Search: "microsoft"

7882 CVEs found

CVE-2026-21261
5.5 MEDIUM

Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.

Published: 2026-02-10
Products: 13
Vendors:
microsoft

Deserialization of untrusted data in Microsoft Office Outlook allows an unauthorized attacker to perform spoofing over a network.

Published: 2026-02-10
Products: 15
Vendors:
microsoft

Reliance on untrusted inputs in a security decision in Microsoft Office Word allows an unauthorized attacker to bypass a security feature locally.

Published: 2026-02-10
Products: 8
Vendors:
microsoft
CVE-2026-21527
6.5 MEDIUM

User interface (ui) misrepresentation of critical information in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.

Published: 2026-02-10
Products: 4
Vendors:
microsoft

Improper control of generation of code ('code injection') in Microsoft Defender for Linux allows an unauthorized attacker to execute code over an adjacent network.

Published: 2026-02-10
Products: 1
Vendors:
microsoft

StorageGRID (formerly StorageGRID Webscale) versions prior to 11.9.0.12 and 12.0.0.4 with Single Sign-on enabled and configured to use Microsoft Entra ID (formerly Azure AD) as an IdP are susceptible ...

Published: 2026-02-18
Products: 0
CVE-2026-26030
9.9 CRITICAL

Semantic Kernel, Microsoft's semantic kernel Python SDK, has a remote code execution vulnerability in versions prior to 1.39.4, specifically within the `InMemoryVectorStore` filter functionality. The ...

Published: 2026-02-19
Products: 1
Vendors:
microsoft

Improper access control in Microsoft Teams allows an unauthorized attacker to disclose information over a network.

Published: 2026-02-19
Products: 1
Vendors:
microsoft
CVE-2026-2636
5.5 MEDIUM

This vulnerability is caused by a CWE‑159: "Improper Handling of Invalid Use of Special Elements" weakness, which leads to an unrecoverable inconsistency in the CLFS.sys driver. This condition forces ...

Published: 2026-02-25
Products: 0

In Microsoft Exchange through 2019, Exchange ActiveSync (EAS) configurations on on-premises servers may transmit sensitive data from Samsung mobile devices in cleartext, including the user's name, e-m...

Published: 2026-03-02
Products: 0
CVE-2026-2628
9.8 CRITICAL

The All-in-One Microsoft 365 & Entra ID / Azure AD SSO Login plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.2.5. This makes it possible for unauthe...

Published: 2026-03-03
Products: 0
CVE-2026-3224
9.8 CRITICAL

Authentication bypass in the Microsoft Entra ID (Azure AD) authentication mode in Devolutions Server 2025.3.15.0 and earlier allows an unauthenticated user to authenticate as an arbitrary Entra ID use...

Published: 2026-03-03
Products: 1
Vendors:
devolutions
CVE-2026-21536
9.8 CRITICAL

Microsoft Devices Pricing Program Remote Code Execution Vulnerability

Published: 2026-03-05
Products: 1
Vendors:
microsoft

Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.

Published: 2026-03-10
Products: 18
Vendors:
microsoft

Use after free in Microsoft Brokering File System allows an unauthorized attacker to elevate privileges locally.

Published: 2026-03-10
Products: 7
Vendors:
microsoft
CVE-2026-25168
6.2 MEDIUM

Null pointer dereference in Microsoft Graphics Component allows an unauthorized attacker to deny service locally.

Published: 2026-03-10
Products: 25
Vendors:
microsoft
CVE-2026-25169
6.2 MEDIUM

Divide by zero in Microsoft Graphics Component allows an unauthorized attacker to deny service locally.

Published: 2026-03-10
Products: 25
Vendors:
microsoft
CVE-2026-25180
5.5 MEDIUM

Out-of-bounds read in Microsoft Graphics Component allows an unauthorized attacker to disclose information locally.

Published: 2026-03-10
Products: 26
Vendors:
microsoft

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network.

Published: 2026-03-10
Products: 3
Vendors:
microsoft

Improper input validation in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

Published: 2026-03-10
Products: 3
Vendors:
microsoft