Privilege Escalation
NVD
CVE-2026-21408
EPSS 0% CVSS 7.3
HIGH This Week

beat-access for Windows version 3.0.3 and prior allows local attackers with user privileges to execute arbitrary code with SYSTEM-level permissions through insecure DLL search path resolution. An attacker can exploit this vulnerability by placing a malicious DLL in a predictable location, which the application will load and execute during normal operation. No patch is currently available for this vulnerability.

Windows
NVD
CVE-2025-30248
EPSS 0%
Monitor

DLL hijacking in the WD Discovery Installer in Western Digital WD Discovery 5.2.730 on Windows allows a local attacker to execute arbitrary code via placement of a crafted dll in the installer's search path.

Windows
NVD
CVE-2026-24131
EPSS 0% CVSS 5.5
MEDIUM POC PATCH This Month

pnpm versions before 10.28.2 fail to validate the `directories.bin` field during package processing, allowing malicious packages to use path traversal (e.g., `../../../../tmp`) to escape the package root and chmod 755 files at arbitrary locations on Unix-like systems. Public exploit code exists for this vulnerability. The issue affects Linux, macOS, and Node.js environments but not Windows due to platform-specific protections.

Linux Windows macOS +4
NVD GitHub
CVE-2026-23889
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

Path traversal in pnpm's tarball extraction on Windows allows attackers to write files outside the intended package directory by exploiting incomplete path normalization that fails to block backslash-based traversal sequences. Public exploit code exists for this vulnerability, which affects Windows developers and CI/CD pipelines (GitHub Actions, Azure DevOps) and could result in overwriting sensitive configuration files like .npmrc or build configurations. A patch is available in pnpm version 10.28.1 and later.

Windows Node.js Azure +4
NVD GitHub
CVE-2025-71178
EPSS 0%
Monitor

Crucial Storage Executive installer versions prior to 11.08.082025.00 contain a DLL preloading vulnerability. During installation, the installer runs with elevated privileges and loads Windows DLLs using an uncontrolled search path, which can cause a malicious DLL placed alongside the installer to be loaded instead of the intended system library. A local attacker who can convince a victim to run the installer from a directory containing the attacker-supplied DLL can achieve arbitrary code exe...

Windows RCE
NVD
CVE-2020-36958
EPSS 0% CVSS 7.8
HIGH POC This Week

KiteService Windows service contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

Windows
NVD Exploit-DB
CVE-2025-59105
EPSS 0%
Monitor

With physical access to the device and enough time an attacker can desolder the flash memory, modify it and then reinstall it because of missing encryption.

Linux Windows Ssh +1
NVD
CVE-2025-59103
EPSS 0%
Monitor

with the restriction that the password is only randomized if the configured date versions up to 2022. contains a security vulnerability.

Linux Windows Ssh
NVD
CVE-2020-36937
EPSS 0% CVSS 7.8
HIGH POC This Week

MEmusvc Windows service contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

Windows
NVD Exploit-DB
CVE-2020-36936
EPSS 0% CVSS 7.8
HIGH POC This Week

Magic Mouse 2 Utilities 2.20 contains an unquoted service path vulnerability in its Windows service configuration. Attackers can exploit the unquoted path to inject malicious executables and gain elevated system privileges by placing a malicious file in the service path. [CVSS 7.8 HIGH]

Windows
NVD Exploit-DB
CVE-2020-36934
EPSS 0% CVSS 7.8
HIGH POC This Week

DeepNetworkService contains a vulnerability that allows attackers to potentially execute code with elevated privileges (CVSS 7.8).

