Security
CVE Feed
Latest vulnerabilities from the National Vulnerability Database.
10521
Total
716
Critical
3036
High
3359
Medium
| CVE ID | Severity | Score | Description | Published |
|---|---|---|---|---|
| CVE-2026-41612 | MEDIUM | 5.5 | Relative path traversal in Visual Studio Code allows an unauthorized attacker to disclose information locally. | May 12, 2026 |
| CVE-2026-41611 | HIGH | 7.8 | Improper neutralization of script-related html tags in a web page (basic xss) in Visual Studio Code allows an unauthorized attacker to execute code locally. | May 12, 2026 |
| CVE-2026-41610 | MEDIUM | 6.3 | Improper neutralization of input during web page generation ('cross-site scripting') in Visual Studio Code allows an unauthorized attacker to bypass a security feature locally. | May 12, 2026 |
| CVE-2026-41513 | UNKNOWN | — | Horilla is an HR and CRM software. In 1.5.0, the notification endpoints trust the unvalidated next parameter and redirect users to arbitrary external URLs. This … | May 12, 2026 |
| CVE-2026-41109 | HIGH | 8.8 | Improper neutralization of special elements in output used by a downstream component ('injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to bypass … | May 12, 2026 |
| CVE-2026-41107 | HIGH | 7.4 | External control of file name or path in Microsoft Edge (Chromium-based) allows an unauthorized attacker to disclose information over a network. | May 12, 2026 |
| CVE-2026-41103 | CRITICAL | 9.1 | Incorrect implementation of authentication algorithm in Microsoft SSO Plugin for Jira & Confluence allows an unauthorized attacker to elevate privileges over a network. | May 12, 2026 |
| CVE-2026-41102 | HIGH | 7.1 | Improper access control in Microsoft Office PowerPoint allows an authorized attacker to perform spoofing locally. | May 12, 2026 |
| CVE-2026-41101 | HIGH | 7.1 | Improper access control in Microsoft Office Word allows an authorized attacker to perform spoofing locally. | May 12, 2026 |
| CVE-2026-41100 | MEDIUM | 4.4 | Improper access control in M365 Copilot allows an authorized attacker to perform spoofing locally. | May 12, 2026 |
| CVE-2026-41097 | MEDIUM | 6.7 | Reliance on a component that is not updateable in Windows Secure Boot allows an authorized attacker to bypass a security feature locally. | May 12, 2026 |
| CVE-2026-41096 | CRITICAL | 9.8 | Heap-based buffer overflow in Microsoft Windows DNS allows an unauthorized attacker to execute code over a network. | May 12, 2026 |
| CVE-2026-41095 | HIGH | 7.8 | Use after free in Data Deduplication allows an authorized attacker to elevate privileges locally. | May 12, 2026 |
| CVE-2026-41094 | HIGH | 8.8 | Improper control of generation of code ('code injection') in Microsoft Data Formulator allows an unauthorized attacker to execute code over a network. | May 12, 2026 |
| CVE-2026-41089 | CRITICAL | 9.8 | Stack-based buffer overflow in Windows Netlogon allows an unauthorized attacker to execute code over a network. | May 12, 2026 |
| CVE-2026-41088 | HIGH | 7.8 | External control of file name or path in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. | May 12, 2026 |
| CVE-2026-41086 | HIGH | 8.8 | Improper access control in Windows Admin Center allows an authorized attacker to elevate privileges over a network. | May 12, 2026 |
| CVE-2026-40421 | MEDIUM | 4.3 | External control of file name or path in Microsoft Office Word allows an unauthorized attacker to disclose information over a network. | May 12, 2026 |
| CVE-2026-40420 | HIGH | 8.8 | Improper access control in Microsoft Office Click-To-Run allows an authorized attacker to elevate privileges locally. | May 12, 2026 |
| CVE-2026-40419 | HIGH | 7.8 | Use after free in Microsoft Office allows an authorized attacker to elevate privileges locally. | May 12, 2026 |
| CVE-2026-40418 | HIGH | 7.8 | Use after free in Microsoft Office Click-To-Run allows an authorized attacker to elevate privileges locally. | May 12, 2026 |
| CVE-2026-40417 | HIGH | 7.8 | Weak authentication in Dynamics Business Central allows an authorized attacker to elevate privileges locally. | May 12, 2026 |
| CVE-2026-40416 | MEDIUM | 4.3 | User interface (ui) misrepresentation of critical information in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network. | May 12, 2026 |
| CVE-2026-40415 | HIGH | 8.1 | Use after free in Windows TCP/IP allows an unauthorized attacker to execute code over a network. | May 12, 2026 |
| CVE-2026-40414 | HIGH | 7.4 | Null pointer dereference in Windows TCP/IP allows an unauthorized attacker to deny service over an adjacent network. | May 12, 2026 |