7.8
CVE-2026-20865 - Windows Management Services Elevation of Privilege Vulnerability
Use after free in Windows Management Services allows an authorized attacker to elevate privileges locally.
7.8
CVE-2026-20864 - Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
Heap-based buffer overflow in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally.
7.8
CVE-2026-20860 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Access of resource using incompatible type ('type confusion') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
7.8
CVE-2026-20859 - Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
Use after free in Windows Kernel-Mode Drivers allows an authorized attacker to elevate privileges locally.
7.8
CVE-2026-20858 - Windows Management Services Elevation of Privilege Vulnerability
Use after free in Windows Management Services allows an authorized attacker to elevate privileges locally.
7.8
CVE-2026-20857 - Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
Untrusted pointer dereference in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.
8.1
CVE-2026-20856 - Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
Improper input validation in Windows Server Update Service allows an unauthorized attacker to execute code over a network.
7.7
CVE-2026-20852 - Windows Hello Tampering Vulnerability
Incorrect privilege assignment in Windows Hello allows an unauthorized attacker to perform tampering locally.
6.2
CVE-2026-20851 - Capability Access Management Service (camsvc) Information Disclosure Vulnerability
Out-of-bounds read in Capability Access Management Service (camsvc) allows an unauthorized attacker to disclose information locally.
6.5
CVE-2026-20847 - Microsoft Windows File Explorer Spoofing Vulnerability
Exposure of sensitive information to an unauthorized actor in Windows Shell allows an authorized attacker to perform spoofing over a network.