Windows
NVD Exploit-DB
CVE-2021-47881
EPSS 0% CVSS 8.4
HIGH POC This Week

dataSIMS Avionics ARINC 664-1 version 4.5.3 contains a local buffer overflow vulnerability that allows attackers to overwrite memory by manipulating the milstd1553result.txt file. [CVSS 8.4 HIGH]

Windows Industrial Buffer Overflow
NVD Exploit-DB
CVE-2026-23764
EPSS 0%
Monitor

VB-Audio Voicemeeter, Voicemeeter Banana, and Voicemeeter Potato (versions ending in 1.1.1.9, 2.1.1.9, and 3.1.1.9 and earlier, respectively), as well as VB-Audio Matrix and Matrix Coconut (versions ending in 1.0.2.2 and 2.0.2.2 and earlier, respectively), contain a vulnerability in their virtual audio drivers (vbvoicemeetervaio64*.sys, vbmatrixvaio64*.sys, vbaudio_vmauxvaio*.sys, vbaudio_vmvaio*.sys, and vbaudio_vmvaio3*.sys).

Linux Windows Denial Of Service
NVD GitHub
CVE-2026-23762
EPSS 0%
Monitor

VB-Audio Voicemeeter, Voicemeeter Banana, and Voicemeeter Potato (versions ending in 1.1.1.9, 2.1.1.9, and 3.1.1.9 and earlier, respectively), as well as VB-Audio Matrix and Matrix Coconut (versions ending in 1.0.2.2 and 2.0.2.2 and earlier, respectively), contain a vulnerability in their virtual audio drivers (vbvoicemeetervaio64*.sys, vbmatrixvaio64*.sys, vbaudio_vmauxvaio*.sys, vbaudio_vmvaio*.sys, and vbaudio_vmvaio3*.sys).

Linux Windows Denial Of Service
NVD GitHub
CVE-2026-23761
EPSS 0%
Monitor

VB-Audio Voicemeeter, Voicemeeter Banana, and Voicemeeter Potato (versions ending in 1.1.1.9, 2.1.1.9, and 3.1.1.9 and earlier, respectively), as well as VB-Audio Matrix and Matrix Coconut (versions ending in 1.0.2.2 and 2.0.2.2 and earlier, respectively), contain a vulnerability in their virtual audio drivers (vbvoicemeetervaio64*.sys, vbmatrixvaio64*.sys, vbaudio_vmauxvaio*.sys, vbaudio_vmvaio*.sys, and vbaudio_vmvaio3*.sys).

Linux Windows Denial Of Service
NVD GitHub
CVE-2025-14295
EPSS 0%
Monitor

from 6.0 versions up to 9.0 contains a vulnerability that allows attackers to access stored passwords in a recoverable format which makes them subject to pass.

Windows
NVD
CVE-2026-23951
EPSS 0% CVSS 5.5
MEDIUM POC This Month

SumatraPDF on Windows is vulnerable to a denial-of-service attack through a maliciously crafted Mobi file that triggers an integer underflow in record validation, causing an out-of-bounds heap read and application crash. The vulnerability stems from an off-by-one error in the PalmDbReader::GetRecord function that only occurs with exactly 2 records, and public exploit code is available. No patch has been released at this time.

Windows Integer Overflow Denial Of Service +1
NVD GitHub
CVE-2026-23518
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Fleet device management software has a signature verification bypass that allows attackers to install malicious firmware on managed devices across the fleet.

Windows Azure Fleet +1
NVD GitHub
CVE-2026-22808
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

fleetdm/fleet is open source device management software. [CVSS 5.4 MEDIUM]

Windows XSS Fleet +1
NVD GitHub
CVE-2021-47882
EPSS 0% CVSS 7.8
HIGH POC This Week

its Windows service configuration contains a vulnerability that allows attackers to execute arbitrary code (CVSS 7.8).

Windows
NVD GitHub Exploit-DB
CVE-2021-47874
EPSS 0% CVSS 7.8
HIGH POC This Week

GVFS.Service Windows service contains a vulnerability that allows attackers to execute code with elevated privileges (CVSS 7.8).

