Autor: Peter Leibling

CVE-2026-21224 Azure Connected Machine Agent Elevation of Privilege Vulnerability

Stack-based buffer overflow in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally.

CVE-2026-20920 Win32k Elevation of Privilege Vulnerability

Use after free in Windows Win32K – ICOMP allows an authorized attacker to elevate privileges locally.

CVE-2026-20922 Windows NTFS Remote Code Execution Vulnerability

Heap-based buffer overflow in Windows NTFS allows an authorized attacker to execute code locally.

CVE-2026-20919 Windows SMB Server Elevation of Privilege Vulnerability

Concurrent execution using shared resource with improper synchronization (‚race condition‘) in Windows SMB Server allows an authorized attacker to elevate privileges over a network.

CVE-2026-20853 Windows WalletService Elevation of Privilege Vulnerability

Concurrent execution using shared resource with improper synchronization (‚race condition‘) in Windows WalletService allows an unauthorized attacker to elevate privileges locally.

CVE-2026-20873 Windows Management Services Elevation of Privilege Vulnerability

Concurrent execution using shared resource with improper synchronization (‚race condition‘) in Windows Management Services allows an authorized attacker to elevate privileges locally.

CVE-2026-20957 Microsoft Excel Remote Code Execution Vulnerability

Integer underflow (wrap or wraparound) in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

CVE-2026-20959 Microsoft SharePoint Server Spoofing Vulnerability

Improper neutralization of input during web page generation (‚cross-site scripting‘) in Microsoft Office SharePoint allows an authorized attacker to perform spoofing over a network.

CVE-2026-20944 Microsoft Word Remote Code Execution Vulnerability

Out-of-bounds read in Microsoft Office Word allows an unauthorized attacker to execute code locally.

CVE-2026-20949 Microsoft Excel Security Feature Bypass Vulnerability

Improper access control in Microsoft Office Excel allows an unauthorized attacker to bypass a security feature locally.