{"id":45388,"date":"2026-04-14T22:21:30","date_gmt":"2026-04-14T14:21:30","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/14\/microsoft-april-2026-patch-tuesday-fixes-167-flaws-2-zero-days\/"},"modified":"2026-04-14T22:21:30","modified_gmt":"2026-04-14T14:21:30","slug":"microsoft-april-2026-patch-tuesday-fixes-167-flaws-2-zero-days","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/14\/microsoft-april-2026-patch-tuesday-fixes-167-flaws-2-zero-days\/","title":{"rendered":"Microsoft April 2026 Patch Tuesday fixes 167 flaws, 2 zero-days"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2024\/10\/08\/patch_tuesday_microsoft.jpg\" width=\"1600\" alt=\"Microsoft April 2026 Patch Tuesday fixes 167 flaws, 2 zero-days\"><\/p>\n<style type=\"text\/css\">.crit {  font-weight:bold;  color:red;  }  .article_section td {   font-size: 14px!important;  }  <\/style>\n<p>Today is Microsoft&#8217;s April 2026&nbsp;Patch Tuesday with security updates for 167 flaws, including 2 zero-day vulnerabilities.<\/p>\n<p>This Patch Tuesday also addresses eight &#8220;Critical&#8221; vulnerabilities, 7&nbsp;of which are remote code execution flaws and the other is a denial of service flaw.<\/p>\n<p>The number of bugs in each vulnerability category is listed below:<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.adaptivesecurity.com\/demo\/security-awareness-training?utm_source=display_network&amp;utm_medium=paid_display&amp;utm_campaign=2026_04_display_bleepingcomputer&amp;utm_id=701Rd00000fE8REIA0&amp;utm_content=970x250\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/a\/as-tour-the-platform-970-x250.jpg\" style=\"margin-top: 0px;\" alt=\"Microsoft April 2026 Patch Tuesday fixes 167 flaws, 2 zero-days\"><\/a> <\/div>\n<ul style=\"list-style-type:square\">\n<li>93 Elevation of Privilege Vulnerabilities<\/li>\n<li>13 Security Feature Bypass Vulnerabilities<\/li>\n<li>20 Remote Code Execution Vulnerabilities<\/li>\n<li>21 Information Disclosure Vulnerabilities<\/li>\n<li>10 Denial of Service Vulnerabilities<\/li>\n<li>9 Spoofing Vulnerabilities<\/li>\n<\/ul>\n<p>When BleepingComputer reports on Patch Tuesday security updates, we only count those released by Microsoft today.<\/p>\n<p>Therefore, the number of flaws does not include Mariner, Azure, and Bing flaws that were fixed by Microsoft earlier this month. There were also&nbsp;80 Microsoft Edge\/Chromium flaws that were fixed by Google.<\/p>\n<h2>2 zero-days and Microsoft Office flaws<\/h2>\n<p>This month&#8217;s Patch Tuesday fixes two zero-day vulnerabilities, with one publicly disclosed and the other actively exploited in attacks.<\/p>\n<p>Microsoft <a href=\"https:\/\/learn.microsoft.com\/en-us\/defender-vulnerability-management\/tvm-zero-day-vulnerabilities\" target=\"_blank\" rel=\"nofollow noopener\">classifies a zero-day flaw<\/a> as publicly disclosed or actively exploited while no official fix is available.<\/p>\n<p>The actively exploited zero-day flaw is:<\/p>\n<p style=\"margin-left:40px\"><strong><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2026-32201\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2026-32201 &#8211; Microsoft SharePoint Server Spoofing Vulnerability<\/a><\/strong><\/p>\n<p style=\"margin-left:40px\">Microsoft has patched a Microsoft SharePoint Server Spoofing Vulnerability that was exploited in attacks.<\/p>\n<p style=\"margin-left:40px\">&#8220;Improper input validation in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network,&#8221; explains Microsoft.<\/p>\n<p style=\"margin-left:40px\">&#8220;An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality), make changes to disclosed information (Integrity), but cannot limit access to the resource (Availability),&#8221; continued Microsoft.<\/p>\n<p style=\"margin-left:40px\">Microsoft has not disclosed how this vulnerability was exploited in attacks or who disclosed it.<\/p>\n<p>The&nbsp;publicly disclosed zero-day&nbsp;is:<\/p>\n<p style=\"margin-left:40px\"><strong><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2026-33825\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2026-33825 &#8211; Microsoft Defender Elevation of Privilege Vulnerability<\/a><\/strong><\/p>\n<p style=\"margin-left:40px\">Microsoft has patched a Microsoft Defender privilege elevation flaw that gives SYSTEM privileges.<\/p>\n<p style=\"margin-left:40px\">The company has addressed the flaw in&nbsp;the Microsoft Defender Antimalware Platform update version&nbsp;<strong>4.18.26050.3011<\/strong>, which will automatically be downloaded to systems.<\/p>\n<p style=\"margin-left:40px\">Windows users can manually install it by going to <strong>Windows Security<\/strong> &gt;&nbsp;<strong>Virus &amp; threat protection<\/strong> &gt; <strong>Protection Updates<\/strong>, then clicking <strong>Check for updates<\/strong>.<\/p>\n<p style=\"margin-left:40px\">Microsoft has credited <a href=\"https:\/\/github.com\/steadytao\" target=\"_blank\" rel=\"nofollow noopener\">Zen Dodd<\/a>&nbsp;and&nbsp;Yuanpei XU (HUST) with Diffract with discovering this flaw.<\/p>\n<p>Microsoft has also fixed multiple remote code execution bugs in Microsoft Office (Word and Excel) that can be executed via the preview pane or by opening malicious documents.<\/p>\n<p>Therefore, users should prioritize updating Microsoft Office as soon as possible, especially if they commonly receive attachments.<\/p>\n<h2>Recent updates from other companies<\/h2>\n<p>Other vendors who released updates or advisories in April 2026&nbsp;include:<\/p>\n<ul style=\"list-style-type:square\">\n<li><strong>Adobe<\/strong> has <a href=\"https:\/\/helpx.adobe.com\/security\/security-bulletin.html\" target=\"_blank\" rel=\"nofollow noopener\">released security updates<\/a> for Illustrator, Reader, Acrobat, Photoshop, Bridge, ColdFusion, AdobeConnect, FrameMaker, AEM, InCopy, and InDesign. These updates include a fix for an <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-exploiting-acrobat-reader-zero-day-flaw-since-december\/\" target=\"_blank\" rel=\"nofollow noopener\">actively exploited Reader\/Acrobat zero-day<\/a>.<\/li>\n<li><strong>Apache<\/strong> <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/13-year-old-bug-in-activemq-lets-hackers-remotely-execute-commands\/\" target=\"_blank\" rel=\"nofollow noopener\">fixed a&nbsp;remote code execution (RCE) vulnerability<\/a> in Apache ActiveMQ Classic that had&nbsp;gone undetected for 13 years.<\/li>\n<li><strong>Apple<\/strong>&nbsp;enabled more iPhones still running iOS 18 to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/apple-expands-ios-18-updates-to-more-iphones-to-block-darksword-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">receive security updates<\/a> that protect against the actively exploited DarkSword exploit kit.<\/li>\n<li><strong>Cisco<\/strong> <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/publicationListing.x\" target=\"_blank\" rel=\"nofollow noopener\">released security updates<\/a> for numerous products, including an <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/critical-cisco-imc-auth-bypass-gives-attackers-admin-access\/\" target=\"_blank\" rel=\"nofollow noopener\">Integrated Management Controller (IMC) authentication bypass<\/a> that allows attackers to gain Admin access.