Windows
NVD Exploit-DB
CVE-2021-47863
EPSS 0% CVSS 7.8
HIGH POC This Week

its Encrypto Service configuration contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

Windows
NVD Exploit-DB
CVE-2026-22444
EPSS 0% CVSS 7.1
HIGH PATCH This Week

Apache Solr 8.6 through 9.10.0 in standalone mode fails to properly validate the "create core" API parameters, allowing authenticated users to bypass the allowPaths security restriction and access unauthorized filesystem locations. On Windows systems configured with UNC path support, this vulnerability can lead to NTLM credential hash disclosure. Affected deployments using the allowPaths setting are at risk of unauthorized core creation and information exposure.

Windows Apache Solr +1
NVD HeroDevs
CVE-2026-24016
EPSS 0% CVSS 7.8
HIGH This Week

Arbitrary code execution in ServerView Agents for Windows installer results from insecure DLL loading, allowing local attackers with user privileges to execute malicious code with administrator rights during installation. The vulnerability affects Fsas Technologies Inc.'s installer component and currently has no available patch. An attacker with physical or local access can exploit this during the installation process to achieve full system compromise.

Windows
NVD
CVE-2026-21986
EPSS 0% CVSS 7.1
HIGH This Week

Vm Virtualbox versions up to 7.1.14 contains a vulnerability that allows attackers to unauthorized ability to cause a hang or frequently repeatable crash (complete DO (CVSS 7.1).

Oracle Windows Virtualbox +2
NVD
CVE-2025-58744
EPSS 0% CVSS 7.5
HIGH This Week

Imagedirector Capture versions up to 7.6.3.25808. is affected by use of hard-coded credentials (CVSS 7.5).

Windows Imagedirector Capture
NVD
CVE-2025-58743
EPSS 0% CVSS 7.5
HIGH This Week

Imagedirector Capture versions up to 7.6.3.25808. is affected by use of a broken or risky cryptographic algorithm (CVSS 7.5).

Windows Imagedirector Capture
NVD
CVE-2025-58742
EPSS 0% CVSS 5.9
MEDIUM This Month

Imagedirector Capture versions up to 7.6.3.25808. is affected by insufficiently protected credentials (CVSS 5.9).

Windows Imagedirector Capture
NVD
CVE-2025-58740
EPSS 0% CVSS 5.5
MEDIUM This Month

Imagedirector Capture versions up to 7.6.3.25808. is affected by use of hard-coded cryptographic key (CVSS 5.5).

Windows Imagedirector Capture
NVD
CVE-2025-33231
EPSS 0% CVSS 6.7
MEDIUM PATCH This Month

NVIDIA Nsight Systems for Windows contains a vulnerability in the application’s DLL loading mechanism where an attacker could cause an uncontrolled search path element by exploiting insecure DLL search paths. [CVSS 6.7 MEDIUM]

Windows Denial Of Service Privilege Escalation +2
NVD
CVE-2025-33229
EPSS 0% CVSS 7.3
HIGH PATCH This Week

NVIDIA Nsight Visual Studio for Windows contains a vulnerability in Nsight Monitor where an attacker can execute arbitrary code with the same privileges as the NVIDIA Nsight Visual Studio Edition Monitor application. [CVSS 7.3 HIGH]

Windows Denial Of Service Privilege Escalation +3
NVD
CVE-2026-0903
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

Google Chrome's Downloads feature on Windows versions before 144.0.7559.59 fails to properly validate file types, enabling remote attackers to circumvent safety protections for dangerous files through crafted malicious uploads. An unauthenticated attacker can exploit this via a specially designed file to bypass download security warnings. No patch is currently available for this medium-severity vulnerability.

Google Windows Chrome +1
NVD
CVE-2025-15032
EPSS 0% CVSS 7.4
HIGH This Week

blank indicator in custom-sized new windows in Dia versions up to 1.9.0 is affected by improper restriction of rendered ui layers or frames (CVSS 7.4).

Windows macOS
NVD
CVE-2021-47845
EPSS 0% CVSS 7.8
HIGH POC This Week

its Windows service configurations contains a vulnerability that allows attackers to execute code with elevated privileges (CVSS 7.8).

