Skip to content
Toggle Navigation
Kit ISO 27001
Ingeniería y Consultoría
Recursos
ISO 27001
ISO 27001 – GAP Analysis Tool
Ciberseguridad
Vulnerabilidades CVE
Blog
Contacto
Obtener el Toolkit
Toggle Navigation
Kit ISO 27001
Ingeniería y Consultoría
Recursos
ISO 27001
ISO 27001 – GAP Analysis Tool
Ciberseguridad
Vulnerabilidades CVE
Blog
Contacto
Obtener el Toolkit
Vulnerabilidades CVE
Vulnerabilidades CVE
drmunozcl
2025-06-04T18:44:58-04:00
Vulnerabilidades CVE
A continuación la lista de las últimas vulnerabilidades publicadas por el instituto NIST:
Severidad:
Todas
NONE
LOW
MEDIUM
HIGH
CRITICAL
UNKNOWN
CVE:
Aplicar
Borrar filtros
CVE ID
Publicado
Severidad
CVSS
Descripción
CVE-2026-42896
2026-05-12
HIGH
7.8
Integer overflow or wraparound in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.
CVE-2026-42893
2026-05-12
HIGH
7.4
Improper neutralization of special elements used in a command ('command injection') in M365 Copilot allows an unauthorized attacker to perform tampering over a network.
CVE-2026-42891
2026-05-12
MEDIUM
6.5
User interface (ui) misrepresentation of critical information in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.
CVE-2026-42838
2026-05-12
MEDIUM
5.4
Improper neutralization of special elements in output used by a downstream component ('injection') in Microsoft Edge (Chromium-based) allows an unauthorized attacker to elevate privileges over a network.
CVE-2026-42833
2026-05-12
CRITICAL
9.1
Execution with unnecessary privileges in Microsoft Dynamics 365 (on-premises) allows an authorized attacker to execute code over a network.
CVE-2026-42832
2026-05-12
HIGH
7.7
Improper access control in Microsoft Office allows an unauthorized attacker to perform spoofing locally.
CVE-2026-42831
2026-05-12
HIGH
7.8
Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2026-42830
2026-05-12
MEDIUM
6.5
Untrusted search path in Azure Monitor Agent allows an authorized attacker to elevate privileges locally.
CVE-2026-42825
2026-05-12
HIGH
7.0
Use after free in Windows Telephony Service allows an authorized attacker to elevate privileges locally.
CVE-2026-42823
2026-05-12
CRITICAL
9.9
Improper access control in Azure Logic Apps allows an authorized attacker to elevate privileges over a network.
CVE-2026-41614
2026-05-12
MEDIUM
6.2
Improper access control in M365 Copilot for Desktop allows an unauthorized attacker to perform spoofing locally.
CVE-2026-41613
2026-05-12
HIGH
8.8
Session fixation in Visual Studio Code allows an unauthorized attacker to elevate privileges over a network.
CVE-2026-41612
2026-05-12
MEDIUM
5.5
Relative path traversal in Visual Studio Code allows an unauthorized attacker to disclose information locally.
CVE-2026-41611
2026-05-12
HIGH
7.8
Improper neutralization of script-related html tags in a web page (basic xss) in Visual Studio Code allows an unauthorized attacker to execute code locally.
CVE-2026-41610
2026-05-12
MEDIUM
6.3
Improper neutralization of input during web page generation ('cross-site scripting') in Visual Studio Code allows an unauthorized attacker to bypass a security feature locally.
CVE-2026-41109
2026-05-12
HIGH
8.8
Improper neutralization of special elements in output used by a downstream component ('injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to bypass a security feature…
CVE-2026-41107
2026-05-12
HIGH
7.4
External control of file name or path in Microsoft Edge (Chromium-based) allows an unauthorized attacker to disclose information over a network.
CVE-2026-41103
2026-05-12
CRITICAL
9.1
Incorrect implementation of authentication algorithm in Microsoft SSO Plugin for Jira & Confluence allows an unauthorized attacker to elevate privileges over a network.
CVE-2026-41102
2026-05-12
HIGH
7.1
Improper access control in Microsoft Office PowerPoint allows an authorized attacker to perform spoofing locally.
CVE-2026-41101
2026-05-12
HIGH
7.1
Improper access control in Microsoft Office Word allows an authorized attacker to perform spoofing locally.
CVE-2026-41100
2026-05-12
MEDIUM
4.4
Improper access control in M365 Copilot allows an authorized attacker to perform spoofing locally.
CVE-2026-41097
2026-05-12
MEDIUM
6.7
Reliance on a component that is not updateable in Windows Secure Boot allows an authorized attacker to bypass a security feature locally.
CVE-2026-41096
2026-05-12
CRITICAL
9.8
Heap-based buffer overflow in Microsoft Windows DNS allows an unauthorized attacker to execute code over a network.
CVE-2026-41095
2026-05-12
HIGH
7.8
Use after free in Data Deduplication allows an authorized attacker to elevate privileges locally.
CVE-2026-41094
2026-05-12
HIGH
8.8
Improper control of generation of code ('code injection') in Microsoft Data Formulator allows an unauthorized attacker to execute code over a network.
CVE-2026-41089
2026-05-12
CRITICAL
9.8
Stack-based buffer overflow in Windows Netlogon allows an unauthorized attacker to execute code over a network.
CVE-2026-41088
2026-05-12
HIGH
7.8
External control of file name or path in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
CVE-2026-41086
2026-05-12
HIGH
8.8
Improper access control in Windows Admin Center allows an authorized attacker to elevate privileges over a network.
CVE-2026-40421
2026-05-12
MEDIUM
4.3
External control of file name or path in Microsoft Office Word allows an unauthorized attacker to disclose information over a network.
CVE-2026-40420
2026-05-12
HIGH
8.8
Improper access control in Microsoft Office Click-To-Run allows an authorized attacker to elevate privileges locally.
CVE-2026-40419
2026-05-12
HIGH
7.8
Use after free in Microsoft Office allows an authorized attacker to elevate privileges locally.
CVE-2026-40418
2026-05-12
HIGH
7.8
Use after free in Microsoft Office Click-To-Run allows an authorized attacker to elevate privileges locally.
CVE-2026-40417
2026-05-12
HIGH
7.8
Weak authentication in Dynamics Business Central allows an authorized attacker to elevate privileges locally.
CVE-2026-40416
2026-05-12
MEDIUM
4.3
User interface (ui) misrepresentation of critical information in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.
CVE-2026-40415
2026-05-12
HIGH
8.1
Use after free in Windows TCP/IP allows an unauthorized attacker to execute code over a network.
CVE-2026-40414
2026-05-12
HIGH
7.4
Null pointer dereference in Windows TCP/IP allows an unauthorized attacker to deny service over an adjacent network.
CVE-2026-40413
2026-05-12
HIGH
7.4
Null pointer dereference in Windows TCP/IP allows an unauthorized attacker to deny service over an adjacent network.
CVE-2026-40410
2026-05-12
HIGH
7.0
Use after free in Windows SMB Client allows an authorized attacker to elevate privileges locally.
CVE-2026-40408
2026-05-12
HIGH
7.8
Use after free in Windows Kernel-Mode Drivers allows an authorized attacker to elevate privileges locally.
CVE-2026-40407
2026-05-12
HIGH
7.8
Heap-based buffer overflow in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
CVE-2026-40406
2026-05-12
HIGH
7.5
Use after free in Windows TCP/IP allows an unauthorized attacker to disclose information over a network.
CVE-2026-40405
2026-05-12
HIGH
7.5
Null pointer dereference in Windows TCP/IP allows an unauthorized attacker to deny service over a network.
CVE-2026-40403
2026-05-12
HIGH
8.8
Heap-based buffer overflow in Windows Win32K - GRFX allows an authorized attacker to execute code locally.
CVE-2026-40402
2026-05-12
CRITICAL
9.3
Use after free in Windows Hyper-V allows an unauthorized attacker to elevate privileges locally.
CVE-2026-40401
2026-05-12
HIGH
7.1
Null pointer dereference in Windows TCP/IP allows an unauthorized attacker to deny service locally.
CVE-2026-40399
2026-05-12
HIGH
7.8
Stack-based buffer overflow in Windows TCP/IP allows an authorized attacker to elevate privileges locally.
CVE-2026-40398
2026-05-12
HIGH
7.8
Heap-based buffer overflow in Windows Remote Desktop allows an authorized attacker to elevate privileges locally.
CVE-2026-40397
2026-05-12
HIGH
7.8
Integer underflow (wrap or wraparound) in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
CVE-2026-40382
2026-05-12
HIGH
7.8
Use after free in Windows Telephony Service allows an authorized attacker to elevate privileges locally.
CVE-2026-40381
2026-05-12
HIGH
7.8
Improper access control in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally.
« Anterior
Página 14 de 4296
Siguiente »
Page load link
Go to Top