14 kwietnia 2026 r. firma Microsoft opublikowała biuletyny bezpieczeństwa adresujące luki w wielu produktach. Zestawienie zawiera krytyczne aktualizacje dla następujących rozwiązań:
- .NET 8.0, 9.0 oraz 10.0 zainstalowanych w systemach Linux, macOS oraz Windows
- Azure Logic Apps oraz Azure Monitor Agent
- Microsoft .NET Framework (w tym wersje 3.5, 4.8.1 oraz 4.6.2/4.7/4.7.1/4.7.2)
- Microsoft 365 Apps for Enterprise
- Microsoft Defender Antimalware Platform
- Microsoft Dynamics 365
- Microsoft Excel 2016 oraz Microsoft PowerPoint 2016
- Microsoft HPC Pack 2019
- Microsoft Office (wersje 2016, 2019, LTSC 2021, LTSC 2024 oraz wersje LTSC dla komputerów Mac 2021 i 2024)
- Microsoft Power Apps
- Microsoft SQL Server (wersje 2016, 2017, 2019, 2022 oraz 2025)
- Microsoft SharePoint (Enterprise Server 2016, Server 2019 oraz Subscription Edition)
- Microsoft Visual Studio 2022 oraz rozszerzenie CoPilot Chat dla Visual Studio Code
- Office Online Server
- PowerShell
- Remote Desktop client oraz Windows App Client dla systemów stacjonarnych Windows
- Windows 10 oraz Windows 11
- Windows Admin Center
- Windows Server (wersje 2012, 2012 R2, 2016, 2019, 2022 oraz 2025)
Microsoft otrzymał zgłoszenia potwierdzające, że luka o numerze CVE-2026-32201 jest aktywnie wykorzystywana przez atakujących. Zaleca się niezwłoczną instalację dostępnych poprawek w celu zabezpieczenia infrastruktury.
| Tytuł | Numer CVE | Krytyczność | CVSS |
| Windows Boot Loader | CVE-2026-0390 | 6.7 | AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows COM | CVE-2026-20806 | 5.5 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
| Windows Recovery Environment Agent | CVE-2026-20928 | 4.6 | AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
| Windows Management Services | CVE-2026-20930 | 7.8 | AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Microsoft Office SharePoint | CVE-2026-20945 | 4.6 | AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C |
| GitHub Copilot and Visual Studio Code | CVE-2026-23653 | 5.7 | AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
| Microsoft Office Word | CVE-2026-23657 | 7.8 | AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| .NET Framework | CVE-2026-23666 | 7.5 | AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
| Windows Virtualization-Based Security (VBS) Enclave | CVE-2026-23670 | 5.7 | AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
| Applocker Filter Driver (applockerfltr.sys) | CVE-2026-25184 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Microsoft PowerShell | CVE-2026-26143 | 7.8 | AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Microsoft Power Apps | CVE-2026-26149 | 9.0 | AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:T/RC:C |
| Windows Remote Desktop | CVE-2026-26151 | 7.1 | AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
| Windows Cryptographic Services | CVE-2026-26152 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Encrypting File System (EFS) | CVE-2026-26153 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Server Update Service | CVE-2026-26154 | 7.5 | AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
| Windows Local Security Authority Subsystem Service (LSASS) | CVE-2026-26155 | 6.5 | AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
| Role: Windows Hyper-V | CVE-2026-26156 | 7.8 | AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Remote Desktop Licensing Service | CVE-2026-26159 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Remote Desktop Licensing Service | CVE-2026-26160 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Sensor Data Service | CVE-2026-26161 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows OLE | CVE-2026-26162 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Kernel | CVE-2026-26163 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Shell | CVE-2026-26165 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Shell | CVE-2026-26166 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Push Notifications | CVE-2026-26167 | 8.8 | AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Ancillary Function Driver for WinSock | CVE-2026-26168 | 7.8 | AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Kernel Memory | CVE-2026-26169 | 6.1 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
| Microsoft PowerShell | CVE-2026-26170 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| .NET | CVE-2026-26171 | 7.5 | AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
| Windows Push Notifications | CVE-2026-26172 | 7.8 | AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Ancillary Function Driver for WinSock | CVE-2026-26173 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Server Update Service | CVE-2026-26174 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Boot Manager | CVE-2026-26175 | 4.6 | AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
| Windows Client Side Caching driver (csc.sys) | CVE-2026-26176 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Ancillary Function Driver for WinSock | CVE-2026-26177 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Advanced Rasterization Platform | CVE-2026-26178 | 8.8 | AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Kernel | CVE-2026-26179 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Kernel | CVE-2026-26180 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Microsoft Brokering File System | CVE-2026-26181 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Ancillary Function Driver for WinSock | CVE-2026-26182 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows RPC API | CVE-2026-26183 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Projected File System | CVE-2026-26184 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Hello | CVE-2026-27906 | 4.4 | AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