Windows
NVD Exploit-DB
CVE-2021-47828
EPSS 0% CVSS 7.8
HIGH POC This Week

BOOTP Turbo 2.0.0.1253 contains an unquoted service path vulnerability in its Windows service configuration. Attackers can exploit the unquoted path to execute arbitrary code with elevated LocalSystem privileges during system startup or reboot. [CVSS 7.8 HIGH]

Windows
NVD Exploit-DB
CVE-2021-47818
EPSS 0% CVSS 7.5
HIGH POC This Week

DupTerminator 1.4.5639.37199 contains a denial of service vulnerability that allows attackers to crash the application by inputting a long character string in the Excluded text box. Attackers can generate a payload of 8000 repeated characters to trigger the application to stop working on Windows 10. [CVSS 7.5 HIGH]

Windows Denial Of Service
NVD Exploit-DB
CVE-2021-47809
EPSS 0% CVSS 7.8
HIGH POC This Week

Disk Sorter versions up to 13.6.12 contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

Windows Disk Sorter
NVD Exploit-DB
CVE-2021-47807
EPSS 0% CVSS 7.8
HIGH POC This Week

Sync Breeze versions up to 13.6.18 contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

Windows Sync Breeze
NVD Exploit-DB
CVE-2021-47806
EPSS 0% CVSS 7.8
HIGH POC This Week

Dup Scout versions up to 13.5.28 contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

Windows Dup Scout
NVD Exploit-DB
CVE-2021-47805
EPSS 0% CVSS 7.8
HIGH POC This Week

Disksavvy versions up to 13.6.14 contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

Windows Disksavvy
NVD Exploit-DB
CVE-2020-36929
EPSS 0% CVSS 7.8
HIGH POC This Week

Brprint Auditor versions up to 3.0.7 contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

Windows Brprint Auditor
NVD Exploit-DB
CVE-2020-36927
EPSS 0% CVSS 7.8
HIGH POC This Week

Diskpulse versions up to 13.6.14 contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

Windows Diskpulse
NVD Exploit-DB
CVE-2026-22864
EPSS 0% CVSS 8.1
HIGH POC PATCH This Week

Arbitrary code execution in Deno runtime versions before 2.5.6 allows unauthenticated attackers to bypass shell script execution restrictions by using alternate casing in batch file extensions (e.g., .BAT, .Bat instead of .bat). The case-sensitive validation flaw enables attackers to spawn blocked Windows batch and command files, achieving remote code execution. Public exploit code exists and no patch is currently available for affected systems.

Windows Deno Suse
NVD GitHub
CVE-2021-47759
EPSS 0% CVSS 6.2
MEDIUM POC This Month

MTPutty 1.0.1.21 contains a sensitive information disclosure vulnerability that allows local attackers to view SSH connection passwords through Windows PowerShell process listing. [CVSS 6.2 MEDIUM]

Windows Ssh Information Disclosure
NVD Exploit-DB
CVE-2026-23512
EPSS 0% CVSS 8.6
HIGH POC PATCH This Week

SumatraPDF 3.5.2 and earlier on Windows contains an untrusted search path vulnerability in the Advanced Options feature that allows arbitrary code execution through a malicious notepad.exe placed in the application directory. An attacker with local access can exploit this when a user triggers the Advanced Options setting, as the application fails to specify an absolute path when launching notepad.exe. Public exploit code exists for this vulnerability, and a patch is available.

Windows Sumatrapdf
NVD GitHub
CVE-2025-9142
EPSS 0% CVSS 7.5
HIGH This Week

A local user can trigger Harmony SASE Windows client to write or delete files outside the intended certificate working directory. [CVSS 7.5 HIGH]

Windows
NVD
CVE-2025-71104
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer When advancing the target expiration for the guest's APIC timer in periodic mode, set the expiration to "now" if the target expiration is in the past (similar to what is done in update_target_expiration()).

Linux Microsoft Buffer Overflow +5
NVD VulDB
CVE-2023-54330
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Inbit Messenger 4.6.0-4.9.0 has a second stack buffer overflow in the network handler. SEH overwrite leads to shellcode execution on Windows. PoC available.