<\/li>\n<li><strong>Fortinet<\/strong> <a href=\"https:\/\/fortiguard.fortinet.com\/psirt\" target=\"_blank\" rel=\"nofollow noopener\">released security updates<\/a> for numerous products, including a critical FortiClient Enterprise Management Server (EMS) vulnerability, CVE-2026-35616, which is <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-fortinet-forticlient-ems-flaw-cve-2026-35616-exploited-in-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">actively exploited in attacks<\/a>.<\/li>\n<li><strong>Google<\/strong>&nbsp;released&nbsp;<a href=\"https:\/\/docs.qualcomm.com\/securitybulletin\/april-2026-bulletin.html\" target=\"_blank\" rel=\"nofollow noopener\">Android&#8217;s April security bulletin<\/a>&nbsp;and <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/google-fixes-fourth-chrome-zero-day-exploited-in-attacks-in-2026\/\" target=\"_blank\" rel=\"nofollow noopener\">fixed a Google Chrome zero-day<\/a> that was exploited in attacks.<\/li>\n<li>New&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-gpubreach-attack-enables-system-takeover-via-gpu-rowhammer\/\" target=\"_blank\" rel=\"nofollow noopener\"><strong>GPUBreach<\/strong> rowhammer attack<\/a> can escalate privileges and lead to a full system compromise.<\/li>\n<li><strong>Marimo&nbsp;<\/strong><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/critical-marimo-pre-auth-rce-flaw-now-under-active-exploitation\/\" target=\"_blank\" rel=\"nofollow noopener\">released a security update<\/a> for a pre-auth RCE flaw that is now being exploited in attacks.<\/li>\n<li><strong>SAP <\/strong><a href=\"https:\/\/support.sap.com\/en\/my-support\/knowledge-base\/security-notes-news\/april-2026.html\" target=\"_blank\" rel=\"nofollow noopener\">released the April security updates<\/a> for multiple products, including a critical SQL Injection vulnerability in SAP Business Planning and Consolidation and SAP Business Warehouse<\/li>\n<li>The <strong>wolfSSL <\/strong>SSL\/TLS library <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/critical-flaw-in-wolfssl-library-enables-forged-certificate-use\/\" target=\"_blank\" rel=\"nofollow noopener\">released a security update<\/a> to fix a flaw that could force a target device or application to accept forged certificates.<\/li>\n<\/ul>\n<h2>The April 2026&nbsp;Patch Tuesday Security Updates<\/h2>\n<p>Below is the complete list of resolved vulnerabilities in the April 2026&nbsp;Patch Tuesday updates.<\/p>\n<p>To&nbsp;access the full description of each vulnerability and the systems&nbsp;it affects, you can view the&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/microsoft-patch-tuesday-reports\/Microsoft-Patch-Tuesday-April-2026.html\" target=\"_blank\" rel=\"nofollow noopener\">full report here<\/a>.<\/p>\n<div style=\"overflow-x:auto\">\n<table align=\"center\" style=\"width:100%\">\n<tbody>\n<tr>\n<th>Tag<\/th>\n<th>CVE ID<\/th>\n<th>CVE Title<\/th>\n<th>Severity<\/th>\n<\/tr>\n<tr>\n<td>.NET<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26171\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26171<\/a><\/td>\n<td>.NET Denial of Service Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>.NET<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32178\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32178<\/a><\/td>\n<td>.NET Spoofing Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>.NET and Visual Studio<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32203\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32203<\/a><\/td>\n<td>.NET and Visual Studio Denial of Service Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>.NET Framework<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-23666\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-23666<\/a><\/td>\n<td>.NET Framework Denial of Service Vulnerability<\/td>\n<td><span>Critical<\/span><\/td>\n<\/tr>\n<tr>\n<td>.NET Framework<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32226\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32226<\/a><\/td>\n<td>.NET Framework Denial of Service Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>.NET, .NET Framework, Visual Studio<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-33116\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-33116<\/a><\/td>\n<td>.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Applocker Filter Driver (applockerfltr.sys)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-25184\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-25184<\/a><\/td>\n<td>Applocker Filter Driver (applockerfltr.sys) Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Azure Logic Apps<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32171\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32171<\/a><\/td>\n<td>Azure Logic Apps Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Azure Monitor Agent<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32192\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32192<\/a><\/td>\n<td>Azure Monitor Agent Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Azure Monitor Agent<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32168\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32168<\/a><\/td>\n<td>Azure Monitor Agent Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Desktop Window Manager<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-27924\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-27924<\/a><\/td>\n<td>Desktop Window Manager Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Desktop Window Manager<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32154\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32154<\/a><\/td>\n<td>Desktop Window Manager Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Desktop Window Manager<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32152\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32152<\/a><\/td>\n<td>Desktop Window Manager Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Desktop Window Manager<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-27923\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-27923<\/a><\/td>\n<td>Desktop Window Manager Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Desktop Window Manager<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32155\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32155<\/a><\/td>\n<td>Desktop Window Manager Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Function Discovery Service (fdwsd.dll)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32087\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32087<\/a><\/td>\n<td>Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Function Discovery Service (fdwsd.dll)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32086\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32086<\/a><\/td>\n<td>Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Function Discovery Service (fdwsd.dll)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32150\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32150<\/a><\/td>\n<td>Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Function Discovery Service (fdwsd.dll)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32093\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32093<\/a><\/td>\n<td>Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>GitHub Copilot and Visual Studio Code<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-23653\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-23653<\/a><\/td>\n<td>GitHub Copilot and Visual Studio Code Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>GitHub Repo: Git for Windows<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32631\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32631<\/a><\/td>\n<td>GitHub: CVE-2026-32631 &#8216;git clone&#8217; from manipulated repositories can leak NTLM hashes<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Input-Output Memory Management Unit (IOMMU)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-20585\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2023-20585<\/a><\/td>\n<td>AMD: CVE-2023-20585 IOMMU Write Buffer Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Brokering File System<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32091\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32091<\/a><\/td>\n<td>Microsoft Brokering File System Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Brokering File System<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32219\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32219<\/a><\/td>\n<td>Microsoft Brokering File System Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Brokering File System<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26181\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26181<\/a><\/td>\n<td>Microsoft Brokering File System Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Defender<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-33825\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-33825<\/a><\/td>\n<td>Microsoft Defender Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Dynamics 365 (on-premises)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-33103\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-33103<\/a><\/td>\n<td>Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32221\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32221<\/a><\/td>\n<td>Windows Graphics Component Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft High Performance Compute Pack (HPC)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32184\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32184<\/a><\/td>\n<td>Microsoft High Performance Compute (HPC) Pack Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Management Console<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-27914\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-27914<\/a><\/td>\n<td>Microsoft Management Console Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32190\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32190<\/a><\/td>\n<td>Microsoft Office Remote Code Execution Vulnerability<\/td>\n<td><span>Critical<\/span><\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office Excel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32199\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32199<\/a><\/td>\n<td>Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office Excel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32198\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32198<\/a><\/td>\n<td>Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office Excel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32197\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32197<\/a><\/td>\n<td>Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office Excel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32188\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32188<\/a><\/td>\n<td>Microsoft Excel Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office Excel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32189\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32189<\/a><\/td>\n<td>Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office PowerPoint<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32200\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32200<\/a><\/td>\n<td>Microsoft PowerPoint Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office SharePoint<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32201\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32201<\/a><\/td>\n<td>Microsoft SharePoint Server Spoofing Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office SharePoint<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20945\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-20945<\/a><\/td>\n<td>Microsoft SharePoint Server Spoofing Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office Word<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-23657\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-23657<\/a><\/td>\n<td>Microsoft Word Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office Word<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-33115\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-33115<\/a><\/td>\n<td>Microsoft Word Remote Code Execution Vulnerability<\/td>\n<td><span>Critical<\/span><\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office Word<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-33114\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-33114<\/a><\/td>\n<td>Microsoft Word Remote Code Execution Vulnerability<\/td>\n<td><span>Critical<\/span><\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office Word<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-33095\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-33095<\/a><\/td>\n<td>Microsoft Word Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office Word<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-33822\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-33822<\/a><\/td>\n<td>Microsoft Word Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Power Apps<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26149\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26149<\/a><\/td>\n<td>Microsoft Power Apps Security Feature Bypass<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft PowerShell<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26143\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26143<\/a><\/td>\n<td>Microsoft PowerShell Security Feature Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft PowerShell<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26170\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26170<\/a><\/td>\n<td>PowerShell Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32181\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32181<\/a><\/td>\n<td>Connected User Experiences and Telemetry Service Denial of Service Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows Search Component<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-27909\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-27909<\/a><\/td>\n<td>Windows Search Service Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows Speech<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32153\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32153<\/a><\/td>\n<td>Windows Speech Runtime Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Node.js<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21637\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-21637<\/a><\/td>\n<td>HackerOne: CVE-2026-21637 TLS PSK\/ALPN Callback Exceptions Bypass Error Handlers<\/td>\n<td>Moderate<\/td>\n<\/tr>\n<tr>\n<td>Remote Desktop Client<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32157\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32157<\/a><\/td>\n<td>Remote Desktop Client Remote Code Execution Vulnerability<\/td>\n<td><span>Critical<\/span><\/td>\n<\/tr>\n<tr>\n<td>Role: Windows Hyper-V<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32149\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32149<\/a><\/td>\n<td>Windows Hyper-V Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Role: Windows Hyper-V<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26156\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26156<\/a><\/td>\n<td>Windows Hyper-V Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-33120\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-33120<\/a><\/td>\n<td>Microsoft SQL Server Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32176\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32176<\/a><\/td>\n<td>SQL Server Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32167\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32167<\/a><\/td>\n<td>SQL Server Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Universal Plug and Play (upnp.dll)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32212\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32212<\/a><\/td>\n<td>Universal Plug and Play (upnp.dll) Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Universal Plug and Play (upnp.dll)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32214\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32214<\/a><\/td>\n<td>Universal Plug and Play (upnp.dll) Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Active Directory<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32072\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32072<\/a><\/td>\n<td>Active Directory Spoofing Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Active Directory<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-33826\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-33826<\/a><\/td>\n<td>Windows Active Directory Remote Code Execution Vulnerability<\/td>\n<td><span>Critical<\/span><\/td>\n<\/tr>\n<tr>\n<td>Windows Admin Center<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32196\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32196<\/a><\/td>\n<td>Windows Admin Center Spoofing Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Advanced Rasterization Platform<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26178\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26178<\/a><\/td>\n<td>Windows Advanced Rasterization Platform Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Ancillary Function Driver for WinSock<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-27922\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-27922<\/a><\/td>\n<td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Ancillary Function Driver for WinSock<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26177\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26177<\/a><\/td>\n<td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Ancillary Function Driver for WinSock<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32073\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32073<\/a><\/td>\n<td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Ancillary Function Driver for WinSock<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26168\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26168<\/a><\/td>\n<td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Ancillary Function Driver for WinSock<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26182\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26182<\/a><\/td>\n<td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Ancillary Function Driver for WinSock<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26173\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26173<\/a><\/td>\n<td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Ancillary Function Driver for WinSock<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-33100\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-33100<\/a><\/td>\n<td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Ancillary Function Driver for WinSock<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-33099\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-33099<\/a><\/td>\n<td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Biometric Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32088\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32088<\/a><\/td>\n<td>Windows Biometric Service Security Feature Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows BitLocker<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-27913\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-27913<\/a><\/td>\n<td>Windows BitLocker Security Feature Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Boot Loader<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-0390\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-0390<\/a><\/td>\n<td>UEFI Secure Boot Security Feature Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Boot Manager<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26175\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26175<\/a><\/td>\n<td>Windows Boot Manager Security Feature Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Client Side Caching driver (csc.sys)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26176\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26176<\/a><\/td>\n<td>Windows Client Side Caching driver (csc.sys) Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Cloud Files Mini Filter Driver<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-27926\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-27926<\/a><\/td>\n<td>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows COM<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32162\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32162<\/a><\/td>\n<td>Windows COM Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows COM<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20806\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-20806<\/a><\/td>\n<td>Windows COM Server Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Common Log File System