Microsoft is publishing 137 vulnerabilities on May 2026 Patch Tuesday. Microsoft is not aware of exploitation in the wild or public disclosure for any of these vulnerabilities. So far this month, Microsoft has provided patches to address 133 browser vulnerabilities, which are not included in the Patch Tuesday count above.
Windows Netlogon: critical RCE
Anyone responsible for securing a domain controller should prioritize remediation of CVE-2026-41089, which is a critical stack-based buffer overflow in Windows Netlogon with a CVSS v3 base score of 9.8. Exploitation leads to execution in the context of the Netlogon service, so that’s SYSTEM privileges on the domain controller. For most pentesters, that’s the point at which the customer report more or less writes itself. No privileges or user interaction are required, and attack complexity is low, which suggests that creation of a reliable exploit might not be especially difficult for anyone with knowledge of the specific mechanism.
Microsoft assesses exploitation as less likely, but since those exploitability assessments are provided without an accompanying explanation, it’s not clear how much reassurance defenders should take. Anyone who remembers the much-discussed CVE-2020-1472 (aka ZeroLogon) back in 2020 will note that CVE-2026-41089 offers an attacker more immediate control of a domain controller. Patches are available for all versions of Windows Server from 2012 onwards.
Windows DNS Client: critical RCE
An attacker looking for a master key for Windows assets will pay attention to CVE-2026-41096, a critical RCE in the Windows DNS client implementation. A modern computer talks to DNS the way a child in the back of a car asks “are we there yet?” The variable and complex structure of DNS responses means that DNS client implementations are also complex and thus prone to flaws. Microsoft assesses exploitation as less likely, and we can hope that modern mitigations such as heap address randomization and optional-but-recommended encrypted channel DNS will make weaponization significantly more challenging by putting barriers across specific paths to exploitation. The DNS client on Windows runs as the NetworkService role, rather than SYSTEM, but a foothold is a foothold, and skilled attackers expect to chain exploits together.
JIRA/Confluence Entra ID auth plugin: critical EoP
If you’re still self-hosting Atlassian JIRA or Confluence and relying on the Microsoft Entra ID authentication plugin, you’ll want to know about CVE-2026-41103. This critical elevation of privilege vulnerability allows an unauthorized attacker to impersonate an existing user by presenting forged credentials, thus bypassing Entra ID. Microsoft expects that exploitation is more likely. Even if you can’t always find what you want on the corporate Confluence, a motivated attacker probably will. Curiously, the patch links on the advisory lead to older versions of the plugins published in 2024.
Microsoft WARP team
Microsoft’s WARP team is credited with multiple critical vulnerabilities today, after making their first appearance in MSRC advisory acknowledgements in last month’s Patch Tuesday. We can speculate that they likely know a great deal about the current state of AI-powered vulnerability research as it applies to Microsoft products.
Microsoft lifecycle update
There are no significant Microsoft product lifecycle changes this month. Microsoft .NET 9 STS (Standard Term Support, as distinct from Long Term Support) was originally scheduled to move past the end of support in May 2026, but late last year, Microsoft granted a six-month extension, so that .NET 9 STS now reaches end of support on November 10, 2026.
Summary charts



Summary tables
Apps vulnerabilities
CVE | Title | Exploitation status | Publicly disclosed? | CVSS v3 base score |
|---|---|---|---|---|
| CVE-2026-26129 | M365 Copilot Information Disclosure Vulnerability | N/A | No | 7.5 |
| CVE-2026-26164 | M365 Copilot Information Disclosure Vulnerability | Exploitation Less Likely | No | 7.5 |
| CVE-2026-41614 | M365 Copilot for Desktop Spoofing Vulnerability | Exploitation Less Likely | No | 6.2 |
| CVE-2026-41100 | Microsoft 365 Copilot for Android Spoofing Vulnerability | Exploitation Unlikely | No | 4.4 |
| CVE-2026-42832 | Microsoft Office Spoofing Vulnerability | Exploitation Unlikely | No | 7.7 |
| CVE-2026-41101 | Microsoft Word for Android Spoofing Vulnerability | Exploitation Unlikely | No | 7.1 |
Azure vulnerabilities
CVE | Title | Exploitation status | Publicly disclosed? | CVSS v3 base score |
|---|---|---|---|---|
| CVE-2026-35435 | Azure AI Foundry Elevation of Privilege Vulnerability | Exploitation More Likely | No | 8.6 |
| CVE-2026-35428 | Azure Cloud Shell Spoofing Vulnerability | N/A | No | 9.6 |
| CVE-2026-32207 | Azure Machine Learning Notebook Spoofing Vulnerability | n/a | No | 8.8 |
| CVE-2026-33109 | Azure Managed Instance for Apache Cassandra Remote Code Execution Vulnerability | N/A | No | 9.9 |
| CVE-2026-33844 | Azure Managed Instance for Apache Cassandra Remote Code Execution Vulnerability | N/A | No | 9.0 |
| CVE-2026-41105 | Azure Monitor Action Group Notification System Elevation of Privilege Vulnerability | N/A | No | 8.1 |
| CVE-2026-40379 | Microsoft Enterprise Security Token Service (ESTS) Spoofing Vulnerability | N/A | No | 9.3 |
| CVE-2026-34327 | Microsoft Partner Center Spoofing Vulnerability | N/A | No | 8.2 |
| CVE-2026-40381 | Azure Connected Machine Agent Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-42823 | Azure Logic Apps Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 9.9 |
| CVE-2026-33833 | Azure Machine Learning Notebook Spoofing Vulnerability | Exploitation Less Likely | No | 8.2 |
| CVE-2026-32204 | Azure Monitor Agent Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-42830 | Azure Monitor Agent Metrics Extension Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 6.5 |
| CVE-2026-33117 | Azure SDK for Java Security Feature Bypass Vulnerability | Exploitation Unlikely | No | 9.1 |
| CVE-2026-41103 | Microsoft SSO Plugin for Jira & Confluence Elevation of Privilege Vulnerability | Exploitation More Likely | No | 9.1 |
| CVE-2026-41086 | Windows Admin Center in Azure Portal Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 8.8 |
Browser vulnerabilities
CVE | Title | Exploitation status | Publicly disclosed? | CVSS v3 base score |
|---|---|---|---|---|
| CVE-2026-7898 | Chromium: CVE-2026-7898 Use after free in Chromoting | n/a | No | |
| CVE-2026-7899 | Chromium: CVE-2026-7899 Out of bounds read and write in V8 | n/a | No | |
| CVE-2026-7900 | Chromium: CVE-2026-7900 Heap buffer overflow in ANGLE | n/a | No | |
| CVE-2026-7901 | Chromium: CVE-2026-7901 Use after free in ANGLE | n/a | No | |
| CVE-2026-7902 | Chromium: CVE-2026-7902 Out of bounds memory access in V8 | n/a | No | |
