{"id":2491,"date":"2026-04-14T18:04:17","date_gmt":"2026-04-14T18:04:17","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/microsoft-patch-tuesday-april-2026-tue-apr-14th\/"},"modified":"2026-04-14T18:04:17","modified_gmt":"2026-04-14T18:04:17","slug":"microsoft-patch-tuesday-april-2026-tue-apr-14th","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/microsoft-patch-tuesday-april-2026-tue-apr-14th\/","title":{"rendered":"Microsoft Patch Tuesday April 2026., (Tue, Apr 14th)"},"content":{"rendered":"<div>\n<p>This month&#8217;s Microsoft Patch Tuesday looks like a record one, but let&#8217;s look at it a bit closer to understand what is happening<\/p>\n<p>The update patches a total of 243 vulnerabilities. However, 78 of them are Chromium issues affecting Microsoft Edge. Patches for Edge were released earlier. This leaves 165 vulnerabilities that are not Edge-related. Of these, 8 are rated critical, and 154 are important. One vulnerability has already been exploited, and another was made public before today but has not yet been seen in the wild.<\/p>\n<p>Noteworthy Vulnerabilities:<\/p>\n<p>CVE-2026-33827 (Windows TCP\/IP Remote Code Execution Vulnerability): As a packet nerd, I love these types of vulnerabilities. Need to know more to really figure out the impact. Microsoft describes this as a race condition, allowing attackers to execute arbitrary code over the network. Exploitation is likely tricky, but never underestimate the creativity of an AI aided attacker.<\/p>\n<p>CVE-2026-33825 (Microsoft Defender Elevation of Privilege Vulnerability): This vulnerability has already been disclosed.\u00a0<\/p>\n<p>CVE-2026-32201 (Microsoft SharePoint Server Spoofing Vulnerability): Two similar SharePoint server spoofing vulnerabilities were patched this month. Both are rated important, and this particular one is already being exploited.\u00a0<\/p>\n<p>CVE-2026-33826 (Windows Active Directory Remote Code Execution Vulnerability): CVSS score of &#8220;only&#8221; 8.0, but critical according to Microsoft.\u00a0<\/p>\n<p>CVE-2026-32190 (Microsoft Office Remote Code Execution Vulnerability): Standard fair for every monthly patch Tuesday. These are often the more worrisome vulnerabilities. Two additional critical RCE vulnerabilities affect Word (CVE-2026-33114,\u00a0CVE-2026-33115).\u00a0<\/p>\n<p>CVE-2026-32157 (Remote Desktop Client Remote Code Execution Vulnerability): Typically, these vulnerabilities require a user to connect to a malicious RDP server, but connections may be initiated by clicking on an &#8220;rdp:&#8221; link.<\/p>\n<p>CVE-2026-33824 (Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability): IKE, part of IPSEC, is usually not enabled by default. It isn&#8217;t clear yet what the exact exploitation requirements are (will update once MSFT&#8217;s page responds again)<\/p>\n<p>CVE-2026-23666 (.NET Framework Denial of Service Vulnerability): Just a denial of service. Not sure why this deserved &#8220;critical&#8221;.<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<table class=\"msfttable\">\n<thead class=\"msftthead\">\n<tr>\n<th colspan=\"8\">Description<\/th>\n<\/tr>\n<tr>\n<th>CVE<\/th>\n<th>Disclosed<\/th>\n<th>Exploited<\/th>\n<th>Exploitability (old versions)<\/th>\n<th>current version<\/th>\n<th>Severity<\/th>\n<th>CVSS Base (AVG)<\/th>\n<th>CVSS Temporal (AVG)<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td colspan=\"8\">.NET Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26171%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.5<\/td>\n<td>6.5<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">.NET Framework Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32226%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>5.9<\/td>\n<td>5.2<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-23666%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftcritical\">Critical<\/td>\n<td>7.5<\/td>\n<td>6.7<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">.NET Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32178%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.5<\/td>\n<td>6.5<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">.NET and Visual Studio Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32203%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.5<\/td>\n<td>6.5<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-33116%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.5<\/td>\n<td>6.5<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Active Directory Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32072%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>6.2<\/td>\n<td>5.4<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Applocker Filter Driver (applockerfltr.sys) Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-25184%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Azure Logic Apps Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32171%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>8.8<\/td>\n<td>7.7<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Azure Monitor Agent Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32168%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32192%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5272 Heap buffer overflow in GPU<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5272%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5273 Use after free in CSS<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5273%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5274 Integer overflow in Codecs<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5274%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5275 Heap buffer overflow in ANGLE<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5275%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5276 Insufficient policy enforcement in WebUSB<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5276%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5277 Integer overflow in ANGLE<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5277%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5279 Object corruption in V8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5279%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5280 Use after free in WebCodecs<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5280%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5281 Use after free in Dawn<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5281%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5283 Inappropriate implementation in ANGLE<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5283%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5284 Use after free in Dawn<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5284%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5285 Use after free in WebGL<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5285%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5286 Use after free in Dawn<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5286%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5287 Use after free in PDF<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5287%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5289 Use after free in Navigation<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5289%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5290 Use after free in Compositing<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5290%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5291 Inappropriate implementation in WebGL<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5291%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5292 Out of bounds read in WebCodecs<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5292%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5858 Heap buffer overflow in WebML<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5858%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5859 Integer overflow in WebML<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5859%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5860 Use after free in WebRTC<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5860%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5861 Use after free in V8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5861%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5862 Inappropriate implementation in V8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5862%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5863 Inappropriate implementation in V8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5863%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5864 Heap buffer overflow in WebAudio<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5864%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5865 Type Confusion in V8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5865%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5866 Use after free in Media<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5866%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5867 Heap buffer overflow in WebML<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5867%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5868 Heap buffer overflow in ANGLE<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5868%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5869 Heap buffer overflow in WebML<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5869%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5870 Integer overflow in Skia<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5870%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5871 Type Confusion in V8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5871%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5872 Use after free in Blink<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5872%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5873 Out of bounds read and write in V8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5873%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5874 Use after free in PrivateAI<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5874%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5875 Policy bypass in Blink<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5875%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5876 Side-channel information leakage in Navigation<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5876%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5877 Use after free in Navigation<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5877%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5878 Incorrect security UI in Blink<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5878%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5879 Insufficient validation of untrusted input in ANGLE<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5879%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5880 Incorrect security UI in browser UI<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5880%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5881 Policy bypass in LocalNetworkAccess<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5881%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5882 Incorrect security UI in Fullscreen<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5882%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5883 Use after free in Media<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5883%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5884 Insufficient validation of untrusted input in Media<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5884%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5885 Insufficient validation of untrusted input in WebML<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5885%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5886 Out of bounds read in WebAudio<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5886%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5887 Insufficient validation of untrusted input in Downloads<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5887%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5888 Uninitialized Use in WebCodecs<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5888%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5889 Cryptographic Flaw in PDFium<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5889%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5890 Race in WebCodecs<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5890%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5891 Insufficient policy enforcement in browser UI<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5891%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5892 Insufficient policy enforcement in PWAs<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5892%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5893 Race in V8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5893%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5894 Inappropriate implementation in PDF<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5894%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5895 Incorrect security UI in Omnibox<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5895%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5896 Policy bypass in Audio<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5896%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5897 Incorrect security UI in Downloads<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5897%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5898 Incorrect security UI in Omnibox<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5898%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5899 Incorrect security UI in History Navigation<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5899%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5900 Policy bypass in Downloads<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5900%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5901 Policy bypass in DevTools<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5901%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5902 Race in Media<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5902%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5903 Policy bypass in IFrameSandbox<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5903%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5904 Use after free in V8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5904%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5905 Incorrect security UI in Permissions<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5905%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5906 Incorrect security UI in Omnibox<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5906%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5907 Insufficient data validation in Media<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5907%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5908 Integer overflow in Media<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5908%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5909 Integer overflow in Media<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5909%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5910 Integer overflow in Media<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5910%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5911 Policy bypass in ServiceWorkers<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5911%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5912 Integer overflow in WebRTC<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5912%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5913 Out of bounds read in Blink<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5913%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5914 Type Confusion in CSS<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5914%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5915 Insufficient validation of untrusted input in WebML<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5915%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5918 Inappropriate implementation in Navigation<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5918%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Chromium: CVE-2026-5919 Insufficient validation of untrusted input in WebSockets<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-5919%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msft-\">&#8211;<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Connected User Experiences and Telemetry Service Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32181%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>5.5<\/td>\n<td>4.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Desktop Window Manager Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-27924%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32152%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32154%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-27923%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32155%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">GitHub Copilot and Visual Studio Code Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-23653%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>5.7<\/td>\n<td>5.0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">HTTP.sys Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-33096%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.5<\/td>\n<td>6.5<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Microsoft Brokering File System Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26181%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32219%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32091%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>8.4<\/td>\n<td>7.3<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Microsoft Cryptographic Services Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26152%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Microsoft Defender Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-33825%%<\/td>\n<td class=\"msftyes\">Yes<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>7.0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-33103%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>5.5<\/td>\n<td>4.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Microsoft Edge (Chromium-based) Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-33118%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftlow\">Low<\/td>\n<td>4.3<\/td>\n<td>3.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-33119%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftmoderate\">Moderate<\/td>\n<td>5.4<\/td>\n<td>4.7<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Microsoft Excel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32188%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.1<\/td>\n<td>6.2<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32189%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32197%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32198%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32199%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Microsoft High Performance Compute (HPC) Pack Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32184%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26155%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>6.5<\/td>\n<td>5.7<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Microsoft Management Console Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-27914%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Microsoft Office Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32190%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftcritical\">Critical<\/td>\n<td>8.4<\/td>\n<td>7.3<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Microsoft Power Apps Security Feature Bypass<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26149%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>9.0<\/td>\n<td>7.9<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Microsoft PowerPoint Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32200%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Microsoft PowerShell Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26143%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Microsoft SQL Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-33120%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>8.8<\/td>\n<td>7.7<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Microsoft SharePoint Server Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-20945%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>4.6<\/td>\n<td>4.0<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32201%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftyes\">Yes<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>6.5<\/td>\n<td>6.0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Microsoft Word Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-33822%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>6.1<\/td>\n<td>5.3<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Microsoft Word Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-33095%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-23657%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-33114%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftcritical\">Critical<\/td>\n<td>8.4<\/td>\n<td>7.3<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-33115%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftcritical\">Critical<\/td>\n<td>8.4<\/td>\n<td>7.3<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Package Catalog Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32081%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>5.5<\/td>\n<td>4.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">PowerShell Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26170%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Remote Access Management service\/API (RPC server) Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26183%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Remote Desktop Client Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32157%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftcritical\">Critical<\/td>\n<td>8.8<\/td>\n<td>7.7<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Remote Desktop Licensing Service Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26160%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26159%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Remote Desktop Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26151%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.1<\/td>\n<td>6.2<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Remote Procedure Call Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32085%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>5.5<\/td>\n<td>4.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">SQL Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32167%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>6.7<\/td>\n<td>5.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32176%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>6.7<\/td>\n<td>5.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">UEFI Secure Boot Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-0390%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>6.7<\/td>\n<td>5.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32220%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>4.4<\/td>\n<td>3.9<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Universal Plug and Play (upnp.dll) Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32212%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>5.5<\/td>\n<td>4.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32214%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>5.5<\/td>\n<td>4.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Web Account Manager Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32079%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>5.5<\/td>\n<td>4.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-33104%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Active Directory Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-33826%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftcritical\">Critical<\/td>\n<td>8.0<\/td>\n<td>7.0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Admin Center Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32196%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>6.1<\/td>\n<td>5.3<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Advanced Rasterization Platform Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26178%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>8.8<\/td>\n<td>7.7<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32073%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26168%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26173%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26177%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26182%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-27922%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-33099%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-33100%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Biometric Service Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32088%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>6.1<\/td>\n<td>5.3<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows BitLocker Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-27913%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.7<\/td>\n<td>6.7<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Boot Manager Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26175%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>4.6<\/td>\n<td>4.0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows COM Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32162%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>8.4<\/td>\n<td>7.3<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows COM Server Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-20806%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>5.5<\/td>\n<td>4.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Client Side Caching driver (csc.sys) Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26176%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-27926%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32070%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-33098%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Encrypted File System (EFS) Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26153%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32087%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32093%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32086%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32150%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows GDI Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-27931%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>5.5<\/td>\n<td>4.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-27930%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>5.5<\/td>\n<td>4.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Graphics Component Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32221%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>8.4<\/td>\n<td>7.3<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Hello Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-27906%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>4.4<\/td>\n<td>3.9<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-27928%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>8.7<\/td>\n<td>7.6<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Hyper-V Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26156%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32149%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.3<\/td>\n<td>6.4<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Installer Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-27910%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-33824%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftcritical\">Critical<\/td>\n<td>9.8<\/td>\n<td>8.5<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Kerberos Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-27912%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>8.0<\/td>\n<td>7.0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26179%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26180%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32195%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26163%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32215%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>5.5<\/td>\n<td>4.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32217%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>5.5<\/td>\n<td>4.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32218%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>5.5<\/td>\n<td>4.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Kernel Memory Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26169%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>6.1<\/td>\n<td>5.3<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows LUA File Virtualization Filter Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-27929%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32071%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.5<\/td>\n<td>6.5<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Management Services Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-20930%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows OLE Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26162%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Print Spooler Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-33101%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Print Spooler Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32084%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>5.5<\/td>\n<td>4.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Projected File System Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-27927%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26184%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32069%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32074%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32078%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Push Notifications Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26167%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>8.8<\/td>\n<td>7.7<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32158%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32159%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32160%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26172%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Recovery Environment Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-20928%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>4.6<\/td>\n<td>4.0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Redirected Drive Buffering System Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32216%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>5.5<\/td>\n<td>4.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Search Service Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-27909%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Sensor Data Service Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26161%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26174%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32224%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Server Update Service (WSUS) Tampering Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26154%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.5<\/td>\n<td>6.5<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Shell Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26165%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-26166%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-27918%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Shell Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32151%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>6.5<\/td>\n<td>5.7<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Shell Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32225%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>8.8<\/td>\n<td>7.7<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Shell Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32202%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>4.3<\/td>\n<td>3.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32082%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32083%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32068%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Snipping Tool Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32183%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Snipping Tool Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-33829%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftmoderate\">Moderate<\/td>\n<td>4.3<\/td>\n<td>3.