Driver<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32070\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32070<\/a><\/td>\n<td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Container Isolation FS Filter Driver<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-33098\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-33098<\/a><\/td>\n<td>Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Cryptographic Services<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26152\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26152<\/a><\/td>\n<td>Microsoft Cryptographic Services Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Encrypting File System (EFS)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26153\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26153<\/a><\/td>\n<td>Windows Encrypted File System (EFS) Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows File Explorer<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32084\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32084<\/a><\/td>\n<td>Windows Print Spooler Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows File Explorer<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32079\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32079<\/a><\/td>\n<td>Web Account Manager Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows File Explorer<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32081\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32081<\/a><\/td>\n<td>Package Catalog Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows GDI<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-27931\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-27931<\/a><\/td>\n<td>Windows GDI Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows GDI<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-27930\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-27930<\/a><\/td>\n<td>Windows GDI Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Hello<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-27928\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-27928<\/a><\/td>\n<td>Windows Hello Security Feature Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Hello<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-27906\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-27906<\/a><\/td>\n<td>Windows Hello Security Feature Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows HTTP.sys<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-33096\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-33096<\/a><\/td>\n<td>HTTP.sys Denial of Service Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows IKE Extension<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-33824\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-33824<\/a><\/td>\n<td>Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability<\/td>\n<td><span>Critical<\/span><\/td>\n<\/tr>\n<tr>\n<td>Windows Installer<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-27910\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-27910<\/a><\/td>\n<td>Windows Installer Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Kerberos<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-27912\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-27912<\/a><\/td>\n<td>Windows Kerberos Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32215\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32215<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32218\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32218<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26179\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26179<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32217\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32217<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26163\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26163<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32195\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32195<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26180\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26180<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel Memory<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26169\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26169<\/a><\/td>\n<td>Windows Kernel Memory Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Local Security Authority Subsystem Service (LSASS)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26155\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26155<\/a><\/td>\n<td>Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Local Security Authority Subsystem Service (LSASS)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32071\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32071<\/a><\/td>\n<td>Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows LUAFV<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-27929\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-27929<\/a><\/td>\n<td>Windows LUA File Virtualization Filter Driver Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Management Services<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20930\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-20930<\/a><\/td>\n<td>Windows Management Services Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows OLE<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26162\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26162<\/a><\/td>\n<td>Windows OLE Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Print Spooler Components<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-33101\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-33101<\/a><\/td>\n<td>Windows Print Spooler Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Projected File System<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26184\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26184<\/a><\/td>\n<td>Windows Projected File System Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Projected File System<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32078\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32078<\/a><\/td>\n<td>Windows Projected File System Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Projected File System<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32074\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32074<\/a><\/td>\n<td>Windows Projected File System Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Projected File System<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32069\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32069<\/a><\/td>\n<td>Windows Projected File System Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Projected File System<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-27927\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-27927<\/a><\/td>\n<td>Windows Projected File System Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Push Notifications<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32159\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32159<\/a><\/td>\n<td>Windows