| CVE-2026-7903 | Chromium: CVE-2026-7903 Integer overflow in ANGLE | n/a | No | |
| CVE-2026-7904 | Chromium: CVE-2026-7904 Out of bounds read in Fonts | n/a | No | |
| CVE-2026-7906 | Chromium: CVE-2026-7906 Use after free in SVG | n/a | No | |
| CVE-2026-7907 | Chromium: CVE-2026-7907 Use after free in DOM | n/a | No | |
| CVE-2026-7908 | Chromium: CVE-2026-7908 Use after free in Fullscreen | n/a | No | |
| CVE-2026-7909 | Chromium: CVE-2026-7909 Inappropriate implementation in ServiceWorker | n/a | No | |
| CVE-2026-7910 | Chromium: CVE-2026-7910 Use after free in Views | n/a | No | |
| CVE-2026-7911 | Chromium: CVE-2026-7911 Use after free in Aura | n/a | No | |
| CVE-2026-7914 | Chromium: CVE-2026-7914 Type Confusion in Accessibility | n/a | No | |
| CVE-2026-7916 | Chromium: CVE-2026-7916 Insufficient data validation in InterestGroups | n/a | No | |
| CVE-2026-7917 | Chromium: CVE-2026-7917 Use after free in Fullscreen | n/a | No | |
| CVE-2026-7918 | Chromium: CVE-2026-7918 Use after free in GPU | n/a | No | |
| CVE-2026-7919 | Chromium: CVE-2026-7919 Use after free in Aura | n/a | No | |
| CVE-2026-7920 | Chromium: CVE-2026-7920 Use after free in Skia | n/a | No | |
| CVE-2026-7921 | Chromium: CVE-2026-7921 Use after free in Passwords | n/a | No | |
| CVE-2026-7922 | Chromium: CVE-2026-7922 Use after free in ServiceWorker | n/a | No | |
| CVE-2026-7923 | Chromium: CVE-2026-7923 Out of bounds write in Skia | n/a | No | |
| CVE-2026-7924 | Chromium: CVE-2026-7924 Uninitialized Use in Dawn | n/a | No | |
| CVE-2026-7925 | Chromium: CVE-2026-7925 Use after free in Chromoting | n/a | No | |
| CVE-2026-7926 | Chromium: CVE-2026-7926 Use after free in PresentationAPI | n/a | No | |
| CVE-2026-7927 | Chromium: CVE-2026-7927 Type Confusion in Runtime | n/a | No | |
| CVE-2026-7928 | Chromium: CVE-2026-7928 Use after free in WebRTC | n/a | No | |
| CVE-2026-7929 | Chromium: CVE-2026-7929 Use after free in MediaRecording | n/a | No | |
| CVE-2026-7930 | Chromium: CVE-2026-7930 Insufficient validation of untrusted input in Cookies | n/a | No | |
| CVE-2026-7932 | Chromium: CVE-2026-7932 Insufficient policy enforcement in Downloads | n/a | No | |
| CVE-2026-7933 | Chromium: CVE-2026-7933 Out of bounds read in WebCodecs | n/a | No | |
| CVE-2026-7934 | Chromium: CVE-2026-7934 Insufficient validation of untrusted input in Popup Blocker | n/a | No | |
| CVE-2026-7935 | Chromium: CVE-2026-7935 Inappropriate implementation in Speech | n/a | No | |
| CVE-2026-7936 | Chromium: CVE-2026-7936 Object lifecycle issue in V8 | n/a | No | |
| CVE-2026-7937 | Chromium: CVE-2026-7937 Insufficient policy enforcement in DevTools | n/a | No | |
| CVE-2026-7938 | Chromium: CVE-2026-7938 Use after free in CSS | n/a | No | |
| CVE-2026-7939 | Chromium: CVE-2026-7939 Inappropriate implementation in SanitizerAPI | n/a | No | |
| CVE-2026-7940 | Chromium: CVE-2026-7940 Use after free in V8 | n/a | No | |
| CVE-2026-7942 | Chromium: CVE-2026-7942 Integer overflow in ANGLE | n/a | No | |
| CVE-2026-7943 | Chromium: CVE-2026-7943 Insufficient validation of untrusted input in ANGLE | n/a | No | |
| CVE-2026-7944 | Chromium: CVE-2026-7944 Insufficient validation of untrusted input in Persistent Cache | n/a | No | |
| CVE-2026-7945 | Chromium: CVE-2026-7945 Insufficient validation of untrusted input in COOP | n/a | No | |
| CVE-2026-7946 | Chromium: CVE-2026-7946 Insufficient policy enforcement in WebUI | n/a | No | |
| CVE-2026-7947 | Chromium: CVE-2026-7947 Insufficient validation of untrusted input in Network | n/a | No | |
| CVE-2026-7948 | Chromium: CVE-2026-7948 Race in Chromoting | n/a | No | |
| CVE-2026-7949 | Chromium: CVE-2026-7949 Out of bounds read in Skia | n/a | No | |
| CVE-2026-7950 | Chromium: CVE-2026-7950 Out of bounds read and write in GFX | n/a | No | |
| CVE-2026-7951 | Chromium: CVE-2026-7951 Out of bounds write in WebRTC | n/a | No | |
| CVE-2026-7952 | Chromium: CVE-2026-7952 Insufficient policy enforcement in Extensions | n/a | No | |
| CVE-2026-7953 | Chromium: CVE-2026-7953 Insufficient validation of untrusted input in Omnibox | n/a | No | |
| CVE-2026-7954 | Chromium: CVE-2026-7954 Race in Shared Storage | n/a | No | |
| CVE-2026-7955 | Chromium: CVE-2026-7955 Uninitialized Use in GPU | n/a | No | |
| CVE-2026-7956 | Chromium: CVE-2026-7956 Use after free in Navigation | n/a | No | |
| CVE-2026-7957 | Chromium: CVE-2026-7957 Out of bounds write in Media | n/a | No | |
| CVE-2026-7958 | Chromium: CVE-2026-7958 Inappropriate implementation in ServiceWorker | n/a | No | |
| CVE-2026-7959 | Chromium: CVE-2026-7959 Inappropriate implementation in Navigation | n/a | No | |
| CVE-2026-7960 | Chromium: CVE-2026-7960 Race in Speech | n/a | No | |
| CVE-2026-7961 | Chromium: CVE-2026-7961 Insufficient validation of untrusted input in Permissions | n/a | No | |
| CVE-2026-7962 | Chromium: CVE-2026-7962 Insufficient policy enforcement in DirectSockets | n/a | No | |
| CVE-2026-7963 | Chromium: CVE-2026-7963 Inappropriate implementation in ServiceWorker | n/a | No | |
| CVE-2026-7964 | Chromium: CVE-2026-7964 Insufficient validation of untrusted input in FileSystem | n/a | No | |
| CVE-2026-7965 | Chromium: CVE-2026-7965 Insufficient validation of untrusted input in DevTools | n/a | No | |
| CVE-2026-7966 | Chromium: CVE-2026-7966 Insufficient validation of untrusted input in SiteIsolation | n/a | No | |
| CVE-2026-7967 | Chromium: CVE-2026-7967 Insufficient validation of untrusted input in Navigation | n/a | No | |
| CVE-2026-7968 | Chromium: CVE-2026-7968 Insufficient validation of untrusted input in CORS | n/a | No | |
| CVE-2026-7969 | Chromium: CVE-2026-7969 Integer overflow in Network | n/a | No | |
| CVE-2026-7970 | Chromium: CVE-2026-7970 Use after free in TopChrome | n/a | No | |
| CVE-2026-7971 | Chromium: CVE-2026-7971 Inappropriate implementation in ORB | n/a | No | |
| CVE-2026-7972 | Chromium: CVE-2026-7972 Uninitialized Use in GPU | n/a | No | |
| CVE-2026-7973 | Chromium: CVE-2026-7973 Integer overflow in Dawn | n/a | No | |
| CVE-2026-7974 | Chromium: CVE-2026-7974 Use after free in Blink | n/a | No | |
| CVE-2026-7975 | Chromium: CVE-2026-7975 Use after free in DevTools | n/a | No | |
| CVE-2026-7976 | Chromium: CVE-2026-7976 Use after free in Views | n/a | No | |
| CVE-2026-7977 | Chromium: CVE-2026-7977 Inappropriate implementation in Canvas | n/a | No | |
| CVE-2026-7978 | Chromium: CVE-2026-7978 Inappropriate implementation in Companion | n/a | No | |
| CVE-2026-7979 | Chromium: CVE-2026-7979 Inappropriate implementation in Media | n/a | No | |
| CVE-2026-7980 | Chromium: CVE-2026-7980 Use after free in WebAudio | n/a | No | |
| CVE-2026-7981 | Chromium: CVE-2026-7981 Out of bounds read in Codecs | n/a | No | |
| CVE-2026-7982 | Chromium: CVE-2026-7982 Uninitialized Use in WebCodecs | n/a | No | |
| CVE-2026-7983 | Chromium: CVE-2026-7983 Out of bounds read in Dawn | n/a | No | |
