Autor: Peter Leibling

CVE-2026-23669 Windows Print Spooler Remote Code Execution Vulnerability

Use after free in Windows Print Spooler Components allows an authorized attacker to execute code over a network.

CVE-2026-25166 Windows System Image Manager Assessment and Deployment Kit (ADK) Remote Code Execution Vulnerability

Deserialization of untrusted data in Windows System Image Manager allows an authorized attacker to execute code locally.

CVE-2026-25170 Windows Hyper-V Elevation of Privilege Vulnerability

Use after free in Windows Hyper-V allows an authorized attacker to elevate privileges locally.

CVE-2026-23671 Windows Bluetooth RFCOM Protocol Driver Elevation of Privilege Vulnerability

Concurrent execution using shared resource with improper synchronization (‚race condition‘) in Windows Bluetooth RFCOM Protocol Driver allows an authorized attacker to elevate privileges locally.

CVE-2026-25178 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

CVE-2026-20967 System Center Operations Manager (SCOM) Elevation of Privilege Vulnerability

Improper input validation in System Center Operations Manager allows an authorized attacker to elevate privileges over a network.

CVE-2026-25168 Windows Graphics Component Denial of Service Vulnerability

Null pointer dereference in Microsoft Graphics Component allows an unauthorized attacker to deny service locally.

CVE-2026-25187 Winlogon Elevation of Privilege Vulnerability

Improper link resolution before file access (‚link following‘) in Winlogon allows an authorized attacker to elevate privileges locally.

CVE-2026-26106 Microsoft SharePoint Server Remote Code Execution Vulnerability

Improper input validation in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

CVE-2026-25185 Windows Shell Link Processing Spoofing Vulnerability

Exposure of sensitive information to an unauthorized actor in Windows Shell Link Processing allows an unauthorized attacker to perform spoofing over a network.