| Windows Storage Spaces Controller | CVE-2026-27907 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows TDI Translation Driver (tdx.sys) | CVE-2026-27908 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Microsoft Windows Search Component | CVE-2026-27909 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Installer | CVE-2026-27910 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows User Interface Core | CVE-2026-27911 | 7.8 | AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Kerberos | CVE-2026-27912 | 8.0 | AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows BitLocker | CVE-2026-27913 | 7.7 | AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
| Microsoft Management Console | CVE-2026-27914 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Universal Plug and Play (UPnP) Device Host | CVE-2026-27915 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Universal Plug and Play (UPnP) Device Host | CVE-2026-27916 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) | CVE-2026-27917 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Shell | CVE-2026-27918 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Universal Plug and Play (UPnP) Device Host | CVE-2026-27919 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Universal Plug and Play (UPnP) Device Host | CVE-2026-27920 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows TCP/IP | CVE-2026-27921 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Ancillary Function Driver for WinSock | CVE-2026-27922 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Desktop Window Manager | CVE-2026-27923 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Desktop Window Manager | CVE-2026-27924 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Universal Plug and Play (UPnP) Device Host | CVE-2026-27925 | 6.5 | AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
| Windows Cloud Files Mini Filter Driver | CVE-2026-27926 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Projected File System | CVE-2026-27927 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Hello | CVE-2026-27928 | 8.7 | AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C |
| Windows LUAFV | CVE-2026-27929 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows GDI | CVE-2026-27930 | 5.5 | AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
| Windows GDI | CVE-2026-27931 | 5.5 | AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
| Windows SSDP Service | CVE-2026-32068 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Projected File System | CVE-2026-32069 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Common Log File System Driver | CVE-2026-32070 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Local Security Authority Subsystem Service (LSASS) | CVE-2026-32071 | 7.5 | AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
| Windows Active Directory | CVE-2026-32072 | 6.2 | AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
| Windows Ancillary Function Driver for WinSock | CVE-2026-32073 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Projected File System | CVE-2026-32074 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Universal Plug and Play (UPnP) Device Host | CVE-2026-32075 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Storage Spaces Controller | CVE-2026-32076 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Universal Plug and Play (UPnP) Device Host | CVE-2026-32077 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Projected File System | CVE-2026-32078 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows File Explorer | CVE-2026-32079 | 5.5 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
| Windows WalletService | CVE-2026-32080 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows File Explorer | CVE-2026-32081 | 5.5 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
| Windows SSDP Service | CVE-2026-32082 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows SSDP Service | CVE-2026-32083 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows File Explorer | CVE-2026-32084 | 5.5 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
| Windows Remote Procedure Call | CVE-2026-32085 | 5.5 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
| Function Discovery Service (fdwsd.dll) | CVE-2026-32086 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Function Discovery Service (fdwsd.dll) | CVE-2026-32087 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Biometric Service | CVE-2026-32088 | 6.1 | AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
| Windows Speech Brokered Api | CVE-2026-32089 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Speech Brokered Api | CVE-2026-32090 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Microsoft Brokering File System | CVE-2026-32091 | 8.4 | AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Function Discovery Service (fdwsd.dll) | CVE-2026-32093 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Role: Windows Hyper-V | CVE-2026-32149 | 7.3 | AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Function Discovery Service (fdwsd.dll) | CVE-2026-32150 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Shell | CVE-2026-32151 | 6.5 | AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
| Desktop Window Manager | CVE-2026-32152 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Microsoft Windows Speech | CVE-2026-32153 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Desktop Window Manager | CVE-2026-32154 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Desktop Window Manager | CVE-2026-32155 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Universal Plug and Play (UPnP) Device Host | CVE-2026-32156 | 7.4 | AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Remote Desktop Client | CVE-2026-32157 | 8.8 | AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Push Notifications | CVE-2026-32158 | 7.8 | AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Push Notifications | CVE-2026-32159 | 7.8 | AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Push Notifications | CVE-2026-32160 | 7.8 | AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows COM | CVE-2026-32162 | 8.4 | AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows User Interface Core | CVE-2026-32163 | 7.8 | AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows User Interface Core | CVE-2026-32164 | 7.8 | AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows User Interface Core | CVE-2026-32165 | 7.8 | AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