| CVE-2026-7984 | Chromium: CVE-2026-7984 Use after free in ReadingMode | n/a | No | |
| CVE-2026-7985 | Chromium: CVE-2026-7985 Use after free in GPU | n/a | No | |
| CVE-2026-7986 | Chromium: CVE-2026-7986 Insufficient policy enforcement in Autofill | n/a | No | |
| CVE-2026-7987 | Chromium: CVE-2026-7987 Use after free in WebRTC | n/a | No | |
| CVE-2026-7988 | Chromium: CVE-2026-7988 Type Confusion in WebRTC | n/a | No | |
| CVE-2026-7989 | Chromium: CVE-2026-7989 Insufficient data validation in DataTransfer | n/a | No | |
| CVE-2026-7990 | Chromium: CVE-2026-7990 Insufficient validation of untrusted input in Updater | n/a | No | |
| CVE-2026-7991 | Chromium: CVE-2026-7991 Use after free in UI | n/a | No | |
| CVE-2026-7992 | Chromium: CVE-2026-7992 Insufficient validation of untrusted input in UI | n/a | No | |
| CVE-2026-7994 | Chromium: CVE-2026-7994 Inappropriate implementation in Chromoting | n/a | No | |
| CVE-2026-7995 | Chromium: CVE-2026-7995 Out of bounds read in AdFilter | n/a | No | |
| CVE-2026-7996 | Chromium: CVE-2026-7996 Insufficient validation of untrusted input in SSL | n/a | No | |
| CVE-2026-7997 | Chromium: CVE-2026-7997 Insufficient validation of untrusted input in Updater | n/a | No | |
| CVE-2026-7998 | Chromium: CVE-2026-7998 Insufficient validation of untrusted input in Dialog | n/a | No | |
| CVE-2026-7999 | Chromium: CVE-2026-7999 Inappropriate implementation in V8 | n/a | No | |
| CVE-2026-8000 | Chromium: CVE-2026-8000 Insufficient validation of untrusted input in ChromeDriver | n/a | No | |
| CVE-2026-8001 | Chromium: CVE-2026-8001 Use after free in Printing | n/a | No | |
| CVE-2026-8002 | Chromium: CVE-2026-8002 Use after free in Audio | n/a | No | |
| CVE-2026-8003 | Chromium: CVE-2026-8003 Insufficient validation of untrusted input in TabGroups | n/a | No | |
| CVE-2026-8004 | Chromium: CVE-2026-8004 Insufficient policy enforcement in DevTools | n/a | No | |
| CVE-2026-8005 | Chromium: CVE-2026-8005 Insufficient validation of untrusted input in Cast | n/a | No | |
| CVE-2026-8006 | Chromium: CVE-2026-8006 Insufficient policy enforcement in DevTools | n/a | No | |
| CVE-2026-8007 | Chromium: CVE-2026-8007 Insufficient validation of untrusted input in Cast | n/a | No | |
| CVE-2026-8008 | Chromium: CVE-2026-8008 Inappropriate implementation in DevTools | n/a | No | |
| CVE-2026-8009 | Chromium: CVE-2026-8009 Inappropriate implementation in Cast | n/a | No | |
| CVE-2026-8010 | Chromium: CVE-2026-8010 Insufficient validation of untrusted input in SiteIsolation | n/a | No | |
| CVE-2026-8011 | Chromium: CVE-2026-8011 Insufficient policy enforcement in Search | n/a | No | |
| CVE-2026-8012 | Chromium: CVE-2026-8012 Inappropriate implementation in MHTML | n/a | No | |
| CVE-2026-8013 | Chromium: CVE-2026-8013 Insufficient validation of untrusted input in FedCM | n/a | No | |
| CVE-2026-8014 | Chromium: CVE-2026-8014 Inappropriate implementation in Preload | n/a | No | |
| CVE-2026-8015 | Chromium: CVE-2026-8015 Inappropriate implementation in Media | n/a | No | |
| CVE-2026-8016 | Chromium: CVE-2026-8016 Use after free in WebRTC | n/a | No | |
| CVE-2026-8017 | Chromium: CVE-2026-8017 Side-channel information leakage in Media | n/a | No | |
| CVE-2026-8018 | Chromium: CVE-2026-8018 Insufficient policy enforcement in DevTools | n/a | No | |
| CVE-2026-8019 | Chromium: CVE-2026-8019 Insufficient policy enforcement in WebApp | n/a | No | |
| CVE-2026-8021 | Chromium: CVE-2026-8021 Script injection in UI | n/a | No | |
| CVE-2026-8022 | Chromium: CVE-2026-8022 Inappropriate implementation in MHTML | n/a | No | |
| CVE-2026-33111 | Copilot Chat (Microsoft Edge) Information Disclosure Vulnerability | Exploitation Less Likely | No | 7.5 |
| CVE-2026-7896 | Chromium: CVE-2026-7896 Integer overflow in Blink | n/a | No | |
| CVE-2026-7897 | Chromium: CVE-2026-7897 Use after free in Mobile | n/a | No | |
| CVE-2026-7905 | Chromium: CVE-2026-7905 Insufficient validation of untrusted input in Media | n/a | No | |
| CVE-2026-7912 | Chromium: CVE-2026-7912 Integer overflow in GPU | n/a | No | |
| CVE-2026-7913 | Chromium: CVE-2026-7913 Insufficient policy enforcement in DevTools | n/a | No | |
| CVE-2026-7915 | Chromium: CVE-2026-7915 Insufficient data validation in DevTools | n/a | No | |
| CVE-2026-7931 | Chromium: CVE-2026-7931 Insufficient validation of untrusted input in iOS | n/a | No | |
| CVE-2026-7941 | Chromium: CVE-2026-7941 Insufficient validation of untrusted input in Mobile | n/a | No | |
| CVE-2026-7993 | Chromium: CVE-2026-7993 Insufficient validation of untrusted input in Payments | n/a | No | |
| CVE-2026-8020 | Chromium: CVE-2026-8020 Uninitialized Use in GPU | n/a | No | |
| CVE-2026-42838 | Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 5.4 |
| CVE-2026-42891 | Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability | Exploitation Unlikely | No | 6.5 |
| CVE-2026-35429 | Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability | Exploitation Unlikely | No | 4.3 |
| CVE-2026-40416 | Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability | Exploitation Unlikely | No | 4.3 |
| CVE-2026-41107 | Microsoft Edge (Chromium-based) Information Disclosure Vulnerability | Exploitation Less Likely | No | 7.4 |
Developer Tools vulnerabilities
CVE | Title | Exploitation status | Publicly disclosed? | CVSS v3 base score |
|---|---|---|---|---|
| CVE-2026-42826 | Azure DevOps Information Disclosure Vulnerability | N/A | No | 10.0 |
| CVE-2026-32175 | .NET Core Tampering Vulnerability | Exploitation Less Likely | No | 4.3 |
| CVE-2026-32177 | .NET Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.3 |
| CVE-2026-35433 | .NET Elevation of Privilege Vulnerability | Exploitation Unlikely | No | 7.3 |
| CVE-2026-42899 | ASP.NET Core Denial of Service Vulnerability | Exploitation Unlikely | No | 7.5 |
| CVE-2026-41109 | GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability | Exploitation Less Likely | No | 8.8 |
| CVE-2026-41094 | Microsoft Data Formulator Remote Code Execution Vulnerability | Exploitation Less Likely | No | 8.8 |
| CVE-2026-41613 | Visual Studio Code Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 8.8 |
| CVE-2026-41612 | Visual Studio Code Information Disclosure Vulnerability | Exploitation Less Likely | No | 5.5 |
| CVE-2026-41611 | Visual Studio Code Remote Code Execution Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-41610 | Visual Studio Code Security Feature Bypass Vulnerability | Exploitation Less Likely | No | 6.3 |
ESU vulnerabilities
CVE | Title | Exploitation status | Publicly disclosed? | CVSS v3 base score |
|---|---|---|---|---|
| CVE-2025-54518 | AMD: CVE-2025-54518 CPU OP Cache Corruption | Exploitation Unlikely | No | |
| CVE-2026-41095 | Data Deduplication Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-35424 | Internet Key Exchange (IKE) Protocol Denial of Service Vulnerability | Exploitation Unlikely | No | 7.5 |
| CVE-2026-40377 | Microsoft Cryptographic Services Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-34329 | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability | Exploitation Less Likely | No | 8.8 |
| CVE-2026-41097 | Secure Boot Security Feature Bypass Vulnerability | Exploitation Less Likely | No | 6.7 |
| CVE-2026-33839 | Win32k Elevation of Privilege Vulnerability | Exploitation Unlikely | No | 7.0 |
| CVE-2026-34330 | Win32k Elevation of Privilege Vulnerability | Exploitation Unlikely | No | 7.8 |
| CVE-2026-34331 | Win32k Elevation of Privilege Vulnerability | Exploitation Unlikely | No | 7.0 |
| CVE-2026-35423 | Windows 11 Telnet Client Information Disclosure Vulnerability | Exploitation Unlikely | No | 5.4 |
| CVE-2026-34344 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-34345 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.0 |
| CVE-2026-35416 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Exploitation More Likely | No | 7.0 |
| CVE-2026-41088 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Exploitation Unlikely | No | 7.8 |
| CVE-2026-34343 | Windows Application Identity (AppID) Subsystem Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-35418 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | Exploitation Unlikely | No | 7.8 |
| CVE-2026-33835 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | Exploitation More Likely | No | 7.8 |
| CVE-2026-34337 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-40407 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Exploitation Unlikely | No | 7.8 |
| CVE-2026-40397 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Exploitation More Likely | No | 7.8 |
| CVE-2026-34336 | Windows DWM Core Library Information Disclosure Vulnerability | Exploitation Unlikely | No | 7.8 |
| CVE-2026-33834 | Windows Event Logging Service Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-32209 | Windows Filtering Platform (WFP) Security Feature Bypass Vulnerability | Exploitation Unlikely | No | 4.4 |
| CVE-2026-35421 | Windows GDI Remote Code Execution Vulnerability | Exploitation Unlikely | No | 7.8 |
| CVE-2026-40403 | Windows Graphics Component Remote Code Execution Vulnerability | Exploitation Less Likely | No | 8.8 |
| CVE-2026-33841 | Windows Kernel Elevation of Privilege Vulnerability | Exploitation More Likely | No | 7.8 |
| CVE-2026-35420 | Windows Kernel Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-34339 | Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability | Exploitation Less Likely | No | 5.5 |
| CVE-2026-34341 | Windows Link-Layer Discovery Protocol (LLDP) Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.0 |
| CVE-2026-33838 | Windows Message Queuing (MSMQ) Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-32161 | Windows Native WiFi Miniport Driver Remote Code Execution Vulnerability | Exploitation Less Likely | No | 7.5 |
| CVE-2026-41089 | Windows Netlogon Remote Code Execution Vulnerability | Exploitation Less Likely | No | 9.8 |
| CVE-2026-34342 | Windows Print Spooler Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.0 |
| CVE-2026-34340 | Windows Projected File System Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.0 |
| CVE-2026-40398 | Windows Remote Desktop Services Elevation of Privilege Vulnerability | Exploitation More Likely | No | 7.8 |
| CVE-2026-21530 | Windows Rich Text Edit Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 6.7 |
| CVE-2026-32170 | Windows Rich Text Edit Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 6.7 |
| CVE-2026-40410 | Windows SMB Client Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.0 |
| CVE-2026-35415 | Windows Storage Spaces Controller Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-40414 | Windows TCP/IP Denial of Service Vulnerability | Exploitation Unlikely | No | 7.4 |
| CVE-2026-40401 | Windows TCP/IP Denial of Service Vulnerability | Exploitation Unlikely | No | 7.1 |
| CVE-2026-40413 | Windows TCP/IP Denial of Service Vulnerability | Exploitation Less Likely | No | 7.4 |
| CVE-2026-35422 | Windows TCP/IP Driver Security Feature Bypass Vulnerability | Exploitation Unlikely | No | 6.5 |
| CVE-2026-34351 | Windows TCP/IP Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-40399 | Windows TCP/IP Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-34334 | Windows TCP/IP Elevation of Privilege Vulnerability | Exploitation Unlikely | No | 7.8 |
| CVE-2026-40406 | Windows TCP/IP Information Disclosure Vulnerability | Exploitation Less Likely | No | 7.5 |
| CVE-2026-33837 | Windows TCP/IP Local Elevation of Privilege Vulnerability | Exploitation More Likely | No | 7.8 |
| CVE-2026-40415 | Windows TCP/IP Remote Code Execution Vulnerability | Exploitation Unlikely | No | 8.1 |
| CVE-2026-42825 | Windows Telephony Service Elevation of Privilege Vulnerability | Exploitation Unlikely | No | 7.0 |
| CVE-2026-34338 | Windows Telephony Service Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-40382 | Windows Telephony Service Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-40380 | Windows Volume Manager Extension Driver Remote Code Execution Vulnerability | Exploitation Less Likely | No | 6.2 |
| CVE-2026-40408 | Windows WAN ARP Driver Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-34333 | Windows Win32k Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-34347 | Windows Win32k Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.0 |
| CVE-2026-35417 | Windows Win32k Elevation of Privilege Vulnerability | Exploitation More Likely | No | 7.8 |
Mariner vulnerabilities
CVE | Title | Exploitation status | Publicly disclosed? | CVSS v3 base score |
|---|---|---|---|---|
| CVE-2026-7598 | libssh2 userauth.c userauth_password integer overflow | n/a | No | 7.3 |
| CVE-2026-43870 | Apache Thrift: Node.js web_server.js multi-vulnerability | n/a | No | 7.3 |
| CVE-2026-43868 | Apache Thrift: Rust implementation vulnerable to CVE-2020-13949 pattern | n/a | No | 5.3 |
| CVE-2026-43869 | Apache Thrift: TSSLTransportFactory.java hostname verification | n/a | No | 7.3 |
Microsoft Dynamics vulnerabilities
CVE | Title | Exploitation status | Publicly disclosed? | CVSS v3 base score |
|---|---|---|---|---|
| CVE-2026-33821 | Microsoft Dynamics 365 Customer Insights Elevation of Privilege Vulnerability | N/A | No | 7.7 |
| CVE-2026-40417 | Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-42898 | Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability | Exploitation Unlikely | No | 9.9 |
| CVE-2026-42833 | Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability | Exploitation Less Likely | No | 9.1 |
| CVE-2026-40374 | Microsoft Power Automate Desktop Information Disclosure Vulnerability | Exploitation Less Likely | No | 6.5 |
Open Source Software vulnerabilities