Push Notifications Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Push Notifications<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32160\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32160<\/a><\/td>\n<td>Windows Push Notifications Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Push Notifications<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26167\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26167<\/a><\/td>\n<td>Windows Push Notifications Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Push Notifications<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26172\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26172<\/a><\/td>\n<td>Windows Push Notifications Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Push Notifications<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32158\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32158<\/a><\/td>\n<td>Windows Push Notifications Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Recovery Environment Agent<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20928\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-20928<\/a><\/td>\n<td>Windows Recovery Environment Security Feature Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Redirected Drive Buffering<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32216\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32216<\/a><\/td>\n<td>Windows Redirected Drive Buffering System Denial of Service Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Remote Desktop<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26151\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26151<\/a><\/td>\n<td>Remote Desktop Spoofing Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Remote Desktop Licensing Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26159\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26159<\/a><\/td>\n<td>Remote Desktop Licensing Service Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Remote Desktop Licensing Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26160\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26160<\/a><\/td>\n<td>Remote Desktop Licensing Service Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Remote Procedure Call<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32085\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32085<\/a><\/td>\n<td>Remote Procedure Call Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows RPC API<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26183\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26183<\/a><\/td>\n<td>Remote Access Management service\/API (RPC server) Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Secure Boot<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-25250\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-25250<\/a><\/td>\n<td>MITRE: CVE-2026-25250 Secure Boot disable Eazy Fix<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Sensor Data Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26161\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26161<\/a><\/td>\n<td>Windows Sensor Data Service Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Server Update Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32224\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32224<\/a><\/td>\n<td>Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Server Update Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26174\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26174<\/a><\/td>\n<td>Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Server Update Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26154\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26154<\/a><\/td>\n<td>Windows Server Update Service (WSUS) Tampering Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Shell<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-27918\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-27918<\/a><\/td>\n<td>Windows Shell Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Shell<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26165\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26165<\/a><\/td>\n<td>Windows Shell Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Shell<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26166\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-26166<\/a><\/td>\n<td>Windows Shell Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Shell<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32225\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32225<\/a><\/td>\n<td>Windows Shell Security Feature Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Shell<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32151\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32151<\/a><\/td>\n<td>Windows Shell Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Shell<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32202\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32202<\/a><\/td>\n<td>Windows Shell Spoofing Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Snipping Tool<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32183\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32183<\/a><\/td>\n<td>Windows Snipping Tool Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Snipping Tool<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-33829\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-33829<\/a><\/td>\n<td>Windows Snipping Tool Spoofing Vulnerability<\/td>\n<td>Moderate<\/td>\n<\/tr>\n<tr>\n<td>Windows Speech Brokered Api<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32089\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32089<\/a><\/td>\n<td>Windows Speech Brokered Api Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Speech Brokered Api<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32090\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32090<\/a><\/td>\n<td>Windows Speech Brokered Api Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows SSDP Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32083\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32083<\/a><\/td>\n<td>Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows SSDP Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32082\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32082<\/a><\/td>\n<td>Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows SSDP Service<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32068\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32068<\/a><\/td>\n<td>Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Storage Spaces Controller<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32076\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32076<\/a><\/td>\n<td>Windows Storage Spaces Controller Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Storage Spaces Controller<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-27907\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-27907<\/a><\/td>\n<td>Windows Storage