Windows Buffer Overflow Stack Overflow +1
NVD GitHub Exploit-DB
CVE-2022-50935
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Flame II HSPA USB Modem has an unquoted service path vulnerability that enables privilege escalation to SYSTEM on Windows. PoC available.

Windows
NVD Exploit-DB
CVE-2022-50928
EPSS 0% CVSS 7.8
HIGH POC This Week

Bluesoleilcs versions up to 5.4.277 contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

Windows Bluesoleilcs
NVD Exploit-DB
CVE-2022-50920
EPSS 0% CVSS 8.4
HIGH POC This Week

SbieSvc Windows service contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 8.4).

Windows
NVD Exploit-DB
CVE-2025-68947
EPSS 0% CVSS 4.7
MEDIUM This Month

NSecsoft 'NSecKrnl' is a Windows driver that allows a local, authenticated attacker to terminate processes owned by other users, including SYSTEM and Protected Processes by issuing crafted IOCTL requests to the driver. [CVSS 4.7 MEDIUM]

Windows
NVD GitHub
CVE-2026-21265
EPSS 0% CVSS 6.4
MEDIUM This Month

Windows Secure Boot stores Microsoft certificates in the UEFI KEK and DB. [CVSS 6.4 MEDIUM]

Microsoft Windows Windows 10 22h2 +12
NVD
CVE-2026-20965
EPSS 0% CVSS 7.5
HIGH This Week

Windows Admin Center fails to properly validate cryptographic signatures, enabling high-privileged users to bypass security controls and gain elevated system access on local machines. This vulnerability affects both Windows and Windows Admin Center installations and requires an authenticated attacker with administrative credentials to exploit. No patch is currently available for this issue.

Windows Windows Admin Center
NVD
CVE-2026-20941
EPSS 0% CVSS 7.8
HIGH This Week

Privilege escalation in Windows Task Host Process affects Windows 11 and Server 2025 through unsafe symbolic link handling, allowing authenticated local users to gain elevated system privileges. An attacker with standard user access can exploit improper link resolution to bypass access controls and execute arbitrary actions with SYSTEM-level permissions. Currently no patch is available for this vulnerability.

Windows Windows Server 2025 Windows 11 25h2 +2
NVD
CVE-2026-20940
EPSS 0% CVSS 7.8
HIGH This Week

Windows Cloud Files Mini Filter Driver contains a heap-based buffer overflow that enables local privilege escalation on Windows 10 1809, Windows Server 2016, and Windows Server 2022. An authenticated attacker can exploit this vulnerability to gain elevated system privileges without user interaction. No patch is currently available.

Windows Buffer Overflow Heap Overflow +11
NVD
CVE-2026-20939
EPSS 0% CVSS 5.5
MEDIUM This Month

Windows File Explorer information disclosure affects Windows 10 and 11 systems, allowing local authenticated attackers to access sensitive data through improper access controls. The vulnerability requires valid user credentials and local system access, posing a risk in multi-user or shared computing environments where sensitive files may be exposed to other authorized users.

Windows Windows Server 2022 23h2 Windows 11 24h2 +11
NVD
CVE-2026-20938
EPSS 0% CVSS 7.8
HIGH This Week

Windows Virtualization-Based Security (VBS) Enclave contains an untrusted pointer dereference vulnerability that allows authenticated local users to achieve privilege escalation. The vulnerability affects Windows 11 versions 23h2, 24h2, and 25h2, and currently has no available patch. An attacker with local access can exploit this memory safety flaw to gain elevated system privileges.

Windows Windows 11 23h2 Windows 11 25h2 +2
NVD
CVE-2026-20937
EPSS 0% CVSS 5.5
MEDIUM This Month

Windows File Explorer improperly restricts access to sensitive information, enabling authenticated local users to read confidential data without authorization. This vulnerability affects Windows 10 across multiple versions (1607, 1809, 21H2, 22H2) and requires valid user credentials and local system access to exploit. Currently, no patch is available to remediate this information disclosure issue.