CVE | Title | Exploitation status | Publicly disclosed? | CVSS v3 base score |
|---|---|---|---|---|
| CVE-2026-31706 | ksmbd: validate num_aces and harden ACE walk in smb_inherit_dacl() | n/a | No | 8.8 |
| CVE-2026-31723 | usb: gadget: f_subset: Fix net_device lifecycle with device_move | n/a | No | 7.8 |
| CVE-2026-31724 | usb: gadget: f_eem: Fix net_device lifecycle with device_move | n/a | No | 7.8 |
| CVE-2026-43053 | xfs: close crash window in attr dabtree inactivation | n/a | No | 5.5 |
| CVE-2026-43048 | HID: core: Mitigate potential OOB by removing bogus memset() | n/a | No | 8.8 |
| CVE-2026-31777 | ALSA: ctxfi: Check the error for index mapping | n/a | No | 7.0 |
| CVE-2026-31722 | usb: gadget: f_rndis: Fix net_device lifecycle with device_move | n/a | No | 7.8 |
| CVE-2026-43036 | net: use skb_header_pointer() for TCPv4 GSO frag_off check | n/a | No | 5.5 |
| CVE-2026-31769 | gpib: fix use-after-free in IO ioctl handlers | n/a | No | |
| CVE-2026-31707 | ksmbd: validate response sizes in ipc_validate_msg() | n/a | No | 7.1 |
| CVE-2026-31725 | usb: gadget: f_ecm: Fix net_device lifecycle with device_move | n/a | No | 7.8 |
| CVE-2026-43049 | HID: logitech-hidpp: Prevent use-after-free on force feedback initialisation failure | n/a | No | 7.0 |
| CVE-2026-43022 | Bluetooth: hci_sync: hci_cmd_sync_queue_once() return -EEXIST if exists | n/a | No | |
| CVE-2026-43042 | mpls: add seqcount to protect the platform_label{,s} pair | n/a | No | 7.1 |
| CVE-2026-31771 | Bluetooth: hci_event: move wake reason storage into validated event handlers | n/a | No | 8.1 |
| CVE-2026-43052 | wifi: mac80211: check tdls flag in ieee80211_tdls_oper | n/a | No | 7.0 |
| CVE-2026-31709 | smb: client: validate the whole DACL before rewriting it in cifsacl | n/a | No | 8.8 |
| CVE-2026-43021 | Bluetooth: hci_sync: fix leaks when hci_cmd_sync_queue_once fails | n/a | No | |
| CVE-2026-31712 | ksmbd: require minimum ACE size in smb_check_perm_dacl() | n/a | No | 8.3 |
| CVE-2026-43010 | bpf: Reject sleepable kprobe_multi programs at attach time | n/a | No | 5.5 |
| CVE-2026-43019 | Bluetooth: hci_conn: fix potential UAF in set_cig_params_sync | n/a | No | 7.8 |
| CVE-2026-31729 | usb: typec: ucsi: validate connector number in ucsi_notify_common() | n/a | No | 7.0 |
| CVE-2026-43045 | mshv: Fix error handling in mshv_region_pin | n/a | No | |
| CVE-2026-43009 | bpf: Fix incorrect pruning due to atomic fetch precision tracking | n/a | No | 7.8 |
| CVE-2026-31715 | f2fs: fix UAF caused by decrementing sbi->nr_pages[] in f2fs_write_end_io() | n/a | No | 5.5 |
| CVE-2026-31697 | crypto: ccp: Don't attempt to copy ID to userspace if PSP command failed | n/a | No | 7.1 |
| CVE-2026-31721 | usb: gadget: f_hid: move list and spinlock inits from bind to alloc | n/a | No | 7.8 |
| CVE-2026-31711 | smb: server: fix active_num_conn leak on transport allocation failure | n/a | No | 7.5 |
| CVE-2026-31699 | crypto: ccp: Don't attempt to copy CSR to userspace if PSP command failed | n/a | No | 7.1 |
| CVE-2026-31694 | fuse: reject oversized dirents in page cache | n/a | No | 7.8 |
| CVE-2026-31705 | ksmbd: fix out-of-bounds write in smb2_get_ea() EA alignment | n/a | No | 9.8 |
| CVE-2026-43033 | crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption | n/a | No | 7.8 |
| CVE-2026-31696 | rxrpc: Fix missing validation of ticket length in non-XDR key preparsing | n/a | No | 5.5 |
| CVE-2026-31698 | crypto: ccp: Don't attempt to copy PDH cert to userspace if PSP command failed | n/a | No | 7.1 |
| CVE-2026-31704 | ksmbd: use check_add_overflow() to prevent u16 DACL size overflow | n/a | No | 7.5 |
| CVE-2026-31702 | f2fs: fix use-after-free of sbi in f2fs_compress_write_end_io() | n/a | No | 7.8 |
| CVE-2026-31708 | smb: client: fix OOB read in smb2_ioctl_query_info QUERY_INFO path | n/a | No | 8.1 |
| CVE-2026-31700 | net/packet: fix TOCTOU race on mmap'd vnet_hdr in tpacket_snd() | n/a | No | 7.8 |
| CVE-2026-7598 | libssh2 userauth.c userauth_password integer overflow | n/a | No | 7.3 |
| CVE-2026-43058 | media: vidtv: fix pass-by-value structs causing MSAN warnings | n/a | No | 7.1 |
| CVE-2026-37457 | n/a | No | 7.5 | |
| CVE-2026-43964 | n/a | No | 3.7 | |
| CVE-2026-43037 | ip6_tunnel: clear skb2->cb[] in ip4ip6_err() | n/a | No | 7.0 |
| CVE-2026-33190 | CoreDNS TSIG authentication bypass on encrypted DNS transports | n/a | No | |
| CVE-2026-33489 | CoreDNS transfer plugin subzone ACL bypass via lexicographic zone comparison | n/a | No | |
| CVE-2026-32936 | CoreDNS DoH GET path missing size validation causes CPU and memory amplification | n/a | No | |
| CVE-2026-32934 | CoreDNS DNS-over-QUIC unbounded goroutine growth leads to denial of service | n/a | No | |
| CVE-2026-35579 | CoreDNS TSIG authentication bypass on gRPC, QUIC, DoH, and DoH3 transports | n/a | No | |
| CVE-2026-43073 | x86-64: rename misleadingly named '__copy_user_nocache()' function | n/a | No | 2.5 |
| CVE-2026-42151 | Prometheus Azure AD remote write OAuth client secret exposed via config API | n/a | No | 7.5 |
| CVE-2026-42154 | Prometheus: remote read endpoint allows denial of service via crafted snappy payload | n/a | No | 7.5 |
| CVE-2026-43125 | dlm: validate length in dlm_search_rsb_tree | n/a | No | 7.8 |
| CVE-2026-43248 | vhost: move vdpa group bound check to vhost_vdpa | n/a | No | 7.1 |
| CVE-2026-43176 | wifi: rtw89: pci: validate release report content before using for RTL8922DE | n/a | No | 7.0 |
| CVE-2026-43204 | ASoC: qcom: q6asm: drop DSP responses for closed data streams | n/a | No | 5.5 |
| CVE-2026-43131 | drm/amd/pm: Fix null pointer dereference issue | n/a | No | 5.5 |
| CVE-2026-43126 | ALSA: mixer: oss: Add card disconnect checkpoints | n/a | No | 5.5 |
| CVE-2026-43127 | ntfs3: fix circular locking dependency in run_unpack_ex | n/a | No | 5.5 |
| CVE-2026-43161 | iommu/vt-d: Skip dev-iotlb flush for inaccessible PCIe device without scalable mode | n/a | No | 5.5 |
| CVE-2026-43198 | tcp: fix potential race in tcp_v6_syn_recv_sock() | n/a | No | 4.8 |
| CVE-2026-43245 | ntfs: ->d_compare() must not block | n/a | No | 7.1 |
| CVE-2025-71290 | misc: ti_fpc202: fix a potential memory leak in probe function | n/a | No | 5.5 |
| CVE-2026-43137 | ASoC: SOF: Intel: hda: Fix NULL pointer dereference | n/a | No | 5.5 |
| CVE-2026-43115 | srcu: Use irq_work to start GP in tiny SRCU | n/a | No | 5.5 |
| CVE-2026-43234 | team: avoid NETDEV_CHANGEMTU event when unregistering slave | n/a | No | 5.5 |
| CVE-2025-71293 | drm/amdgpu/ras: Move ras data alloc before bad page check | n/a | No | 5.5 |
| CVE-2026-43172 | wifi: iwlwifi: fix 22000 series SMEM parsing | n/a | No | 5.3 |
| CVE-2025-71285 | net: qrtr: Drop the MHI auto_queue feature for IPCR DL channels | n/a | No | 4.7 |
| CVE-2026-43197 | netconsole: avoid OOB reads, msg is not nul-terminated | n/a | No | 5.5 |