Spaces Controller Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows TCP\/IP<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-27921\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-27921<\/a><\/td>\n<td>Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows TCP\/IP<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-33827\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-33827<\/a><\/td>\n<td>Windows TCP\/IP Remote Code Execution Vulnerability<\/td>\n<td><span>Critical<\/span><\/td>\n<\/tr>\n<tr>\n<td>Windows TDI Translation Driver (tdx.sys)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-27908\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-27908<\/a><\/td>\n<td>Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Universal Plug and Play (UPnP) Device Host<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-27916\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-27916<\/a><\/td>\n<td>Windows UPnP Device Host Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Universal Plug and Play (UPnP) Device Host<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32156\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32156<\/a><\/td>\n<td>Windows UPnP Device Host Remote Code Execution Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Universal Plug and Play (UPnP) Device Host<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32077\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32077<\/a><\/td>\n<td>Windows UPnP Device Host Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Universal Plug and Play (UPnP) Device Host<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-27915\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-27915<\/a><\/td>\n<td>Windows UPnP Device Host Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Universal Plug and Play (UPnP) Device Host<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-27919\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-27919<\/a><\/td>\n<td>Windows UPnP Device Host Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Universal Plug and Play (UPnP) Device Host<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-27925\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-27925<\/a><\/td>\n<td>Windows UPnP Device Host Information Disclosure Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Universal Plug and Play (UPnP) Device Host<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32075\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32075<\/a><\/td>\n<td>Windows UPnP Device Host Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Universal Plug and Play (UPnP) Device Host<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-27920\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-27920<\/a><\/td>\n<td>Windows UPnP Device Host Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows USB Print Driver<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32223\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32223<\/a><\/td>\n<td>Windows USB Printing Stack (usbprint.sys) Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows User Interface Core<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32165\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32165<\/a><\/td>\n<td>Windows User Interface Core Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows User Interface Core<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32164\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32164<\/a><\/td>\n<td>Windows User Interface Core Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows User Interface Core<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-27911\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-27911<\/a><\/td>\n<td>Windows User Interface Core Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows User Interface Core<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32163\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32163<\/a><\/td>\n<td>Windows User Interface Core Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Virtualization-Based Security (VBS) Enclave<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-23670\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-23670<\/a><\/td>\n<td>Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Virtualization-Based Security (VBS) Enclave<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32220\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32220<\/a><\/td>\n<td>UEFI Secure Boot Security Feature Bypass Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows WalletService<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32080\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32080<\/a><\/td>\n<td>Windows WalletService Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys)<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-27917\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-27917<\/a><\/td>\n<td>Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Win32K &#8211; GRFX<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-33104\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-33104<\/a><\/td>\n<td>Win32k Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<tr>\n<td>Windows Win32K &#8211; ICOMP<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-32222\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-32222<\/a><\/td>\n<td>Windows Win32k Elevation of Privilege Vulnerability<\/td>\n<td>Important<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus-whitepaper.jpg\" alt=\"Microsoft April 2026 Patch Tuesday fixes 167 flaws, 2 zero-days\">         <\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Automated Pentesting Covers Only 1 of 6 Surfaces.<\/a><\/h2>\n<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.<\/p>\n<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.<\/p>\n<p>           <button><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Get Your Copy Now<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-march-2026-patch-tuesday-fixes-2-zero-days-79-flaws\/\">Microsoft March 2026 Patch Tuesday fixes 2 zero-days, 79 flaws<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-february-2026-patch-tuesday-fixes-6-zero-days-58-flaws\/\">Microsoft February 2026 Patch Tuesday fixes 6 zero-days, 58 flaws<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit\/\">Disgruntled researcher leaks &ldquo;BlueHammer&rdquo; Windows zero-day exploit<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-releases-windows-10-kb5078885-extended-security-update\/\">Microsoft releases Windows 10 KB5078885 extended security update<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-to-enable-hotpatch-security-updates-by-default-in-may\/\">Microsoft to enable Windows hotpatch security updates by default<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Today is Microsoft&#8217;s April 2026&nbsp;Patch Tuesda [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45388","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45388"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45388\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}