A vulnerability categorized as critical has been discovered in Microsoft Windows 11 23H2/11 24H2/11 25H2. Affected by this vulnerability is an unknown functionality of the component Virtualization-Based Security. The manipulation results in untrusted pointer dereference.
This vulnerability is cataloged as CVE-2026-20938. The attack must be initiated from a local position. There is no exploit available.
Applying a patch is advised to resolve this issue.
A vulnerability labeled as critical has been found in Microsoft Windows. This affects an unknown part of the component Cloud Files Mini Filter Driver. Such manipulation leads to untrusted pointer dereference.
This vulnerability is documented as CVE-2026-20940. The attack needs to be performed locally. There is not any exploit available.
A patch should be applied to remediate this issue.
A vulnerability described as critical has been identified in Microsoft Office. This issue affects some unknown processing. Executing a manipulation can lead to untrusted search path.
This vulnerability appears as CVE-2026-20943. The attack requires local access. There is no available exploit.
It is advisable to implement a patch to correct this issue.
A vulnerability classified as critical has been found in Microsoft Word. Impacted is an unknown function. The manipulation leads to out-of-bounds read.
This vulnerability is traded as CVE-2026-20944. It is possible to initiate the attack remotely. There is no exploit available.
Applying a patch is the recommended action to fix this issue.
A vulnerability, which was classified as critical, has been found in Microsoft Windows Admin Center in Azure Portal. Affected is an unknown function. Performing a manipulation results in improper verification of cryptographic signature.
This vulnerability is known as CVE-2026-20965. Attacking locally is a requirement. No exploit is available.
Applying a patch is the recommended action to fix this issue.
A vulnerability has been found in Microsoft Windows 11 24H2/11 25H2/Server 2025 and classified as critical. Affected by this issue is some unknown functionality of the component Capability Access Management Service. The manipulation leads to race condition.
This vulnerability is uniquely identified as CVE-2026-21221. Local access is required to approach this attack. No exploit exists.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as critical, has been found in Microsoft SharePoint Server. The impacted element is an unknown function. This manipulation causes sql injection.
This vulnerability is handled as CVE-2026-20947. The attack can be initiated remotely. There is not any exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Windows 11 23H2/Server 2022/Server 2022 23H2. It has been rated as critical. The impacted element is an unknown function of the component Win32k. Performing a manipulation results in use after free.
This vulnerability is cataloged as CVE-2026-20920. The attack must be initiated from a local position. There is no exploit available.
It is suggested to install a patch to address this issue.
A vulnerability categorized as critical has been discovered in Microsoft Windows. This affects an unknown function of the component SMB Server. Executing a manipulation can lead to race condition.
This vulnerability is registered as CVE-2026-20921. It is possible to launch the attack remotely. No exploit is available.
A patch should be applied to remediate this issue.
A vulnerability identified as critical has been detected in Microsoft Windows. This impacts an unknown function of the component NTFS. The manipulation leads to heap-based buffer overflow.
This vulnerability is documented as CVE-2026-20922. The attack needs to be performed locally. There is not any exploit available.
To fix this issue, it is recommended to deploy a patch.
A vulnerability labeled as critical has been found in Microsoft Windows. Affected is an unknown function of the component Management Services. The manipulation results in use after free.
This vulnerability is reported as CVE-2026-20923. The attack requires a local approach. No exploit exists.
It is advisable to implement a patch to correct this issue.
A vulnerability marked as critical has been reported in Microsoft Windows. Affected by this vulnerability is an unknown functionality of the component Management Services. This manipulation causes use after free.
This vulnerability appears as CVE-2026-20924. The attack requires local access. There is no available exploit.
Applying a patch is the recommended action to fix this issue.
A vulnerability described as problematic has been identified in Microsoft Windows. Affected by this issue is some unknown functionality of the component NTLM Hash. Such manipulation leads to file inclusion.
This vulnerability is traded as CVE-2026-20925. The attack may be launched remotely. There is no exploit available.
It is best practice to apply a patch to resolve this issue.
A vulnerability classified as critical has been found in Microsoft Windows. This affects an unknown part of the component SMB Server. Performing a manipulation results in race condition.
This vulnerability is known as CVE-2026-20926. Remote exploitation of the attack is possible. No exploit is available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic was found in Microsoft Windows. This vulnerability affects unknown code of the component SMB Server. Executing a manipulation can lead to race condition.
This vulnerability is handled as CVE-2026-20927. The attack can be executed remotely. There is not any exploit available.
Applying a patch is advised to resolve this issue.