|
621
|
8.4 |
HIGH
Local
|
microsoft
|
365_apps office office_long_term_servicing_channel word
|
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
|
CWE-416
Use After Free
|
CVE-2026-40366
|
2026-05-20 03:05 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
622
|
8.4 |
HIGH
Local
|
microsoft
|
365_apps office office_long_term_servicing_channel sharepoint_server word
|
Untrusted pointer dereference in Microsoft Office Word allows an unauthorized attacker to execute code locally.
|
CWE-822
Untrusted Pointer Dereference
|
CVE-2026-40367
|
2026-05-20 03:05 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
623
|
6.5 |
MEDIUM
Network
|
microsoft
|
power_automate_for_desktop
|
Exposure of sensitive information to an unauthorized actor in Power Automate allows an authorized attacker to disclose information over a network.
|
CWE-200
Information Exposure
|
CVE-2026-40374
|
2026-05-20 03:04 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
624
|
7.8 |
HIGH
Local
|
microsoft
|
365_apps office office_long_term_servicing_channel
|
Use after free in Microsoft Office Click-To-Run allows an authorized attacker to elevate privileges locally.
|
CWE-416
Use After Free
|
CVE-2026-40418
|
2026-05-20 03:04 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
625
|
7.8 |
HIGH
Local
|
microsoft
|
365_apps office office_long_term_servicing_channel
|
Use after free in Microsoft Office allows an authorized attacker to elevate privileges locally.
|
CWE-416
Use After Free
|
CVE-2026-40419
|
2026-05-20 03:04 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
626
|
8.8 |
HIGH
Local
|
microsoft
|
365_apps office office_long_term_servicing_channel
|
Improper access control in Microsoft Office Click-To-Run allows an authorized attacker to elevate privileges locally.
|
CWE-284
Improper Access Control
|
CVE-2026-40420
|
2026-05-20 03:04 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
627
|
5.3 |
MEDIUM
Local
|
-
|
-
|
An issue was discovered in the Portrait Dell Color Management application before 3.7.0 for Dell monitors. On Windows, a symbolic link vulnerability allows a local low-privileged user to escalate priv…
|
CWE-59
Link Following
|
CVE-2026-34883
|
2026-05-20 03:04 |
2026-05-20 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
628
|
7.3 |
HIGH
Network
|
-
|
-
|
An issue was discovered in ModelScope 1.25.0 allowing attackers to execute arbitrary code via crafted module listed in the configuration file (dey_mini.yaml) under the key ['nnet']['module'].
|
CWE-94
Code Injection
|
CVE-2025-51427
|
2026-05-20 03:04 |
2026-05-20 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
629
|
7.3 |
HIGH
Network
|
-
|
-
|
An issue in gohttp commit 34ea51 allows attackers to execute a directory traversal via supplying a crafted request.
|
CWE-22
Path Traversal
|
CVE-2025-70950
|
2026-05-20 03:04 |
2026-05-20 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
630
|
- |
|
-
|
-
|
A command injection vulnerability exists in Panabit PAP-XM320 up to and including V7.7. The web management interface invokes the backend helper /usr/sbin/pappiw and passes user-controlled parameters …
|
-
|
CVE-2026-36827
|
2026-05-20 03:04 |
2026-05-20 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|