| | CVE-2026-40397 | Microsoft | high | 7.8 | — | | Integer underflow (wrap or wraparound) in Windows Common Log File System Driver allows an authorized… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40382 | Microsoft | high | 7.8 | — | | Use after free in Windows Telephony Service allows an authorized attacker to elevate privileges loca… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40369 | Microsoft | high | 7.8 | — | | Untrusted pointer dereference in Windows Kernel allows an authorized attacker to elevate privileges … | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40370 | Microsoft | high | 8.8 | — | | External control of file name or path in SQL Server allows an authorized attacker to execute code ov… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40367 | Microsoft | high | 8.4 | — | | Untrusted pointer dereference in Microsoft Office Word allows an unauthorized attacker to execute co… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40362 | Microsoft | high | 7.8 | — | | Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40361 | Microsoft | high | 8.4 | — | | Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40359 | Microsoft | high | 7.8 | — | | Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40358 | Microsoft | high | 8.4 | — | | Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. | May 12, 2026 | May 13, 2026 |
| | CVE-2026-34341 | Microsoft | high | 7.0 | — | | Double free in Windows Link-Layer Discovery Protocol (LLDP) allows an authorized attacker to elevate… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-34340 | Microsoft | high | 7.0 | — | | Use after free in Windows Projected File System allows an authorized attacker to elevate privileges … | May 12, 2026 | May 13, 2026 |
| | CVE-2026-34338 | Microsoft | high | 7.8 | — | | Use after free in Windows Telephony Service allows an authorized attacker to elevate privileges loca… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-34337 | Microsoft | high | 7.8 | — | | Use after free in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate pr… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-34336 | Microsoft | high | 7.8 | — | | Buffer over-read in Windows DWM Core Library allows an authorized attacker to disclose information l… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-34334 | Microsoft | high | 7.8 | — | | Concurrent execution using shared resource with improper synchronization ('race condition') in Windo… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-34332 | Microsoft | high | 8.0 | — | | Use after free in Windows Kernel-Mode Drivers allows an authorized attacker to execute code over a n… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-33838 | Microsoft | high | 7.8 | — | | Double free in Windows Message Queuing allows an authorized attacker to elevate privileges locally. | May 12, 2026 | May 13, 2026 |
| | CVE-2026-33837 | Microsoft | high | 7.8 | — | | Heap-based buffer overflow in Windows TCP/IP allows an authorized attacker to elevate privileges loc… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-33835 | Microsoft | high | 7.8 | — | | Use after free in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate pr… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-33833 | Microsoft | high | 8.2 | — | | Improper neutralization of special elements in output used by a downstream component ('injection') i… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-42898 | Microsoft | critical | 9.9 | — | | Improper control of generation of code ('code injection') in Microsoft Dynamics 365 (on-premises) al… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-42896 | Microsoft | high | 7.8 | — | | Integer overflow or wraparound in Windows DWM Core Library allows an authorized attacker to elevate … | May 12, 2026 | May 13, 2026 |
| | CVE-2026-35429 | Microsoft | medium | 4.3 | — | | User interface (ui) misrepresentation of critical information in Microsoft Edge for Android allows a… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-42891 | Microsoft | medium | 6.5 | — | | User interface (ui) misrepresentation of critical information in Microsoft Edge (Chromium-based) all… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-42825 | Microsoft | high | 7.0 | — | | Use after free in Windows Telephony Service allows an authorized attacker to elevate privileges loca… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-41107 | Microsoft | high | 7.4 | — | | External control of file name or path in Microsoft Edge (Chromium-based) allows an unauthorized atta… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-42831 | Microsoft | high | 7.8 | — | | Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code local… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-32185 | Microsoft | medium | 5.5 | — | | Files or directories accessible to external parties in Microsoft Teams allows an unauthorized attack… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-32170 | Microsoft | medium | 6.7 | — | | Double free in Windows Rich Text Edit Control allows an authorized attacker to elevate privileges lo… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-32161 | Microsoft | high | 7.5 | — | | Concurrent execution using shared resource with improper synchronization ('race condition') in Windo… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-41614 | Microsoft | medium | 6.2 | — | | Improper access control in M365 Copilot for Desktop allows an unauthorized attacker to perform spoof… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-41612 | Microsoft | medium | 5.5 | — | | Relative path traversal in Visual Studio Code allows an unauthorized attacker to disclose informatio… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-41611 | Microsoft | high | 7.8 | — | | Improper neutralization of script-related html tags in a web page (basic xss) in Visual Studio Code … | May 12, 2026 | May 13, 2026 |
| | CVE-2026-41109 | Microsoft | high | 8.8 | — | | Improper neutralization of special elements in output used by a downstream component ('injection') i… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-41102 | Microsoft | high | 7.1 | — | | Improper access control in Microsoft Office PowerPoint allows an authorized attacker to perform spoo… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-41101 | Microsoft | high | 7.1 | — | | Improper access control in Microsoft Office Word allows an authorized attacker to perform spoofing l… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-41096 | Microsoft | critical | 9.8 | — | | Heap-based buffer overflow in Microsoft Windows DNS allows an unauthorized attacker to execute code … | May 12, 2026 | May 13, 2026 |
| | CVE-2026-41095 | Microsoft | high | 7.8 | — | | Use after free in Data Deduplication allows an authorized attacker to elevate privileges locally. | May 12, 2026 | May 13, 2026 |
| | CVE-2026-41094 | Microsoft | high | 8.8 | — | | Improper control of generation of code ('code injection') in Microsoft Data Formulator allows an una… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-41089 | Microsoft | critical | 9.8 | — | | Stack-based buffer overflow in Windows Netlogon allows an unauthorized attacker to execute code over… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-41088 | Microsoft | high | 7.8 | — | | External control of file name or path in Windows Ancillary Function Driver for WinSock allows an aut… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40419 | Microsoft | high | 7.8 | — | | Use after free in Microsoft Office allows an authorized attacker to elevate privileges locally. | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40417 | Microsoft | high | 7.8 | — | | Weak authentication in Dynamics Business Central allows an authorized attacker to elevate privileges… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40415 | Microsoft | high | 8.1 | — | | Use after free in Windows TCP/IP allows an unauthorized attacker to execute code over a network. | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40410 | Microsoft | high | 7.0 | — | | Use after free in Windows SMB Client allows an authorized attacker to elevate privileges locally. | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40408 | Microsoft | high | 7.8 | — | | Use after free in Windows Kernel-Mode Drivers allows an authorized attacker to elevate privileges lo… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40407 | Microsoft | high | 7.8 | — | | Heap-based buffer overflow in Windows Common Log File System Driver allows an authorized attacker to… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40399 | Microsoft | high | 7.8 | — | | Stack-based buffer overflow in Windows TCP/IP allows an authorized attacker to elevate privileges lo… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40380 | Microsoft | medium | 6.2 | — | | Heap-based buffer overflow in Volume Manager Extension Driver allows an authorized attacker to execu… | May 12, 2026 | May 13, 2026 |
| | CVE-2026-40377 | Microsoft | high | 7.8 | — | | Heap-based buffer overflow in Windows Cryptographic Services allows an authorized attacker to elevat… | May 12, 2026 | May 13, 2026 |