May’s Patch Tuesday hauls out 132 CVEs


In another banner month for the AI-finder era, Microsoft on Tuesday released 132 patches affecting 20 product families. Twenty-nine of the addressed issues are considered by Microsoft to be of Critical severity, and 13 issues are expected to be exploited within the next 30 days. Forty-three have a CVSS base score of 8.0 or higher, including one with a “perfect” 10.0. Fourteen CVEs, including the 10.0 item mentioned above, were patched by Microsoft in advance of Patch Tuesday. Incredibly, none were publicly disclosed as of release day and none are known to be under active exploit in the wild. 

For the second month in a row, the release includes massive set of advisories – 145 of them. As ever, the majority are Edge-related, assigned by Chrome, and patched days in advance of Patch Tuesday. One comes from AMD and was likewise already addressed. Thirteen, all affecting Adobe Commerce, were issued by Adobe.

Various of this month’s issues are amenable to direct detection by Sophos protections, and we include information on those in the usual table below. We are as always including at the end of this post appendices listing all Microsoft’s patches sorted by severity (Appendix A), by predicted exploitability timeline and CVSS Base score (Appendix B), and by product family (Appendix C). Appendix D lists this month’s advisories. Appendix E provides a breakout of 66 CVEs affecting various versions of Windows Server, including the advisory from AMD that is otherwise not counted in the patch totals for the month. Our analysis of CWE (Common Weakness Enumeration) information made available for this month’s patches appears in Appendix F.

By the numbers

  • Total CVEs: 132
  • Publicly disclosed: 0
  • Exploit detected: 0
  • Severity
    • Critical: 29
    • Important: 103
  • Impact:
    • Denial of Service: 8
    • Elevation of Privilege: 59
    • Information Disclosure: 14
    • Remote Code Execution: 31
    • Security Feature Bypass: 6
    • Spoofing: 11
    • Tampering: 3
  • CVSS base score 9.0 or greater: 14
  • CVSS base score 8.0 or greater: 43

 

pt2605-figure01.png

Figure 1: Elevation of Privilege issues once again account for the majority of the month’s CVEs, but nearly half of the Remote Control Execution CVEs are Critical-severity.

Products

As is our custom for this list, CVEs that apply to more than one product family are counted once for each family they affect. We note, by the way, that CVE names don’t always reflect affected product families closely. In particular, some CVEs names in the Office family may mention products that don’t appear in the list of products affected by the CVE, and vice versa. 

 

pt2605-figure02.png

Figure 2: A hefty 20 families are covered in May’s Patch Tuesday release. The Critical-severity issue called “Confluence / Jira” covers an SSO plug-in for those tools, as described below.

pt2605-figure03.png

Figure 3: The count of Elevation of Privilege CVEs passes 250, and Spoofing and Security Feature Bypass swap spots on the cumulative list of 2026 vulnerabilities. By way of comparison, as of this time last year Microsoft had addressed 470 CVEs.

Notable May updates

In addition to the issues discussed above, a few specific items merit attention. 

CVE-2026-41103 — Microsoft SSO Plugin for Jira & Confluence Elevation of Privilege Vulnerability

There are 14 CVEs with a CVSS Base score of 9.0 or higher this month (with 11 of those also marked as Critical-severity), but the only one Microsoft thinks is more likely to be exploited in the next 30 days is this Critical-severity Elevation of Privilege issue, which involves an incorrect implementation of an authentication algorithm (CWE-303) – not far-fetched, since this involves SSO. The bug would permit an attacker to bypass authentication and sign in as a valid user. The specifically affected plug-ins are the Microsoft Confluence SAML SSO plugin and the Microsoft JIRA SAML SSO plugin.

CVE-2026-41089 — Windows Netlogon Remote Code Execution Vulnerability
CVE-2026-41096 — Windows DNS Client Remote Code Execution Vulnerability

Also in the over-9.0 CVSS Club with matching base scores of 9.8, these two CVEs both allow exploitation even by an unauthorized attacker.