| CVE-2026-43185 | ksmbd: fix signededness bug in smb_direct_prepare_negotiation() | n/a | No | 5.5 |
| CVE-2025-71273 | wifi: rtw88: Use devm_kmemdup() in rtw_set_supported_band() | n/a | No | 5.3 |
| CVE-2026-43118 | btrfs: fix zero size inode with non-zero size after log replay | n/a | No | 3.3 |
| CVE-2026-43109 | x86: shadow stacks: proper error handling for mmap lock | n/a | No | 7.1 |
| CVE-2026-43153 | xfs: remove xfs_attr_leaf_hasname | n/a | No | 7.1 |
| CVE-2026-43129 | ima: verify the previous kernel's IMA buffer lies in addressable RAM | n/a | No | 5.5 |
| CVE-2026-43116 | netfilter: ctnetlink: ensure safe access to master conntrack | n/a | No | 7.1 |
| CVE-2026-43274 | mailbox: mchp-ipc-sbi: fix out-of-bounds access in mchp_ipc_get_cluster_aggr_irq() | n/a | No | 7.1 |
| CVE-2026-43244 | kcm: fix zero-frag skb in frag_list on partial sendmsg error | n/a | No | 5.5 |
| CVE-2026-43191 | drm/amd/display: Adjust PHY FSM transition to TX_EN-to-PLL_ON for TMDS on DCN35 | n/a | No | 5.5 |
| CVE-2026-43258 | alpha: fix user-space corruption during memory compaction | n/a | No | 5.5 |
| CVE-2025-71289 | fs/ntfs3: handle attr_set_size() errors when truncating files | n/a | No | 7.1 |
| CVE-2026-43107 | xfrm: account XFRMA_IF_ID in aevent size calculation | n/a | No | 5.5 |
| CVE-2026-43243 | drm/amd/display: Add signal type check for dcn401 get_phyd32clk_src | n/a | No | 5.5 |
| CVE-2025-71294 | drm/amdgpu: fix NULL pointer issue buffer funcs | n/a | No | 5.5 |
| CVE-2026-43250 | usb: chipidea: udc: fix DMA and SG cleanup in _ep_nuke() | n/a | No | 7.1 |
| CVE-2026-43237 | drm/amdgpu: Refactor amdgpu_gem_va_ioctl for Handling Last Fence Update and Timeline Management v4 | n/a | No | 5.5 |
| CVE-2026-43201 | APEI/GHES: ARM processor Error: don't go past allocated memory | n/a | No | 5.5 |
| CVE-2026-43219 | net: cpsw_new: Fix potential unregister of netdev that has not been registered yet | n/a | No | 7.1 |
| CVE-2026-43165 | hwmon: (nct7363) Fix a resource leak in nct7363_present_pwm_fanin | n/a | No | 5.5 |
| CVE-2026-43088 | net: af_key: zero aligned sockaddr tail in PF_KEY exports | n/a | No | 7.1 |
| CVE-2026-43195 | drm/amdgpu: validate user queue size constraints | n/a | No | 7.1 |
| CVE-2025-71272 | most: core: fix resource leak in most_register_interface error paths | n/a | No | 5.5 |
| CVE-2026-43213 | wifi: rtw89: pci: validate sequence number of TX release report | n/a | No | 7.0 |
| CVE-2026-43228 | hfs: Replace BUG_ON with error handling for CNID count checks | n/a | No | 7.1 |
| CVE-2026-43216 | net: Drop the lock in skb_may_tx_timestamp() | n/a | No | 5.5 |
| CVE-2026-43119 | Bluetooth: hci_sync: annotate data-races around hdev->req_status | n/a | No | 5.3 |
| CVE-2026-43267 | wifi: rtw89: fix potential zero beacon interval in beacon tracking | n/a | No | 7.0 |
| CVE-2026-43101 | ipv6: ioam: fix potential NULL dereferences in __ioam6_fill_trace_data() | n/a | No | 7.0 |
| CVE-2026-43199 | net/mlx5e: Fix "scheduling while atomic" in IPsec MAC address query | n/a | No | 7.0 |
| CVE-2026-43083 | net: ioam6: fix OOB and missing lock | n/a | No | 7.0 |
| CVE-2026-43870 | Apache Thrift: Node.js web_server.js multi-vulnerability | n/a | No | 7.3 |
| CVE-2026-43868 | Apache Thrift: Rust implementation vulnerable to CVE-2020-13949 pattern | n/a | No | 5.3 |
| CVE-2026-33523 | Apache HTTP Server: multiple modules: HTTP response splitting forwarding malicious status line | n/a | No | 6.5 |
| CVE-2026-23918 | Apache HTTP Server: http2: double free and possible RCE on early reset | n/a | No | 8.8 |
| CVE-2026-34059 | Apache HTTP Server: mod_proxy_ajp: Heap Over-Read and memory disclosure in ajp_parse_data() | n/a | No | 7.5 |
| CVE-2026-34032 | Apache HTTP Server: mod_proxy_ajp: Heap Buffer Over-Read Due to Missing Null-Termination Check (ajp_msg_get_string) | n/a | No | 5.3 |
| CVE-2026-24072 | Apache HTTP Server: mod_rewrite elevation of privileges via ap_expr | n/a | No | 8.8 |
| CVE-2026-33006 | Apache HTTP Server: mod_auth_digest timing attack | n/a | No | 4.8 |
| CVE-2026-33007 | Apache HTTP Server: mod_authn_socache crash | n/a | No | 5.3 |
| CVE-2026-29169 | Apache HTTP Server: mod_dav_lock indirect lock crash | n/a | No | 7.5 |
| CVE-2026-29168 | Apache HTTP Server: mod_md unrestricted OCSP response | n/a | No | 7.3 |
| CVE-2026-33857 | Apache HTTP Server: Off-by-one OOB reads in AJP getter functions | n/a | No | 5.3 |
| CVE-2026-41672 | xmldom: XML node injection through unvalidated comment serialization | n/a | No | |
| CVE-2026-41674 | xmldom: XML injection through unvalidated DocumentType serialization | n/a | No | |
| CVE-2026-41675 | xmldom: XML node injection through unvalidated processing instruction serialization | n/a | No | |
| CVE-2026-41673 | xmldom: Denial of service via uncontrolled recursion in XML serialization | n/a | No | |
| CVE-2026-25243 | redis-server RESTORE invalid memory access may allow remote code execution | n/a | No | |
| CVE-2026-23631 | redis-server Lua use-after-free may allow remote code execution | n/a | No | |
| CVE-2026-31717 | ksmbd: validate owner of durable handle on reconnect | n/a | No | 8.8 |
| CVE-2026-31718 | ksmbd: fix use-after-free in __ksmbd_close_fd() via durable scavenger | n/a | No | 9.8 |
| CVE-2026-23479 | redis-server use-after-free in unblock client flow may allow remote code execution | n/a | No | |
| CVE-2026-25588 | RedisTimeSeries RESTORE invalid memory access may allow remote code execution | n/a | No | |
| CVE-2026-25589 | RedisBloom RESTORE invalid memory access may allow remote code execution | n/a | No | |
| CVE-2026-43474 | fs: init flags_valid before calling vfs_fileattr_get | n/a | No | |
| CVE-2026-43338 | btrfs: reserve enough transaction items for qgroup ioctls | n/a | No | |
| CVE-2025-71302 | drm/panthor: fix for dma-fence safe access rules | n/a | No | |
| CVE-2026-43318 | drm/amdgpu: fix sync handling in amdgpu_dma_buf_move_notify | n/a | No | 7.1 |
| CVE-2026-43309 | md raid: fix hang when stopping arrays with metadata through dm-raid | n/a | No | 5.5 |
| CVE-2026-43416 | powerpc, perf: Check that current->mm is alive before getting user callchain | n/a | No | |
| CVE-2025-71299 | spi: cadence-quadspi: Parse DT for flashes with the rest of the DT parsing | n/a | No | 5.5 |
| CVE-2026-43284 | xfrm: esp: avoid in-place decrypt on shared skb frags | n/a | No | 7.8 |
| CVE-2026-43352 | i3c: mipi-i3c-hci: Correct RING_CTRL_ABORT handling in DMA dequeue | n/a | No | 5.5 |
| CVE-2026-43300 | drm/panel: Fix a possible null-pointer dereference in jdi_panel_dsi_remove() | n/a | No | 5.5 |
| CVE-2026-43331 | x86/kexec: Disable KCOV instrumentation after load_segments() | n/a | No | |
| CVE-2026-43320 | drm/amd/display: Fix dsc eDP issue | n/a | No | |
| CVE-2026-43306 | bpf: crypto: Use the correct destructor kfunc type | n/a | No | 7.0 |
