| | CVE-2026-42945 | F5 | high | 8.1 | — | | NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vu… | May 13, 2026 | May 14, 2026 |
| | CVE-2026-42930 | F5 | high | 8.7 | — | | When running in Appliance mode, an authenticated attacker assigned the 'Administrator' role may be a… | May 13, 2026 | May 14, 2026 |
| | CVE-2026-42406 | F5 | high | 8.7 | — | | A vulnerability exists in BIG-IP and BIG-IQ systems where a highly privileged, authenticated attacke… | May 13, 2026 | May 14, 2026 |
| | CVE-2026-42058 | F5 | medium | 4.3 | — | | An authenticated attacker's undisclosed requests to BIG-IP iControl REST can lead to an information … | May 13, 2026 | May 14, 2026 |
| | CVE-2026-32643 | F5 | high | 8.7 | — | | A vulnerability exists in BIG-IP and BIG-IQ systems where a highly privileged, authenticated attacke… | May 13, 2026 | May 14, 2026 |
| | CVE-2026-32673 | F5 | medium | 6.5 | — | | A vulnerability exists in BIG-IP scripted monitors that may allow an authenticated attacker with the… | May 13, 2026 | May 14, 2026 |
| | CVE-2026-34176 | F5 | high | 8.7 | — | | When running in Appliance mode, an authenticated remote command injection vulnerability exists in an… | May 13, 2026 | May 14, 2026 |
| | CVE-2026-41225 | F5 | high | 7.2 | — | | A vulnerability exists in iControl REST where a highly privileged, authenticated attacker with at le… | May 13, 2026 | May 14, 2026 |
| | CVE-2026-39459 | F5 | high | 7.2 | — | | A vulnerability exists in iControl REST and the TMOS Shell (tmsh) where a highly privileged, authent… | May 13, 2026 | May 14, 2026 |
| | CVE-2026-41953 | F5 | high | 8.7 | — | | A vulnerability exists in BIG-IP systems where a highly privileged, authenticated attacker with at l… | May 13, 2026 | May 14, 2026 |
| | CVE-2026-40631 | F5 | high | 8.7 | — | | An authenticated attacker with the Resource Administrator or Administrator role can modify configura… | May 13, 2026 | May 14, 2026 |
| | CVE-2026-40698 | F5 | high | 8.7 | — | | A vulnerability exists in BIG-IP and BIG-IQ systems where a highly privileged, authenticated attacke… | May 13, 2026 | May 14, 2026 |
| | CVE-2026-42924 | F5 | high | 8.7 | — | | An authenticated attacker with the Resource Administrator or Administrator role can create SNMP conf… | May 13, 2026 | May 14, 2026 |
| | CVE-2026-40061 | F5 | medium | 6.5 | — | | When BIG-IP DNS is provisioned, a vulnerability exists in an undisclosed iControl REST and BIG-IP TM… | May 13, 2026 | May 14, 2026 |
| | CVE-2026-42919 | F5 | medium | 6.7 | — | | A vulnerability exists in BIG-IP systems that may allow an authenticated attacker with administrativ… | May 13, 2026 | May 14, 2026 |
| | CVE-2026-41957 | F5 | high | 8.8 | — | | An authenticated remote code execution vulnerability through undisclosed vectors exists in the BIG-I… | May 13, 2026 | May 14, 2026 |
| | CVE-2026-44871 | HPE | high | 7.2 | 0.1%
| | Command injection vulnerabilities exist in the command line interface (CLI) service accessed by the … | May 12, 2026 | May 14, 2026 |
| | CVE-2026-44872 | HPE | high | 7.2 | 0.3%
| | A command injection vulnerability exists in the web-based management interface of AOS-8 and AOS-10 O… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-44869 | HPE | high | 7.2 | 0.2%
| | Command injection vulnerabilities exist in the web-based management interface of AOS-8 and AOS-10 Op… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-23823 | HPE | high | 7.2 | — | | A vulnerability in the command line interface of Access Points running AOS-10 could allow an authent… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-23821 | HPE | high | 7.2 | — | | A vulnerability in the configuration processing logic of Access Points running AOS-10 could allow an… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-23820 | HPE | high | 7.2 | — | | A vulnerability in the command line interface of Access Points running AOS-10 and AOS-8 Instant coul… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-42899 | Microsoft | high | 7.5 | 0.0%
| | Loop with unreachable exit condition ('infinite loop') in ASP.NET Core allows an unauthorized attack… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-42893 | Microsoft | high | 7.4 | 0.0%
| | Improper neutralization of special elements used in a command ('command injection') in M365 Copilot … | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40368 | Microsoft | high | 8.0 | 0.3%
| | Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to ex… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40365 | Microsoft | high | 8.8 | 0.1%