Windows Windows Server 2022 Windows 10 21h2 +11
NVD
CVE-2026-20936
EPSS 0% CVSS 4.3
MEDIUM This Month

Information disclosure in Windows NDIS allows a privileged local attacker with physical access to read sensitive kernel memory regions on Windows 10 and Windows 11 systems. The vulnerability requires both authentication and direct hardware interaction, limiting its practical exploitation to scenarios where an attacker has already compromised system access. No patch is currently available for affected Windows versions including 10 (21h2, 22h2) and 11 (25h2).

Windows Windows 10 22h2 Windows 10 21h2 +13
NVD
CVE-2026-20935
EPSS 0% CVSS 6.2
MEDIUM This Month

Information disclosure in Windows VBS Enclave protection across Windows 11 versions (23h2, 24h2, 25h2) results from unsafe pointer handling that allows local attackers to read sensitive data without authentication. The vulnerability requires local access and carries medium severity with no available patch, making it a persistent risk for systems relying on virtualization-based security controls.

Windows Windows 11 24h2 Windows 11 25h2 +2
NVD
CVE-2026-20934
EPSS 0% CVSS 7.5
HIGH This Week

Privilege escalation in Windows SMB Server (Server 2025, Windows 11 24H2, Windows 10 22H2) stems from improper synchronization of shared resources during concurrent execution, enabling authenticated network attackers to gain elevated privileges. The vulnerability requires high complexity exploitation but carries high impact across confidentiality, integrity, and availability. No patch is currently available.

Windows Race Condition Windows Server 2025 +13
NVD
CVE-2026-20932
EPSS 0% CVSS 5.5
MEDIUM This Month

Windows File Explorer information disclosure allows local authenticated users to access sensitive data without authorization. This medium-severity vulnerability affects multiple Windows versions including Windows 11 (24h2 and 25h2), Windows 10 1809, and Windows Server 2019, but no patch is currently available.

Windows Windows 11 24h2 Windows Server 2019 +11
NVD
CVE-2026-20931
EPSS 1% CVSS 8.0
HIGH This Week

Windows Telephony Service on multiple Windows versions (10, 11, Server 2008/2022) contains an improper file path control vulnerability that enables authenticated attackers on the same network to escalate privileges to system level. An attacker with local user credentials can manipulate file name or path parameters to achieve elevated privileges without user interaction. No patch is currently available, though the vulnerability has high exploitability potential (EPSS 0.8%).

Windows Windows 11 23h2 Windows Server 2022 23h2 +13
NVD
CVE-2026-20929
EPSS 0% CVSS 7.5
HIGH This Week

Windows HTTP.sys contains an access control weakness that enables authenticated network attackers to escalate privileges on affected Windows systems including Windows 10 and Windows Server 2016/2019. The vulnerability requires low attack complexity and existing user credentials but grants complete compromise of confidentiality, integrity, and availability. No patch is currently available for this HIGH severity issue.

Windows Windows 10 22h2 Windows Server 2019 +10
NVD
CVE-2026-20927
EPSS 0% CVSS 5.3
MEDIUM This Month

Windows SMB Server denial of service via race condition affects Windows 10 21h2, Windows 11 24h2, and Windows Server 2022, allowing authenticated attackers to disrupt service availability through improper synchronization of shared resources. The vulnerability requires network access and specific conditions to trigger but carries no patch availability at this time. Impact is limited to availability with no confidentiality or integrity compromise.

Windows Race Condition Windows Server 2022 +14
NVD
CVE-2026-20926
EPSS 0% CVSS 7.5
HIGH This Week

Privilege escalation in Windows SMB Server (versions 10 22h2, 11 23h2, and 11 25h2) stems from improper synchronization of shared resources, allowing authenticated network attackers to elevate privileges. The race condition vulnerability requires specific timing conditions but carries high impact across confidentiality, integrity, and availability. No patch is currently available for this vulnerability.