CVE-2026-40358 — Microsoft Office Remote Code Execution Vulnerability
CVE-2026-40361 — Microsoft Word Remote Code Execution Vulnerability
CVE-2026-40363 — Microsoft Office Remote Code Execution Vulnerability
CVE-2026-40364 — Microsoft Word Remote Code Execution Vulnerability
CVE-2026-40366 — Microsoft Word Remote Code Execution Vulnerability
CVE-2026-40367 – Microsoft Word Remote Code Execution Vulnerability

All six of these Remote Code Execution vulnerabilities can be exploited via Preview Pane. Of the six, CVE-2026-40361 and CVE-2026-40364 are thought by Microsoft to be more likely to be exploited within the first 30 days post-release.

CVE-2026-35432 — Windows 11 Telnet Client Information Disclosure Vulnerability

Telnet. That is all. Yes, it’s still 2026.

Sophos protections

CVE Sophos Intercept X/Endpoint IPS

Sophos XGS Firewall

CVE-2026-33835 Exp/2633835-A Exp/2633835-A
CVE-2026-33837 Exp/2633837-A Exp/2633837-A
CVE-2026-33840 Exp/2633840-A Exp/2633840-A
CVE-2026-33841 Exp/2633841-A Exp/2633841-A
CVE-2026-35416 Exp/2635416-A Exp/2635416-A
CVE-2026-35417 Exp/2635417-A Exp/2635417-A
CVE-2026-40361 sid:2312491, sid:2312492 sid:2312491, sid:2312492
CVE-2026-40364 sid:2312493, sid:2312494 sid:2312493, sid:2312494
CVE-2026-40369 Exp/2640369-A Exp/2640369-A
CVE-2026-40397 Exp/2640397-A Exp/2640397-A
CVE-2026-40398 Exp/2640398-A Exp/2640398-A
CVE-2026-41089 sid:2312495 sid:2312495
CVE-2026-41103 sid:2312499 sid:2312499

 

As you can every month, if you don’t want to wait for your system to pull down Microsoft’s updates itself, you can download them manually from the Windows Update Catalog website. Run the winver.exe tool to determine which build of Windows you’re running, then download the Cumulative Update package for your specific system’s architecture and build number.

Appendix A: Vulnerability Impact and Severity

This is a list of May patches sorted by impact, then sub-sorted by severity. Each list is further arranged by CVE. 

Elevation of Privilege (59 CVEs)