| CVE-2026-43443 | ASoC: amd: acp-mach-common: Add missing error check for clock acquisition | n/a | No | |
| CVE-2026-43317 | most: core: fix leak on early registration failure | n/a | No | |
| CVE-2026-43319 | spi: spidev: fix lock inversion between spi_lock and buf_lock | n/a | No | |
| CVE-2026-43303 | mm/page_alloc: clear page->private in free_pages_prepare() | n/a | No | 7.0 |
| CVE-2026-43344 | perf/x86/intel/uncore: Fix die ID init and look up bugs | n/a | No | |
| CVE-2026-43321 | bpf: Properly mark live registers for indirect jumps | n/a | No | 7.8 |
| CVE-2026-43456 | bonding: fix type confusion in bond_setup_by_slave() | n/a | No | 5.5 |
| CVE-2026-43305 | drm/amd/display: Fix mismatched unlock for DMUB HW lock in HWSS fast path | n/a | No | 5.5 |
| CVE-2026-43298 | drm/amdgpu: Skip vcn poison irq release on VF | n/a | No | 7.8 |
| CVE-2026-43299 | btrfs: do not ASSERT() when the fs flips RO inside btrfs_repair_io_failure() | n/a | No | 5.5 |
| CVE-2026-43400 | drm/amdgpu: add upper bound check on user inputs in signal ioctl | n/a | No | |
| CVE-2026-43310 | media: verisilicon: Avoid G2 bus error while decoding H.264 and HEVC | n/a | No | 5.5 |
| CVE-2026-43294 | drm: renesas: rz-du: mipi_dsi: fix kernel panic when rebooting for some panels | n/a | No | 5.5 |
| CVE-2026-43353 | i3c: mipi-i3c-hci: Fix race in DMA ring dequeue | n/a | No | 7.8 |
| CVE-2026-43292 | mm/vmalloc: prevent RCU stalls in kasan_release_vmalloc_node | n/a | No | 5.5 |
| CVE-2026-43398 | drm/amdgpu: add upper bound check on user inputs in wait ioctl | n/a | No | |
| CVE-2026-43311 | soc/tegra: pmc: Fix unsafe generic_handle_irq() call | n/a | No | 5.5 |
| CVE-2026-43421 | usb: gadget: f_ncm: Fix net_device lifecycle with device_move | n/a | No | |
| CVE-2026-43308 | btrfs: don't BUG() on unexpected delayed ref type in run_one_delayed_ref() | n/a | No | 5.5 |
| CVE-2026-37458 | n/a | No | 6.5 | |
| CVE-2026-37459 | n/a | No | 7.5 | |
| CVE-2026-33846 | Gnutls: gnutls: denial of service via heap buffer overflow in dtls handshake fragment reassembly | n/a | No | 7.5 |
| CVE-2026-6664 | PgBouncer integer overflow in PgBouncer network packet parsing | n/a | No | 7.5 |
| CVE-2026-6665 | PgBouncer buffer overflow in SCRAM | n/a | No | 8.1 |
| CVE-2026-6667 | PgBouncer missing authorization check in KILL_CLIENT admin command | n/a | No | 4.3 |
| CVE-2026-6666 | PgBouncer crash in kill_pool_logins_server_error | n/a | No | 5.9 |
| CVE-2026-45130 | Vim: Heap Buffer Overflow in spell file loading | n/a | No | 6.6 |
| CVE-2026-44656 | Vim: OS Command Injection via 'path' completion | n/a | No | |
| CVE-2026-33811 | Crash when handling long CNAME response in net | n/a | No | 7.5 |
| CVE-2026-33814 | Infinite loop in HTTP/2 transport when given bad SETTINGS_MAX_FRAME_SIZE in net/http/internal/http2 in golang.org/x/net | n/a | No | 7.5 |
| CVE-2026-39817 | Invoking "go tool pack" does not sanitize output paths in cmd/go | n/a | No | 5.9 |
| CVE-2026-39819 | Invoking "go bug" follows symlinks in predictable temporary filenames in cmd/go | n/a | No | 5.3 |
| CVE-2026-39820 | Quadratic string concatentation in consumeComment in net/mail | n/a | No | 7.5 |
| CVE-2026-39823 | Bypass of meta content URL escaping causes XSS in html/template | n/a | No | 6.1 |
| CVE-2026-39825 | ReverseProxy forwards queries with more than urlmaxqueryparams parameters in net/http/httputil | n/a | No | 5.3 |
| CVE-2026-39826 | Escaper bypass leads to XSS in html/template | n/a | No | 6.1 |
| CVE-2026-39836 | Panic in Dial and LookupPort when handling NUL byte on Windows in net | n/a | No | 7.5 |
| CVE-2026-42499 | Quadratic string concatenation in consumePhrase in net/mail | n/a | No | 7.5 |
| CVE-2026-42501 | Malicious module proxy can bypass checksum database in cmd/go | n/a | No | 7.5 |
| CVE-2026-33079 | Mistune ReDoS in LINK_TITLE_RE allows denial of service with crafted Markdown titles | n/a | No | |
| CVE-2026-41889 | pgx: SQL Injection via placeholder confusion with dollar quoted string literals | n/a | No | |
| CVE-2026-42257 | net-imap: Command Injection via "raw" arguments to multiple commands | n/a | No | |
| CVE-2026-42258 | net-imap: Command Injection via unvalidated Symbol inputs | n/a | No | |
| CVE-2026-42256 | net-imap: Denial of service via high iteration count for `SCRAM-*` authentication | n/a | No | |
| CVE-2026-42246 | net-imap vulnerable to STARTTLS stripping via invalid response timing | n/a | No | |
| CVE-2026-45186 | n/a | No | 2.9 | |
| CVE-2026-7261 | SoapServer session-persisted object use-after-free via SOAP header fault | n/a | No | |
| CVE-2026-7258 | Out-of-bounds read in urldecode() on NetBSD | n/a | No | |
| CVE-2026-6722 | Use-After-Free in SOAP using Apache map | n/a | No | |
| CVE-2026-6735 | XSS within PHP-FPM status endpoint | n/a | No | |
| CVE-2026-7262 | NULL pointer dereference in SOAP apache:Map decoder with missing <value> | n/a | No | |
| CVE-2025-14179 | SQL injection in pdo_firebird via NUL bytes in quoted strings | n/a | No | |
| CVE-2026-7568 | Signed integer overflow in metaphone() | n/a | No | |
| CVE-2026-7259 | Null pointer dereference in php_mb_check_encoding() via mb_ereg_search_init() | n/a | No | |
| CVE-2026-43500 | rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present | n/a | No | 7.8 |
SQL Server vulnerabilities
CVE | Title | Exploitation status | Publicly disclosed? | CVSS v3 base score |
|---|---|---|---|---|
| CVE-2026-40370 | SQL Server Remote Code Execution Vulnerability | Exploitation Less Likely | No | 8.8 |
Windows vulnerabilities
CVE | Title | Exploitation status | Publicly disclosed? | CVSS v3 base score |
|---|---|---|---|---|
| CVE-2025-54518 | AMD: CVE-2025-54518 CPU OP Cache Corruption | Exploitation Unlikely | No | |
| CVE-2026-41095 | Data Deduplication Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-35424 | Internet Key Exchange (IKE) Protocol Denial of Service Vulnerability | Exploitation Unlikely | No | 7.5 |
| CVE-2026-40377 | Microsoft Cryptographic Services Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-34329 | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability | Exploitation Less Likely | No | 8.8 |
| CVE-2026-41097 | Secure Boot Security Feature Bypass Vulnerability | Exploitation Less Likely | No | 6.7 |
| CVE-2026-33839 | Win32k Elevation of Privilege Vulnerability | Exploitation Unlikely | No | 7.0 |
| CVE-2026-33840 | Win32k Elevation of Privilege Vulnerability | Exploitation More Likely | No | 7.8 |
| CVE-2026-34330 | Win32k Elevation of Privilege Vulnerability | Exploitation Unlikely | No | 7.8 |
| CVE-2026-34331 | Win32k Elevation of Privilege Vulnerability | Exploitation Unlikely | No | 7.0 |
| CVE-2026-35423 | Windows 11 Telnet Client Information Disclosure Vulnerability | Exploitation Unlikely | No | 5.4 |
| CVE-2026-35438 | Windows Admin Center Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 8.3 |
| CVE-2026-34344 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-34345 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.0 |
| CVE-2026-35416 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Exploitation More Likely | No | 7.0 |
| CVE-2026-41088 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Exploitation Unlikely | No | 7.8 |
| CVE-2026-34343 | Windows Application Identity (AppID) Subsystem Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-35418 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | Exploitation Unlikely | No | 7.8 |
| CVE-2026-33835 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | Exploitation More Likely | No | 7.8 |
| CVE-2026-34337 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-40407 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Exploitation Unlikely | No | 7.8 |
| CVE-2026-40397 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Exploitation More Likely | No | 7.8 |
| CVE-2026-41096 | Windows DNS Client Remote Code Execution Vulnerability | Exploitation Unlikely | No | 9.8 |
| CVE-2026-42896 | Windows DWM Core Library Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-35419 | Windows DWM Core Library Information Disclosure Vulnerability | Exploitation Less Likely | No | 5.5 |
| CVE-2026-34336 | Windows DWM Core Library Information Disclosure Vulnerability | Exploitation Unlikely | No | 7.8 |
| CVE-2026-33834 | Windows Event Logging Service Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-32209 | Windows Filtering Platform (WFP) Security Feature Bypass Vulnerability | Exploitation Unlikely | No | 4.4 |
| CVE-2026-35421 | Windows GDI Remote Code Execution Vulnerability | Exploitation Unlikely | No | 7.8 |
| CVE-2026-40403 | Windows Graphics Component Remote Code Execution Vulnerability | Exploitation Less Likely | No | 8.8 |
| CVE-2026-40402 | Windows Hyper-V Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 9.3 |
| CVE-2026-33841 | Windows Kernel Elevation of Privilege Vulnerability | Exploitation More Likely | No | 7.8 |
| CVE-2026-35420 | Windows Kernel Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-40369 | Windows Kernel Elevation of Privilege Vulnerability | Exploitation More Likely | No | 7.8 |
| CVE-2026-34332 | Windows Kernel-Mode Driver Remote Code Execution Vulnerability | Exploitation Unlikely | No | 8.0 |
| CVE-2026-34339 | Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability | Exploitation Less Likely | No | 5.5 |
| CVE-2026-34341 | Windows Link-Layer Discovery Protocol (LLDP) Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.0 |
| CVE-2026-33838 | Windows Message Queuing (MSMQ) Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-32161 | Windows Native WiFi Miniport Driver Remote Code Execution Vulnerability | Exploitation Less Likely | No | 7.5 |
| CVE-2026-41089 | Windows Netlogon Remote Code Execution Vulnerability | Exploitation Less Likely | No | 9.8 |
| CVE-2026-34342 | Windows Print Spooler Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.0 |
| CVE-2026-34340 | Windows Projected File System Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.0 |
| CVE-2026-40398 | Windows Remote Desktop Services Elevation of Privilege Vulnerability | Exploitation More Likely | No | 7.8 |
| CVE-2026-21530 | Windows Rich Text Edit Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 6.7 |
| CVE-2026-32170 | Windows Rich Text Edit Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 6.7 |
| CVE-2026-40410 | Windows SMB Client Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.0 |
| CVE-2026-35415 | Windows Storage Spaces Controller Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-34350 | Windows Storport Miniport Driver Denial of Service Vulnerability | Exploitation Unlikely | No | 6.5 |
| CVE-2026-40405 | Windows TCP/IP Denial of Service Vulnerability | Exploitation Less Likely | No | 7.5 |
| CVE-2026-40414 | Windows TCP/IP Denial of Service Vulnerability | Exploitation Unlikely | No | 7.4 |
| CVE-2026-40401 | Windows TCP/IP Denial of Service Vulnerability | Exploitation Unlikely | No | 7.1 |
| CVE-2026-40413 | Windows TCP/IP Denial of Service Vulnerability | Exploitation Less Likely | No | 7.4 |
| CVE-2026-35422 | Windows TCP/IP Driver Security Feature Bypass Vulnerability | Exploitation Unlikely | No | 6.5 |
| CVE-2026-34351 | Windows TCP/IP Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-40399 | Windows TCP/IP Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-34334 | Windows TCP/IP Elevation of Privilege Vulnerability | Exploitation Unlikely | No | 7.8 |
| CVE-2026-40406 | Windows TCP/IP Information Disclosure Vulnerability | Exploitation Less Likely | No | 7.5 |
| CVE-2026-33837 | Windows TCP/IP Local Elevation of Privilege Vulnerability | Exploitation More Likely | No | 7.8 |
| CVE-2026-40415 | Windows TCP/IP Remote Code Execution Vulnerability | Exploitation Unlikely | No | 8.1 |
| CVE-2026-42825 | Windows Telephony Service Elevation of Privilege Vulnerability | Exploitation Unlikely | No | 7.0 |
| CVE-2026-34338 | Windows Telephony Service Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-40382 | Windows Telephony Service Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-40380 | Windows Volume Manager Extension Driver Remote Code Execution Vulnerability | Exploitation Less Likely | No | 6.2 |
| CVE-2026-40408 | Windows WAN ARP Driver Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-34333 | Windows Win32k Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.8 |
| CVE-2026-34347 | Windows Win32k Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 7.0 |
| CVE-2026-35417 | Windows Win32k Elevation of Privilege Vulnerability | Exploitation More Likely | No | 7.8 |
Critical RCEs and EoPs
CVE | Title | Exploitation status | Publicly disclosed? | CVSS v3 base score |
|---|---|---|---|---|
| CVE-2026-33109 | Azure Managed Instance for Apache Cassandra Remote Code Execution Vulnerability | N/A | No | 9.9 |
| CVE-2026-33844 | Azure Managed Instance for Apache Cassandra Remote Code Execution Vulnerability | N/A | No | 9.0 |
| CVE-2026-42823 | Azure Logic Apps Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 9.9 |
| CVE-2026-42898 | Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability | Exploitation Unlikely | No | 9.9 |
| CVE-2026-42833 | Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability | Exploitation Less Likely | No | 9.1 |
| CVE-2026-41103 | Microsoft SSO Plugin for Jira & Confluence Elevation of Privilege Vulnerability | Exploitation More Likely | No | 9.1 |
| CVE-2026-41096 | Windows DNS Client Remote Code Execution Vulnerability | Exploitation Unlikely | No | 9.8 |
| CVE-2026-40402 | Windows Hyper-V Elevation of Privilege Vulnerability | Exploitation Less Likely | No | 9.3 |
| CVE-2026-41089 | Windows Netlogon Remote Code Execution Vulnerability | Exploitation Less Likely | No | 9.8 |



