|
101
|
9.1 |
CRITICAL
Network
|
-
|
-
|
Incorrect implementation of authentication algorithm in Microsoft SSO Plugin for Jira & Confluence allows an unauthorized attacker to elevate privileges over a network.
New
|
CWE-303
Incorrect Implementation of Authentication Algorithm
|
CVE-2026-41103
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
102
|
7.1 |
HIGH
Local
|
-
|
-
|
Improper access control in Microsoft Office PowerPoint allows an authorized attacker to perform spoofing locally.
New
|
CWE-284
Improper Access Control
|
CVE-2026-41102
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
103
|
7.1 |
HIGH
Local
|
-
|
-
|
Improper access control in Microsoft Office Word allows an authorized attacker to perform spoofing locally.
New
|
CWE-284
Improper Access Control
|
CVE-2026-41101
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
104
|
4.4 |
MEDIUM
Local
|
-
|
-
|
Improper access control in M365 Copilot allows an authorized attacker to perform spoofing locally.
New
|
CWE-284
Improper Access Control
|
CVE-2026-41100
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
105
|
6.7 |
MEDIUM
Local
|
-
|
-
|
Reliance on a component that is not updateable in Windows Secure Boot allows an authorized attacker to bypass a security feature locally.
New
|
CWE-1329
Reliance on Component That is Not Updateable
|
CVE-2026-41097
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
106
|
9.8 |
CRITICAL
Network
|
-
|
-
|
Heap-based buffer overflow in Microsoft Windows DNS allows an unauthorized attacker to execute code over a network.
New
|
CWE-122
Heap-based Buffer Overflow
|
CVE-2026-41096
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
107
|
7.8 |
HIGH
Local
|
-
|
-
|
Use after free in Data Deduplication allows an authorized attacker to elevate privileges locally.
New
|
CWE-416
Use After Free
|
CVE-2026-41095
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
108
|
8.8 |
HIGH
Network
|
-
|
-
|
Improper control of generation of code ('code injection') in Microsoft Data Formulator allows an unauthorized attacker to execute code over a network.
New
|
CWE-94
Code Injection
|
CVE-2026-41094
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
109
|
9.8 |
CRITICAL
Network
|
-
|
-
|
Stack-based buffer overflow in Windows Netlogon allows an unauthorized attacker to execute code over a network.
New
|
CWE-121
Stack-based Buffer Overflow
|
CVE-2026-41089
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
110
|
7.8 |
HIGH
Local
|
-
|
-
|
External control of file name or path in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
New
|
CWE-73
External Control of File Name or Path
|
CVE-2026-41088
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|