Common Vulnerabilities and Exposures (CVE)

CVE-2026-45494

May 19, 2026 23:30:17 UTC

Microsoft Edge (Chromium-based) Spoofing Vulnerability

CVE-2026-45492

May 19, 2026 23:30:16 UTC

Improper input validation in Microsoft Edge (Chromium-based) allows an unauthorized attacker to bypass a security feature over a network.

CVE-2026-33821

May 19, 2026 23:30:16 UTC

Improper privilege management in Microsoft Dynamics 365 Customer Insights allows an authorized attacker to elevate privileges over a network.

CVE-2026-42893

May 19, 2026 23:30:15 UTC

Improper neutralization of special elements used in a command ('command injection') in M365 Copilot allows an unauthorized attacker to perform tampering over a network.

CVE-2026-42838

May 19, 2026 23:30:15 UTC

Improper neutralization of special elements in output used by a downstream component ('injection') in Microsoft Edge (Chromium-based) allows an unauthorized attacker to elevate privileges over a network.

CVE-2026-40416

May 19, 2026 23:30:14 UTC

User interface (ui) misrepresentation of critical information in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.

CVE-2026-42833

May 19, 2026 23:30:13 UTC

Execution with unnecessary privileges in Microsoft Dynamics 365 (on-premises) allows an authorized attacker to execute code over a network.

CVE-2026-42832

May 19, 2026 23:30:13 UTC

Improper access control in Microsoft Office allows an unauthorized attacker to perform spoofing locally.

CVE-2026-42830

May 19, 2026 23:30:12 UTC

Untrusted search path in Azure Monitor Agent allows an authorized attacker to elevate privileges locally.

CVE-2026-42823

May 19, 2026 23:30:11 UTC

Improper access control in Azure Logic Apps allows an authorized attacker to elevate privileges over a network.

CVE-2026-41613

May 19, 2026 23:30:11 UTC

Session fixation in Visual Studio Code allows an unauthorized attacker to elevate privileges over a network.

CVE-2026-41103

May 19, 2026 23:30:10 UTC

Incorrect implementation of authentication algorithm in Microsoft SSO Plugin for Jira & Confluence allows an unauthorized attacker to elevate privileges over a network.

CVE-2026-40381

May 19, 2026 23:30:10 UTC

Improper access control in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally.

CVE-2026-41097

May 19, 2026 23:30:09 UTC

Reliance on a component that is not updateable in Windows Secure Boot allows an authorized attacker to bypass a security feature locally.

CVE-2026-41086

May 19, 2026 23:30:08 UTC

Improper access control in Windows Admin Center allows an authorized attacker to elevate privileges over a network.