|
1021
|
4.3 |
MEDIUM
Network
|
-
|
-
|
A tampering vulnerability exists when .NET Core improperly handles specially crafted files. An attacker who successfully exploited this vulnerability could write arbitrary files and directories to ce…
New
|
CWE-36
Absolute Path Traversal
|
CVE-2026-32175
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1022
|
7.3 |
HIGH
Local
|
-
|
-
|
Heap-based buffer overflow in .NET allows an unauthorized attacker to elevate privileges locally.
New
|
CWE-20 CWE-122
Improper Input Validation Heap-based Buffer Overflow
|
CVE-2026-32177
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1023
|
5.5 |
MEDIUM
Local
|
-
|
-
|
Files or directories accessible to external parties in Microsoft Teams allows an unauthorized attacker to perform spoofing locally.
New
|
CWE-552
Files or Directories Accessible to External Parties
|
CVE-2026-32185
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1024
|
7.8 |
HIGH
Local
|
-
|
-
|
External control of file name or path in Azure Monitor Agent allows an authorized attacker to elevate privileges locally.
New
|
CWE-73
External Control of File Name or Path
|
CVE-2026-32204
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1025
|
9.1 |
CRITICAL
Network
|
-
|
-
|
Improper authentication in Azure SDK allows an unauthorized attacker to bypass a security feature over a network.
New
|
CWE-287 CWE-347
Improper Authentication Improper Verification of Cryptographic Signature
|
CVE-2026-33117
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1026
|
7.7 |
HIGH
Network
|
-
|
-
|
Improper privilege management in Microsoft Dynamics 365 Customer Insights allows an authorized attacker to elevate privileges over a network.
New
|
CWE-269
Improper Privilege Management
|
CVE-2026-33821
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1027
|
8.2 |
HIGH
Network
|
-
|
-
|
Improper neutralization of special elements in output used by a downstream component ('injection') in Azure Machine Learning allows an unauthorized attacker to perform spoofing over a network.
New
|
CWE-74
Injection
|
CVE-2026-33833
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1028
|
4.3 |
MEDIUM
Network
|
-
|
-
|
User interface (ui) misrepresentation of critical information in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network.
New
|
CWE-451
User Interface (UI) Misrepresentation of Critical Information
|
CVE-2026-35429
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1029
|
7.3 |
HIGH
Local
|
-
|
-
|
Improper input validation in .NET allows an unauthorized attacker to elevate privileges locally.
New
|
CWE-20 CWE-190
Improper Input Validation Integer Overflow or Wraparound
|
CVE-2026-35433
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1030
|
8.8 |
HIGH
Local
|
-
|
-
|
Insufficient granularity of access control in Microsoft Office Click-To-Run allows an authorized attacker to elevate privileges locally.
New
|
CWE-1220
Insufficient Granularity of Access Control
|
CVE-2026-35436
|
2026-05-14 00:34 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|