Critical severity
CVE-2026-33821 Microsoft Dynamics 365 Customer Insights Elevation of Privilege Vulnerability
CVE-2026-35435 Azure AI Foundry Elevation of Privilege Vulnerability
CVE-2026-40402 Windows Hyper-V Elevation of Privilege Vulnerability
CVE-2026-41103 Microsoft SSO Plugin for Jira & Confluence Elevation of Privilege Vulnerability
CVE-2026-41105 Azure Monitor Action Group Notification System Elevation of Privilege Vulnerability
Important severity
CVE-2026-21530 Windows Rich Text Edit Elevation of Privilege Vulnerability
CVE-2026-32170 Windows Rich Text Edit Elevation of Privilege Vulnerability
CVE-2026-32177 .NET Elevation of Privilege Vulnerability
CVE-2026-32204 Azure Monitor Agent Elevation of Privilege Vulnerability
CVE-2026-33834 Windows Event Logging Service Elevation of Privilege Vulnerability
CVE-2026-33835 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-33837 Windows TCP/IP Local Elevation of Privilege Vulnerability
CVE-2026-33838 Windows Message Queuing (MSMQ) Elevation of Privilege Vulnerability
CVE-2026-33839 Win32k Elevation of Privilege Vulnerability
CVE-2026-33840 Win32k Elevation of Privilege Vulnerability
CVE-2026-33841 Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-34330 Win32k Elevation of Privilege Vulnerability
CVE-2026-34331 Win32k Elevation of Privilege Vulnerability
CVE-2026-34333 Windows Win32k Elevation of Privilege Vulnerability
CVE-2026-34334 Windows TCP/IP Elevation of Privilege Vulnerability
CVE-2026-34337 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-34338 Windows Telephony Service Elevation of Privilege Vulnerability
CVE-2026-34340 Windows Projected File System Elevation of Privilege Vulnerability
CVE-2026-34341 Windows Link-Layer Discovery Protocol (LLDP) Elevation of Privilege Vulnerability
CVE-2026-34342 Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2026-34343 Windows Application Identity (AppID) Subsystem Elevation of Privilege Vulnerability
CVE-2026-34344 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-34345 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-34347 Windows Win32k Elevation of Privilege Vulnerability
CVE-2026-34351 Windows TCP/IP Elevation of Privilege Vulnerability
CVE-2026-35415 Windows Storage Spaces Controller Elevation of Privilege Vulnerability
CVE-2026-35416 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-35417 Windows Win32k Elevation of Privilege Vulnerability
CVE-2026-35418 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-35420 Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-35433 .NET Elevation of Privilege Vulnerability
CVE-2026-35436 Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
CVE-2026-35438 Windows Admin Center Elevation of Privilege Vulnerability
CVE-2026-40369 Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-40377 Microsoft Cryptographic Services Elevation of Privilege Vulnerability
CVE-2026-40381 Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVE-2026-40382 Windows Telephony Service Elevation of Privilege Vulnerability
CVE-2026-40397 Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2026-40398 Windows Remote Desktop Services Elevation of Privilege Vulnerability
CVE-2026-40399 Windows TCP/IP Elevation of Privilege Vulnerability
CVE-2026-40407 Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2026-40408 Windows WAN ARP Driver Elevation of Privilege Vulnerability
CVE-2026-40410 Windows SMB Client Elevation of Privilege Vulnerability
CVE-2026-40417 Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability
CVE-2026-40418 Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
CVE-2026-40419 Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
CVE-2026-41086 Windows Admin Center in Azure Portal Elevation of Privilege Vulnerability
CVE-2026-41088 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-41095 Windows Projected File System Elevation of Privilege Vulnerability
CVE-2026-41613 Visual Studio Code Elevation of Privilege Vulnerability
CVE-2026-42823 Azure Logic Apps Elevation of Privilege Vulnerability
CVE-2026-42825 Windows Telephony Service Elevation of Privilege Vulnerability
CVE-2026-42830 Azure Monitor Agent Metrics Extension Elevation of Privilege Vulnerability
CVE-2026-42896 Windows DWM Core Library Elevation of Privilege Vulnerability

 

Remote Code Execution (31 CVEs)

Critical severity
CVE-2026-32161 Windows Native WiFi Miniport Driver Remote Code Execution Vulnerability
CVE-2026-33109 Azure Managed Instance for Apache Cassandra Remote Code Execution Vulnerability
CVE-2026-33844 Azure Managed Instance for Apache Cassandra Remote Code Execution Vulnerability
CVE-2026-35421 Windows GDI Remote Code Execution Vulnerability
CVE-2026-40358 Microsoft Office Remote Code Execution Vulnerability
CVE-2026-40361 Microsoft Word Remote Code Execution Vulnerability
CVE-2026-40363 Microsoft Office Remote Code Execution Vulnerability
CVE-2026-40364 Microsoft Word Remote Code Execution Vulnerability
CVE-2026-40365 Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-40367 Microsoft Word Remote Code Execution Vulnerability
CVE-2026-40403 Windows Graphics Component Remote Code Execution Vulnerability
CVE-2026-41089 Windows Netlogon Remote Code Execution Vulnerability
CVE-2026-41096 Windows DNS Client Remote Code Execution Vulnerability
CVE-2026-42831 Office for Android Remote Code Execution Vulnerability
CVE-2026-42898 Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability
Important severity
CVE-2026-33110 Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-33112 Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-34329 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVE-2026-34332 Windows Kernel-Mode Driver Remote Code Execution Vulnerability
CVE-2026-35439 Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-40357 Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-40359 Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-40362 Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-40366 Microsoft Word Remote Code Execution Vulnerability
CVE-2026-40368 Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-40370 SQL Server Remote Code Execution Vulnerability
CVE-2026-40380 Windows Volume Manager Extension Driver Remote Code Execution Vulnerability
CVE-2026-40415 Windows TCP/IP Remote Code Execution Vulnerability
CVE-2026-41094 Microsoft Data Formulator Remote Code Execution Vulnerability
CVE-2026-41611 Visual Studio Code Remote Code Execution Vulnerability
CVE-2026-42833 Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability

Information Disclosure (14 CVEs)

Critical severity
CVE-2026-26129 M365 Copilot Information Disclosure Vulnerability
CVE-2026-26164 M365 Copilot Information Disclosure Vulnerability
CVE-2026-33111 Copilot Chat (Microsoft Edge) Information Disclosure Vulnerability
CVE-2026-33823 Microsoft Team Events Portal Information Disclosure Vulnerability
CVE-2026-42826 Azure DevOps Information Disclosure Vulnerability
Important severity
CVE-2026-34336 Windows DWM Core Library Information Disclosure  Vulnerability
CVE-2026-35419 Windows DWM Core Library Information Disclosure  Vulnerability
CVE-2026-35423 Windows 11 Telnet Client Information Disclosure Vulnerability
CVE-2026-35440 Microsoft Word Information Disclosure Vulnerability
CVE-2026-40360 Microsoft Excel Information Disclosure Vulnerability
CVE-2026-40374 Microsoft Power Automate Desktop Information Disclosure Vulnerability
CVE-2026-40406 Windows TCP/IP Information Disclosure Vulnerability
CVE-2026-40421 Microsoft Word Information Disclosure Vulnerability
CVE-2026-41612 Visual Studio Code Information Disclosure Vulnerability

Spoofing (11 CVEs)

Critical severity
CVE-2026-32207 Azure Machine Learning Notebook Spoofing Vulnerability
CVE-2026-34327 Microsoft Partner Center Spoofing Vulnerability
CVE-2026-35428 Azure Cloud Shell Spoofing Vulnerability
CVE-2026-40379 Microsoft Enterprise Security Token Service (ESTS) Spoofing Vulnerability
Important severity
CVE-2026-32185 Microsoft Teams Spoofing Vulnerability
CVE-2026-33833 Azure Machine Learning Notebook Spoofing Vulnerability
CVE-2026-41100 Microsoft 365 Copilot for Android Spoofing Vulnerability
CVE-2026-41101 Microsoft Word for Android Spoofing Vulnerability
CVE-2026-41102 Microsoft PowerPoint for Android Spoofing Vulnerability
CVE-2026-41614 M365 Copilot for Desktop Spoofing Vulnerability
CVE-2026-42832 Microsoft Excel Spoofing Vulnerability

 

Denial of Service (8 CVEs)

Important severity
CVE-2026-34339 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CVE-2026-34350 Windows Storport Miniport Driver Denial of Service Vulnerability
CVE-2026-35424 Internet Key Exchange (IKE) Protocol Denial of Service Vulnerability
CVE-2026-40401 Windows TCP/IP Denial of Service Vulnerability
CVE-2026-40405 Windows TCP/IP Denial of Service Vulnerability
CVE-2026-40413 Windows TCP/IP Denial of Service Vulnerability
CVE-2026-40414 Windows TCP/IP Denial of Service Vulnerability
CVE-2026-42899 ASP.NET Core Denial of Service Vulnerability

 

Security Feature Bypass (6 CVEs)

Important severity
CVE-2026-32209 Windows Filtering Platform (WFP) Security Feature Bypass Vulnerability
CVE-2026-33117 Azure SDK for Java Security Feature Bypass Vulnerability
CVE-2026-35422 Windows TCP/IP Driver Security Feature Bypass Vulnerability
CVE-2026-41097 Secure Boot Security Feature Bypass Vulnerability
CVE-2026-41109 GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability
CVE-2026-41610 Visual Studio Code Security Feature Bypass Vulnerability

 

Tampering (3 CVEs)

Important severity
CVE-2026-32175 .NET Core Tampering Vulnerability
CVE-2026-40420 Microsoft Office Click-To-Run Tampering Vulnerability
CVE-2026-42893 Microsoft Outlook for iOS Tampering Vulnerability

 

Appendix B: Exploitability and CVSS

This is a list of the 13 May CVEs judged by Microsoft to be more likely to be exploited in the wild within the first 30 days post-release. The list is arranged by CVE.