| SQL Server | CVE-2026-32167 | 6.7 | AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Azure Monitor Agent | CVE-2026-32168 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Azure Logic Apps | CVE-2026-32171 | 8.8 | AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| SQL Server | CVE-2026-32176 | 6.7 | AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| .NET | CVE-2026-32178 | 7.5 | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
| Microsoft Windows | CVE-2026-32181 | 5.5 | AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
| Windows Snipping Tool | CVE-2026-32183 | 7.8 | AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Microsoft High Performance Compute Pack (HPC) | CVE-2026-32184 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Microsoft Office Excel | CVE-2026-32188 | 7.1 | AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
| Microsoft Office Excel | CVE-2026-32189 | 7.8 | AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Microsoft Office | CVE-2026-32190 | 8.4 | AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Azure Monitor Agent | CVE-2026-32192 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Kernel | CVE-2026-32195 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Admin Center | CVE-2026-32196 | 6.1 | AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C |
| Microsoft Office Excel | CVE-2026-32197 | 7.8 | AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Microsoft Office Excel | CVE-2026-32198 | 7.8 | AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Microsoft Office Excel | CVE-2026-32199 | 7.8 | AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Microsoft Office PowerPoint | CVE-2026-32200 | 7.8 | AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Microsoft Office SharePoint | CVE-2026-32201 | 6.5 | AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:F/RL:O/RC:C |
| Windows Shell | CVE-2026-32202 | 4.3 | AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
| .NET and Visual Studio | CVE-2026-32203 | 7.5 | AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
| Universal Plug and Play (upnp.dll) | CVE-2026-32212 | 5.5 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
| Universal Plug and Play (upnp.dll) | CVE-2026-32214 | 5.5 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
| Windows Kernel | CVE-2026-32215 | 5.5 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
| Windows Redirected Drive Buffering | CVE-2026-32216 | 5.5 | AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
| Windows Kernel | CVE-2026-32217 | 5.5 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
| Windows Kernel | CVE-2026-32218 | 5.5 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
| Microsoft Brokering File System | CVE-2026-32219 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Virtualization-Based Security (VBS) Enclave | CVE-2026-32220 | 4.4 | AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
| Microsoft Graphics Component | CVE-2026-32221 | 8.4 | AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Win32K – ICOMP | CVE-2026-32222 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows USB Print Driver | CVE-2026-32223 | 6.8 | AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Server Update Service | CVE-2026-32224 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Shell | CVE-2026-32225 | 8.8 | AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| .NET Framework | CVE-2026-32226 | 5.9 | AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
| Microsoft Office Word | CVE-2026-33095 | 7.8 | AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows HTTP.sys | CVE-2026-33096 | 7.5 | AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
| Windows Container Isolation FS Filter Driver | CVE-2026-33098 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Ancillary Function Driver for WinSock | CVE-2026-33099 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Ancillary Function Driver for WinSock | CVE-2026-33100 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Print Spooler Components | CVE-2026-33101 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Microsoft Dynamics 365 (on-premises) | CVE-2026-33103 | 5.5 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
| Windows Win32K – GRFX | CVE-2026-33104 | 7.0 | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Microsoft Office Word | CVE-2026-33114 | 8.4 | AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Microsoft Office Word | CVE-2026-33115 | 8.4 | AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| .NET, .NET Framework, Visual Studio | CVE-2026-33116 | 7.5 | AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
| Microsoft Edge (Chromium-based) | CVE-2026-33118 | 4.3 | AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
| Microsoft Edge (Chromium-based) | CVE-2026-33119 | 5.4 | AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C |
| SQL Server | CVE-2026-33120 | 8.8 | AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Microsoft Office Word | CVE-2026-33822 | 6.1 | AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C |
| Windows IKE Extension | CVE-2026-33824 | 9.8 | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Microsoft Defender | CVE-2026-33825 | 7.8 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
| Windows Active Directory | CVE-2026-33826 | 8.0 | AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows TCP/IP | CVE-2026-33827 | 8.1 | AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
| Windows Snipping Tool | CVE-2026-33829 | 4.3 | AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |