Patches
Vulnerabilities
Articles
Impacts
| Vulnerable Component | Impact | CVE ID |
|---|---|---|
| Windows TCP/IP | Remote Code Execution | CVE-2026-33827 |
| Windows Active Directory | Remote Code Execution | CVE-2026-33826 |
| Windows Internet Key Exchange (IKE) Service Extensions | Remote Code Execution | CVE-2026-33824 |
| Microsoft Word | Remote Code Execution | CVE-2026-33115 |
| Microsoft Word | Remote Code Execution | CVE-2026-33114 |
| Microsoft Office | Remote Code Execution | CVE-2026-32190 |
| Remote Desktop Client | Remote Code Execution | CVE-2026-32157 |
| .NET Framework | Denial of Service | CVE-2026-23666 |
| Vulnerable Component | Impact | CVE ID |
|---|---|---|
| Microsoft SharePoint Server | Spoofing | CVE-2026-32201 |
| Microsoft Defender | Elevation of Privilege | CVE-2026-33825 |
| CVE ID | Severity | Impact |
|---|---|---|
| CVE-2026-33104 | Important | Elevation of Privilege |
| CVE-2026-33103 | Important | Information Disclosure |
| CVE-2026-33101 | Important | Elevation of Privilege |
| CVE-2026-33100 | Important | Elevation of Privilege |
| CVE-2026-33099 | Important | Elevation of Privilege |
| CVE-2026-33098 | Important | Elevation of Privilege |
| CVE-2026-33096 | Important | Denial of Service |
| CVE-2026-32631 | Important | Information Disclosure |
| CVE-2026-32225 | Important | Security Feature Bypass |
| CVE-2026-32224 | Important | Elevation of Privilege |
| CVE-2026-32223 | Important | Elevation of Privilege |
| CVE-2026-32222 | Important | Elevation of Privilege |
| CVE-2026-32221 | Important | Remote Code Execution |
| CVE-2026-32220 | Important | Security Feature Bypass |
| CVE-2026-32219 | Important | Elevation of Privilege |
| CVE-2026-32218 | Important | Information Disclosure |
| CVE-2026-32217 | Important | Information Disclosure |
| CVE-2026-32215 | Important | Information Disclosure |
| CVE-2026-32202 | Important | Spoofing |
| CVE-2026-32196 | Important | Spoofing |
| CVE-2026-32195 | Important | Elevation of Privilege |
| CVE-2026-32184 | Important | Elevation of Privilege |
| CVE-2026-32183 | Important | Remote Code Execution |
| CVE-2026-32181 | Important | Denial of Service |
| CVE-2026-32165 | Important | Elevation of Privilege |
| CVE-2026-32164 | Important | Elevation of Privilege |
| CVE-2026-32163 | Important | Elevation of Privilege |
| CVE-2026-32162 | Important | Elevation of Privilege |
| CVE-2026-32160 | Important | Elevation of Privilege |
| CVE-2026-32159 | Important | Elevation of Privilege |
| CVE-2026-32158 | Important | Elevation of Privilege |
| CVE-2026-32156 | Important | Remote Code Execution |
| CVE-2026-32153 | Important | Elevation of Privilege |
| CVE-2026-32151 | Important | Information Disclosure |
| CVE-2026-32150 | Important | Elevation of Privilege |
| CVE-2026-32149 | Important | Remote Code Execution |
| CVE-2026-32093 | Important | Elevation of Privilege |
| CVE-2026-32091 | Important | Elevation of Privilege |
| CVE-2026-32090 | Important | Elevation of Privilege |
| CVE-2026-32089 | Important | Elevation of Privilege |
| CVE-2026-32088 | Important | Security Feature Bypass |
| CVE-2026-32087 | Important | Elevation of Privilege |
| CVE-2026-32086 | Important | Elevation of Privilege |
| CVE-2026-32085 | Important | Information Disclosure |
| CVE-2026-32084 | Important | Information Disclosure |
| CVE-2026-32083 | Important | Elevation of Privilege |
| CVE-2026-32082 | Important | Elevation of Privilege |
| CVE-2026-32081 | Important | Information Disclosure |
| CVE-2026-32080 | Important | Elevation of Privilege |
| CVE-2026-32079 | Important | Information Disclosure |
| CVE-2026-32078 | Important | Elevation of Privilege |
| CVE-2026-32077 | Important | Elevation of Privilege |
| CVE-2026-32076 | Important | Elevation of Privilege |
| CVE-2026-32075 | Important | Elevation of Privilege |
| CVE-2026-32074 | Important | Elevation of Privilege |
| CVE-2026-32073 | Important | Elevation of Privilege |