| | Insufficient granularity of access control in Microsoft Office SharePoint allows an authorized attac… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40357 | Microsoft | high | 8.8 | 0.5%
| | Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to ex… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-35439 | Microsoft | high | 8.8 | 0.5%
| | Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to ex… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-33112 | Microsoft | high | 8.8 | 0.5%
| | Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to ex… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-33110 | Microsoft | high | 8.8 | 0.5%
| | Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to ex… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-33821 | Microsoft | high | 7.7 | — | | Improper privilege management in Microsoft Dynamics 365 Customer Insights allows an authorized attac… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-42838 | Microsoft | medium | 5.4 | — | | Improper neutralization of special elements in output used by a downstream component ('injection') i… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40416 | Microsoft | medium | 4.3 | — | | User interface (ui) misrepresentation of critical information in Microsoft Edge (Chromium-based) all… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-42833 | Microsoft | critical | 9.1 | — | | Execution with unnecessary privileges in Microsoft Dynamics 365 (on-premises) allows an authorized a… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-42830 | Microsoft | medium | 6.5 | — | | Untrusted search path in Azure Monitor Agent allows an authorized attacker to elevate privileges loc… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-42823 | Microsoft | critical | 9.9 | — | | Improper access control in Azure Logic Apps allows an authorized attacker to elevate privileges over… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-41613 | Microsoft | high | 8.8 | — | | Session fixation in Visual Studio Code allows an unauthorized attacker to elevate privileges over a … | May 12, 2026 | May 13, 2026 |
| | CVE-2026-41103 | Microsoft | critical | 9.1 | — | | Incorrect implementation of authentication algorithm in Microsoft SSO Plugin for Jira & Confluen… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40381 | Microsoft | high | 7.8 | — | | Improper access control in Azure Connected Machine Agent allows an authorized attacker to elevate pr… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-41097 | Microsoft | medium | 6.7 | — | | Reliance on a component that is not updateable in Windows Secure Boot allows an authorized attacker … | May 12, 2026 | May 13, 2026 |
| | CVE-2026-41086 | Microsoft | high | 8.8 | — | | Improper access control in Windows Admin Center allows an authorized attacker to elevate privileges … | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40420 | Microsoft | high | 8.8 | — | | Improper access control in Microsoft Office Click-To-Run allows an authorized attacker to elevate pr… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-35436 | Microsoft | high | 8.8 | — | | Insufficient granularity of access control in Microsoft Office Click-To-Run allows an authorized att… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40418 | Microsoft | high | 7.8 | — | | Use after free in Microsoft Office Click-To-Run allows an authorized attacker to elevate privileges … | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40413 | Microsoft | high | 7.4 | — | | Null pointer dereference in Windows TCP/IP allows an unauthorized attacker to deny service over an a… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40403 | Microsoft | high | 8.8 | — | | Heap-based buffer overflow in Windows Win32K - GRFX allows an authorized attacker to execute code lo… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40402 | Microsoft | critical | 9.3 | — | | Use after free in Windows Hyper-V allows an unauthorized attacker to elevate privileges locally. | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40401 | Microsoft | high | 7.1 | — | | Null pointer dereference in Windows TCP/IP allows an unauthorized attacker to deny service locally. | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40398 | Microsoft | high | 7.8 | — | | Heap-based buffer overflow in Windows Remote Desktop allows an authorized attacker to elevate privil… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-32209 | Microsoft | medium | 4.4 | — | | Improper access control in Windows Filtering Platform (WFP) allows an authorized attacker to bypass … | May 12, 2026 | May 13, 2026 |