|
1571
|
8.2 |
HIGH
Network
|
-
|
-
|
Improper neutralization of special elements in output used by a downstream component ('injection') in Azure Machine Learning allows an unauthorized attacker to perform spoofing over a network.
|
CWE-74
Injection
|
CVE-2026-33833
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1572
|
4.3 |
MEDIUM
Network
|
-
|
-
|
User interface (ui) misrepresentation of critical information in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network.
|
CWE-451
User Interface (UI) Misrepresentation of Critical Information
|
CVE-2026-35429
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1573
|
7.3 |
HIGH
Local
|
-
|
-
|
Improper input validation in .NET allows an unauthorized attacker to elevate privileges locally.
|
CWE-20 CWE-190
Improper Input Validation Integer Overflow or Wraparound
|
CVE-2026-35433
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1574
|
8.8 |
HIGH
Local
|
-
|
-
|
Insufficient granularity of access control in Microsoft Office Click-To-Run allows an authorized attacker to elevate privileges locally.
|
CWE-1220
Insufficient Granularity of Access Control
|
CVE-2026-35436
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1575
|
8.3 |
HIGH
Network
|
-
|
-
|
Missing authorization in Windows Admin Center allows an authorized attacker to elevate privileges over a network.
|
CWE-862
Missing Authorization
|
CVE-2026-35438
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1576
|
5.5 |
MEDIUM
Local
|
-
|
-
|
Files or directories accessible to external parties in Microsoft Office Word allows an unauthorized attacker to disclose information locally.
|
CWE-552
Files or Directories Accessible to External Parties
|
CVE-2026-35440
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1577
|
8.4 |
HIGH
Local
|
-
|
-
|
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
|
CWE-416
Use After Free
|
CVE-2026-40358
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1578
|
7.8 |
HIGH
Local
|
-
|
-
|
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
|
CWE-416
Use After Free
|
CVE-2026-40359
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1579
|
7.8 |
HIGH
Local
|
-
|
-
|
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.
|
CWE-125
Out-of-bounds Read
|
CVE-2026-40360
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1580
|
8.4 |
HIGH
Local
|
-
|
-
|
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
|
CWE-416
Use After Free
|
CVE-2026-40361
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|