| CVE-2026-32072 | Important | Spoofing |
| CVE-2026-32071 | Important | Denial of Service |
| CVE-2026-32070 | Important | Elevation of Privilege |
| CVE-2026-32069 | Important | Elevation of Privilege |
| CVE-2026-32068 | Important | Elevation of Privilege |
| CVE-2026-27931 | Important | Information Disclosure |
| CVE-2026-27930 | Important | Information Disclosure |
| CVE-2026-27929 | Important | Elevation of Privilege |
| CVE-2026-27928 | Important | Security Feature Bypass |
| CVE-2026-27927 | Important | Elevation of Privilege |
| CVE-2026-27926 | Important | Elevation of Privilege |
| CVE-2026-27925 | Important | Information Disclosure |
| CVE-2026-27922 | Important | Elevation of Privilege |
| CVE-2026-27921 | Important | Elevation of Privilege |
| CVE-2026-27920 | Important | Elevation of Privilege |
| CVE-2026-27919 | Important | Elevation of Privilege |
| CVE-2026-27918 | Important | Elevation of Privilege |
| CVE-2026-27917 | Important | Elevation of Privilege |
| CVE-2026-27916 | Important | Elevation of Privilege |
| CVE-2026-27915 | Important | Elevation of Privilege |
| CVE-2026-27914 | Important | Elevation of Privilege |
| CVE-2026-27913 | Important | Security Feature Bypass |
| CVE-2026-27912 | Important | Elevation of Privilege |
| CVE-2026-27911 | Important | Elevation of Privilege |
| CVE-2026-27910 | Important | Elevation of Privilege |
| CVE-2026-27909 | Important | Elevation of Privilege |
| CVE-2026-27908 | Important | Elevation of Privilege |
| CVE-2026-27907 | Important | Elevation of Privilege |
| CVE-2026-27906 | Important | Security Feature Bypass |
| CVE-2026-26184 | Important | Elevation of Privilege |
| CVE-2026-26183 | Important | Elevation of Privilege |
| CVE-2026-26182 | Important | Elevation of Privilege |
| CVE-2026-26181 | Important | Elevation of Privilege |
| CVE-2026-26180 | Important | Elevation of Privilege |
| CVE-2026-26179 | Important | Elevation of Privilege |
| CVE-2026-26178 | Important | Elevation of Privilege |
| CVE-2026-26177 | Important | Elevation of Privilege |
| CVE-2026-26176 | Important | Elevation of Privilege |
| CVE-2026-26175 | Important | Security Feature Bypass |
| CVE-2026-26174 | Important | Elevation of Privilege |
| CVE-2026-26173 | Important | Elevation of Privilege |
| CVE-2026-26172 | Important | Elevation of Privilege |
| CVE-2026-26170 | Important | Elevation of Privilege |
| CVE-2026-26169 | Important | Information Disclosure |
| CVE-2026-26168 | Important | Elevation of Privilege |
| CVE-2026-26167 | Important | Elevation of Privilege |
| CVE-2026-26166 | Important | Elevation of Privilege |
| CVE-2026-26165 | Important | Elevation of Privilege |
| CVE-2026-26163 | Important | Elevation of Privilege |
| CVE-2026-26162 | Important | Elevation of Privilege |
| CVE-2026-26161 | Important | Elevation of Privilege |
| CVE-2026-26160 | Important | Elevation of Privilege |
| CVE-2026-26159 | Important | Elevation of Privilege |
| CVE-2026-26156 | Important | Remote Code Execution |
| CVE-2026-26155 | Important | Information Disclosure |
| CVE-2026-26154 | Important | Tampering |
| CVE-2026-26153 | Important | Elevation of Privilege |
| CVE-2026-26152 | Important | Elevation of Privilege |
| CVE-2026-26151 | Important | Spoofing |
| CVE-2026-26149 | Important | Security Feature Bypass |
| CVE-2026-26143 | Important | Security Feature Bypass |
| CVE-2026-25250 | Important | Security Feature Bypass |
| CVE-2026-23670 | Important | Security Feature Bypass |
| CVE-2026-20930 | Important | Elevation of Privilege |
| CVE-2026-20928 | Important | Security Feature Bypass |
| CVE-2026-20806 | Important | Information Disclosure |
| CVE-2026-0390 | Important | Security Feature Bypass |
| CVE-2026-33829 | Moderate | Spoofing |
| CVE-2026-32216 | Moderate | Denial of Service |
| CVE-2026-32187 | Low | Defense in Depth |
| CVE ID | Severity | Impact |
|---|---|---|