Windows Race Condition Windows 11 23h2 +13
NVD
CVE-2026-20925
EPSS 0% CVSS 6.5
MEDIUM This Month

Windows NTLM authentication across multiple Windows versions (10, Server 2008/2019) allows remote attackers to manipulate file name or path parameters without authentication, enabling network-based identity spoofing attacks. The vulnerability requires user interaction and has no available patch, affecting systems still running older Windows Server editions alongside current Windows 10 releases. An attacker could impersonate legitimate services or users to compromise trust in networked communications.

Windows Windows 10 22h2 Windows Server 2008 +13
NVD
CVE-2026-20924
EPSS 0% CVSS 7.8
HIGH This Week

Privilege escalation in Windows Management Services via use-after-free memory corruption affects Windows 10, Windows 11, and Windows Server 2019, enabling authenticated local attackers to gain elevated system privileges. An authorized user can exploit this vulnerability through a race condition to execute arbitrary code with higher privileges. No patch is currently available for this vulnerability.

Windows Use After Free Windows 11 25h2 +10
NVD
CVE-2026-20923
EPSS 0% CVSS 7.8
HIGH This Week

Privilege escalation in Windows Management Services affects Windows Server 2019, 2022 23h2, and 2025 through a use-after-free vulnerability that allows authenticated local attackers to gain elevated system privileges. The flaw requires low privileges and manual user interaction to trigger, potentially giving attackers complete system control. No patch is currently available for this vulnerability.

Windows Use After Free Windows Server 2022 23h2 +10
NVD
CVE-2026-20922
EPSS 0% CVSS 7.8
HIGH This Week

Heap-based buffer overflow in Windows NTFS allows an authorized attacker to execute code locally. [CVSS 7.8 HIGH]

Windows Buffer Overflow Heap Overflow +15
NVD
CVE-2026-20921
EPSS 0% CVSS 7.5
HIGH This Week

Privilege escalation in Windows SMB Server (2022, 2025) stems from improper synchronization of concurrent resource access, enabling authenticated network attackers to gain elevated privileges. The vulnerability requires specific conditions to trigger but provides high-impact unauthorized access when successfully exploited. No patch is currently available for affected systems.

Windows Race Condition Windows Server 2022 23h2 +14
NVD
CVE-2026-20920
EPSS 0% CVSS 7.8
HIGH This Week

Windows Win32K use-after-free vulnerability in ICOMP affects Windows 11 23h2 and Windows Server 2022 23h2, enabling authenticated local attackers to achieve privilege escalation with high impact on confidentiality, integrity, and availability. Currently no patch is available, and exploitation requires local access with user-level privileges.

Windows Use After Free Windows Server 2022 23h2 +3
NVD
CVE-2026-20919
EPSS 0% CVSS 7.5
HIGH This Week

Windows SMB Server contains a race condition in concurrent resource handling that enables authenticated network attackers to escalate privileges on affected systems including Windows 10 22H2, Windows 10 1607, and Windows Server 2025. The vulnerability requires low attack complexity and network access from an authenticated user, but carries high impact across confidentiality, integrity, and availability. No patch is currently available for this HIGH severity issue (CVSS 7.5).

Windows Race Condition Windows 10 22h2 +13
NVD
CVE-2026-20918
EPSS 0% CVSS 7.8
HIGH This Week

Windows Management Services on Windows 10 and 11 contains a race condition in shared resource synchronization that enables authenticated local users to escalate privileges to system level. The vulnerability affects multiple Windows versions including 22h2, 21h2, and 25h2 builds, with no patch currently available.

Windows Race Condition Windows 11 25h2 +10
NVD
CVE-2026-20877
EPSS 0% CVSS 7.8
HIGH This Week

Privilege escalation in Windows Management Services affects Windows 10 22h2, Windows Server 2022 23h2, and Windows 11 23h2 through a use-after-free memory flaw. An authenticated local attacker can exploit this vulnerability to gain elevated system privileges. Currently, no patch is available.

Windows Use After Free Windows 10 22h2 +10
NVD
Prev Page 4 of 18 Next

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy