|
151
|
8.8 |
HIGH
Network
|
-
|
-
|
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
New
|
CWE-502
Deserialization of Untrusted Data
|
CVE-2026-40357
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
152
|
5.5 |
MEDIUM
Local
|
-
|
-
|
Files or directories accessible to external parties in Microsoft Office Word allows an unauthorized attacker to disclose information locally.
New
|
CWE-552
Files or Directories Accessible to External Parties
|
CVE-2026-35440
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
153
|
8.8 |
HIGH
Network
|
-
|
-
|
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
New
|
CWE-502
Deserialization of Untrusted Data
|
CVE-2026-35439
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
154
|
8.3 |
HIGH
Network
|
-
|
-
|
Missing authorization in Windows Admin Center allows an authorized attacker to elevate privileges over a network.
New
|
CWE-862
Missing Authorization
|
CVE-2026-35438
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
155
|
8.8 |
HIGH
Local
|
-
|
-
|
Insufficient granularity of access control in Microsoft Office Click-To-Run allows an authorized attacker to elevate privileges locally.
New
|
CWE-1220
Insufficient Granularity of Access Control
|
CVE-2026-35436
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
156
|
7.3 |
HIGH
Local
|
-
|
-
|
Improper input validation in .NET allows an unauthorized attacker to elevate privileges locally.
New
|
CWE-20 CWE-190
Improper Input Validation Integer Overflow or Wraparound
|
CVE-2026-35433
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
157
|
4.3 |
MEDIUM
Network
|
-
|
-
|
User interface (ui) misrepresentation of critical information in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network.
New
|
CWE-451
User Interface (UI) Misrepresentation of Critical Information
|
CVE-2026-35429
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
158
|
7.5 |
HIGH
Network
|
-
|
-
|
Missing release of memory after effective lifetime in Windows Internet Key Exchange (IKE) Protocol allows an unauthorized attacker to deny service over a network.
New
|
CWE-401
Missing Release of Memory after Effective Lifetime
|
CVE-2026-35424
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
159
|
5.4 |
MEDIUM
Network
|
-
|
-
|
Out-of-bounds read in Telnet Client allows an unauthorized attacker to disclose information over a network.
New
|
CWE-125
Out-of-bounds Read
|
CVE-2026-35423
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
160
|
6.5 |
MEDIUM
Network
|
-
|
-
|
Authentication bypass using an alternate path or channel in Windows TCP/IP allows an authorized attacker to bypass a security feature over a network.
New
|
CWE-288
Authentication Bypass Using an Alternate Path or Channel
|
CVE-2026-35422
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|