|
1061
|
4.3 |
MEDIUM
Network
|
-
|
-
|
User interface (ui) misrepresentation of critical information in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.
New
|
CWE-451
User Interface (UI) Misrepresentation of Critical Information
|
CVE-2026-40416
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1062
|
7.8 |
HIGH
Local
|
-
|
-
|
Weak authentication in Dynamics Business Central allows an authorized attacker to elevate privileges locally.
New
|
CWE-1390
Weak Authentication
|
CVE-2026-40417
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1063
|
7.8 |
HIGH
Local
|
-
|
-
|
Use after free in Microsoft Office Click-To-Run allows an authorized attacker to elevate privileges locally.
New
|
CWE-416
Use After Free
|
CVE-2026-40418
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1064
|
7.8 |
HIGH
Local
|
-
|
-
|
Use after free in Microsoft Office allows an authorized attacker to elevate privileges locally.
New
|
CWE-416
Use After Free
|
CVE-2026-40419
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1065
|
8.8 |
HIGH
Local
|
-
|
-
|
Improper access control in Microsoft Office Click-To-Run allows an authorized attacker to elevate privileges locally.
New
|
CWE-284
Improper Access Control
|
CVE-2026-40420
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1066
|
4.3 |
MEDIUM
Network
|
-
|
-
|
External control of file name or path in Microsoft Office Word allows an unauthorized attacker to disclose information over a network.
New
|
CWE-73
External Control of File Name or Path
|
CVE-2026-40421
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1067
|
8.8 |
HIGH
Network
|
-
|
-
|
Improper access control in Windows Admin Center allows an authorized attacker to elevate privileges over a network.
New
|
CWE-284
Improper Access Control
|
CVE-2026-41086
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1068
|
7.8 |
HIGH
Local
|
-
|
-
|
External control of file name or path in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
New
|
CWE-73
External Control of File Name or Path
|
CVE-2026-41088
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1069
|
9.8 |
CRITICAL
Network
|
-
|
-
|
Stack-based buffer overflow in Windows Netlogon allows an unauthorized attacker to execute code over a network.
New
|
CWE-121
Stack-based Buffer Overflow
|
CVE-2026-41089
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1070
|
8.8 |
HIGH
Network
|
-
|
-
|
Improper control of generation of code ('code injection') in Microsoft Data Formulator allows an unauthorized attacker to execute code over a network.
New
|
CWE-94
Code Injection
|
CVE-2026-41094
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|