| CVE-2026-33822 | Important | Information Disclosure |
| CVE-2026-33095 | Important | Remote Code Execution |
| CVE-2026-32200 | Important | Remote Code Execution |
| CVE-2026-32199 | Important | Remote Code Execution |
| CVE-2026-32198 | Important | Remote Code Execution |
| CVE-2026-32197 | Important | Remote Code Execution |
| CVE-2026-33120 | Important | Remote Code Execution |
| CVE-2026-32189 | Important | Remote Code Execution |
| CVE-2026-32188 | Important | Information Disclosure |
| CVE-2026-32176 | Important | Elevation of Privilege |
| CVE-2026-32167 | Important | Elevation of Privilege |
| CVE-2026-23657 | Important | Remote Code Execution |
| CVE-2026-20945 | Important | Spoofing |
| CVE ID | Severity | Impact |
|---|---|---|
| CVE-2026-32226 | Important | Denial of Service |
| CVE-2026-32203 | Important | Denial of Service |
| CVE-2026-32178 | Important | Spoofing |
| CVE-2026-33116 | Important | Denial of Service |
| CVE-2026-26171 | Important | Denial of Service |
| CVE-2026-23653 | Important | Information Disclosure |
| CVE ID | Severity | Impact |
|---|---|---|
| CVE-2026-32192 | Important | Elevation of Privilege |
| CVE-2026-32171 | Important | Elevation of Privilege |
| CVE-2026-32168 | Important | Elevation of Privilege |
| Vulnerable Component | CVE ID | Severity | Impact |
|---|---|---|---|
| Universal Plug and Play | CVE-2026-32214 | Important | Information Disclosure |
| CVE-2026-32212 | Important | Information Disclosure | |
| HackerOne TLS PSK/ALPN Callback Exceptions Bypass Error Handlers | CVE-2026-21637 | Moderate | Denial of Service |
| Applocker Filter Driver | CVE-2026-25184 | Important | Elevation of Privilege |
| AMD IOMMU Write Buffer | CVE-2023-20585 | Important | Tampering |
| Desktop Window Manager | CVE-2026-32155 | Important | Elevation of Privilege |
| CVE-2026-32154 | Important | Elevation of Privilege | |
| CVE-2026-32152 | Important | Elevation of Privilege | |
| CVE-2026-27924 | Important | Elevation of Privilege | |
| CVE-2026-27923 | Important | Elevation of Privilege |
Patch Tuesday or Update Tuesday is the common name for the second Tuesday of every month when Microsoft releases security updates for its operating system and other software. Coinciding with the Patch Tuesday, several other vendors such as Oracle, Mozilla, Adobe, and many others roll out updates for the third-party applications.
Patch Tuesday falls on the second Tuesday of each month. The upcoming Patch Tuesday is on May 12, 2026.
Patches are nothing but pieces of software code that are written to fix a bug in a software application, that might lead to a vulnerability. Such vulnerabilities in any application are loop holes for attackers to get their hands on business critical data and information. So it is highly crucial to keep all the applications in a network updated to its latest versions. Updating applications in mobile phones and laptops also work in the same manner by preventing theft of personal data, through security flaws.
Predominantly security patch updates of varying severity like Critical, Important, Moderate & Low are labeled and released. Effective Windows patch management involves prioritizing these based on severity, automating deployment, and ensuring rollback or compatibility testing. It is always a best practice to prioritize your patching based on the severity level mentioned.
CVE ID - Common Vulnerabilities and Exposure ID is a format in which each vulnerability is disclosed and cataloged in the National Vulnerability Database (NVD). You can look up for a detailed explanation of each vulnerability in the NVD with the help of CVE ID. In Patch Manager Plus you can make use of these CVE IDs to fetch the appropriate patches to deploy. You can find the CVE IDs here.
The upcoming Free Patch Tuesday webinar by ManageEngine is scheduled on -. You can make your registrations here.
Each CVE ID listed in the CVE Index section has been linked to its security advisory.