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Speech Brokered Api Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32089%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32090%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Speech Runtime Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32153%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Storage Spaces Controller Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-27907%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32076%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows TCP\/IP Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-33827%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftcritical\">Critical<\/td>\n<td>8.1<\/td>\n<td>7.1<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-27908%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-27921%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows UPnP Device Host Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-27915%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-27919%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32075%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-27916%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-27920%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32077%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows UPnP Device Host Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-27925%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>6.5<\/td>\n<td>5.7<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows UPnP Device Host Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32156%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.4<\/td>\n<td>6.4<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows USB Printing Stack (usbprint.sys) Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32223%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>6.8<\/td>\n<td>5.9<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows User Interface Core Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32165%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-27911%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32163%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32164%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-23670%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>5.7<\/td>\n<td>5.0<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-27917%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows WalletService Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32080%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.0<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td colspan=\"8\">Windows Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>%%cve:2026-32222%%<\/td>\n<td class=\"msftno\">No<\/td>\n<td class=\"msftno\">No<\/td>\n<td>&#8211;<\/td>\n<td>&#8211;<\/td>\n<td class=\"msftimportant\">Important<\/td>\n<td>7.8<\/td>\n<td>6.8<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&#8212;<br \/>\nJohannes B. Ullrich, Ph.D. , Dean of Research, <a href=\"https:\/\/sans.edu\/\">SANS.edu<\/a><br \/>\n<a href=\"https:\/\/jbu.me\/164\">Twitter<\/a>|<\/p>\n<p> (c) SANS Internet Storm Center. https:\/\/isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This month&#8217;s Microsoft Patch Tuesday looks like a record one, but let&#8217;s look at it a bit closer to understand what is happening The update patches a total of 243 vulnerabilities. However, 78 of them are Chromium issues affecting Microsoft Edge. Patches for Edge were released earlier. This leaves 165 vulnerabilities that are not Edge-related. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[90],"tags":[91],"class_list":["post-2491","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Microsoft Patch Tuesday April 2026., (Tue, Apr 14th) - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/microsoft-patch-tuesday-april-2026-tue-apr-14th\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Patch Tuesday April 2026., (Tue, Apr 14th) - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"This month&#8217;s Microsoft Patch Tuesday looks like a record one, but let&#8217;s look at it a bit closer to understand what is happening The update patches a total of 243 vulnerabilities. However, 78 of them are Chromium issues affecting Microsoft Edge. Patches for Edge were released earlier. This leaves 165 vulnerabilities that are not Edge-related. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/microsoft-patch-tuesday-april-2026-tue-apr-14th\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-14T18:04:17+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/microsoft-patch-tuesday-april-2026-tue-apr-14th\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/microsoft-patch-tuesday-april-2026-tue-apr-14th\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"Microsoft Patch Tuesday April 2026., (Tue, Apr 14th)\",\"datePublished\":\"2026-04-14T18:04:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/microsoft-patch-tuesday-april-2026-tue-apr-14th\/\"},\"wordCount\":3444,\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/microsoft-patch-tuesday-april-2026-tue-apr-14th\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/microsoft-patch-tuesday-april-2026-tue-apr-14th\/\",\"name\":\"Microsoft Patch Tuesday April 2026., (Tue, Apr 14th) - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"datePublished\":\"2026-04-14T18:04:17+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/microsoft-patch-tuesday-april-2026-tue-apr-14th\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/microsoft-patch-tuesday-april-2026-tue-apr-14th\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/microsoft-patch-tuesday-april-2026-tue-apr-14th\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Patch Tuesday April 2026., (Tue, Apr 14th)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Patch Tuesday April 2026., (Tue, Apr 14th) - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/microsoft-patch-tuesday-april-2026-tue-apr-14th\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Patch Tuesday April 2026., (Tue, Apr 14th) - Imperative Business Ventures Limited","og_description":"This month&#8217;s Microsoft Patch Tuesday looks like a record one, but let&#8217;s look at it a bit closer to understand what is happening The update patches a total of 243 vulnerabilities. However, 78 of them are Chromium issues affecting Microsoft Edge. Patches for Edge were released earlier. This leaves 165 vulnerabilities that are not Edge-related. [&hellip;]","og_url":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/microsoft-patch-tuesday-april-2026-tue-apr-14th\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2026-04-14T18:04:17+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/microsoft-patch-tuesday-april-2026-tue-apr-14th\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/microsoft-patch-tuesday-april-2026-tue-apr-14th\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"Microsoft Patch Tuesday April 2026., (Tue, Apr 14th)","datePublished":"2026-04-14T18:04:17+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/microsoft-patch-tuesday-april-2026-tue-apr-14th\/"},"wordCount":3444,"keywords":["Cybersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/microsoft-patch-tuesday-april-2026-tue-apr-14th\/","url":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/microsoft-patch-tuesday-april-2026-tue-apr-14th\/","name":"Microsoft Patch Tuesday April 2026., (Tue, Apr 14th) - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"datePublished":"2026-04-14T18:04:17+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/microsoft-patch-tuesday-april-2026-tue-apr-14th\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/microsoft-patch-tuesday-april-2026-tue-apr-14th\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/14\/microsoft-patch-tuesday-april-2026-tue-apr-14th\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"Microsoft Patch Tuesday April 2026., (Tue, Apr 14th)"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/2491","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=2491"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/2491\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=2491"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=2491"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=2491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}