|
111
|
8.8 |
HIGH
Network
|
-
|
-
|
Improper access control in Windows Admin Center allows an authorized attacker to elevate privileges over a network.
New
|
CWE-284
Improper Access Control
|
CVE-2026-41086
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
112
|
4.3 |
MEDIUM
Network
|
-
|
-
|
External control of file name or path in Microsoft Office Word allows an unauthorized attacker to disclose information over a network.
New
|
CWE-73
External Control of File Name or Path
|
CVE-2026-40421
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
113
|
8.8 |
HIGH
Local
|
-
|
-
|
Improper access control in Microsoft Office Click-To-Run allows an authorized attacker to elevate privileges locally.
New
|
CWE-284
Improper Access Control
|
CVE-2026-40420
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
114
|
7.8 |
HIGH
Local
|
-
|
-
|
Use after free in Microsoft Office allows an authorized attacker to elevate privileges locally.
New
|
CWE-416
Use After Free
|
CVE-2026-40419
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
115
|
7.8 |
HIGH
Local
|
-
|
-
|
Use after free in Microsoft Office Click-To-Run allows an authorized attacker to elevate privileges locally.
New
|
CWE-416
Use After Free
|
CVE-2026-40418
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
116
|
7.8 |
HIGH
Local
|
-
|
-
|
Weak authentication in Dynamics Business Central allows an authorized attacker to elevate privileges locally.
New
|
CWE-1390
Weak Authentication
|
CVE-2026-40417
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
117
|
4.3 |
MEDIUM
Network
|
-
|
-
|
User interface (ui) misrepresentation of critical information in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.
New
|
CWE-451
User Interface (UI) Misrepresentation of Critical Information
|
CVE-2026-40416
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
118
|
8.1 |
HIGH
Network
|
-
|
-
|
Use after free in Windows TCP/IP allows an unauthorized attacker to execute code over a network.
New
|
CWE-416
Use After Free
|
CVE-2026-40415
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
119
|
7.4 |
HIGH
Adjacent
|
-
|
-
|
Null pointer dereference in Windows TCP/IP allows an unauthorized attacker to deny service over an adjacent network.
New
|
CWE-476
NULL Pointer Dereference
|
CVE-2026-40414
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
120
|
7.4 |
HIGH
Adjacent
|
-
|
-
|
Null pointer dereference in Windows TCP/IP allows an unauthorized attacker to deny service over an adjacent network.
New
|
CWE-476
NULL Pointer Dereference
|
CVE-2026-40413
|
2026-05-13 03:17 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|