 

Exploitation more likely within the next 30 days
CVE-2026-33835 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-33837 Windows TCP/IP Local Elevation of Privilege Vulnerability
CVE-2026-33840 Win32k Elevation of Privilege Vulnerability
CVE-2026-33841 Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-35416 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-35417 Windows Win32k Elevation of Privilege Vulnerability
CVE-2026-35435 Azure AI Foundry Elevation of Privilege Vulnerability
CVE-2026-40361 Microsoft Word Remote Code Execution Vulnerability
CVE-2026-40364 Microsoft Word Remote Code Execution Vulnerability
CVE-2026-40369 Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-40397 Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2026-40398 Windows Remote Desktop Services Elevation of Privilege Vulnerability
CVE-2026-41103 Microsoft SSO Plugin for Jira & Confluence Elevation of Privilege Vulnerability

 

These are the May CVEs with a Microsoft-assessed CVSS Base score of 8.0 or higher. They are arranged by score and further sorted by CVE. For more information on how CVSS works, please see our series on patch prioritization schema

CVSS Base CVSS Temporal CVE Title
10.0 8.7 CVE-2026-42826 Azure DevOps Information Disclosure Vulnerability
9.9 8.6 CVE-2026-33109 Azure Managed Instance for Apache Cassandra Remote Code Execution Vulnerability
9.9 8.6 CVE-2026-42823 Azure Logic Apps Elevation of Privilege Vulnerability
9.9 8.6 CVE-2026-42898 Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability
9.8 8.5 CVE-2026-41089 Windows Netlogon Remote Code Execution Vulnerability
9.8 8.5 CVE-2026-41096 Windows DNS Client Remote Code Execution Vulnerability
9.6 8.3 CVE-2026-33823 Microsoft Team Events Portal Information Disclosure Vulnerability
9.6 8.6 CVE-2026-35428 Azure Cloud Shell Spoofing Vulnerability
9.3 8.1 CVE-2026-40379 Microsoft Enterprise Security Token Service (ESTS) Spoofing Vulnerability
9.3 8.1 CVE-2026-40402 Windows Hyper-V Elevation of Privilege Vulnerability
9.1 7.9 CVE-2026-33117 Azure SDK for Java Security Feature Bypass Vulnerability
9.1 7.9 CVE-2026-41103 Microsoft SSO Plugin for Jira & Confluence Elevation of Privilege Vulnerability
9.1 7.9 CVE-2026-42833 Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability
9.0 7.8 CVE-2026-33844 Azure Managed Instance for Apache Cassandra Remote Code Execution Vulnerability
8.8 7.7 CVE-2026-32207 Azure Machine Learning Notebook Spoofing Vulnerability
8.8 7.7 CVE-2026-33110 Microsoft SharePoint Server Remote Code Execution Vulnerability
8.8 7.7 CVE-2026-33112 Microsoft SharePoint Server Remote Code Execution Vulnerability
8.8 7.7 CVE-2026-34329 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
8.8 7.7 CVE-2026-35436 Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
8.8 7.7 CVE-2026-35439 Microsoft SharePoint Server Remote Code Execution Vulnerability
8.8 7.7 CVE-2026-40357 Microsoft SharePoint Server Remote Code Execution Vulnerability
8.8 7.7 CVE-2026-40365 Microsoft SharePoint Server Remote Code Execution Vulnerability
8.8 7.7 CVE-2026-40370 SQL Server Remote Code Execution Vulnerability
8.8 7.7 CVE-2026-40403 Windows Graphics Component Remote Code Execution Vulnerability
8.8 7.7 CVE-2026-40420 Microsoft Office Click-To-Run Tampering Vulnerability
8.8 7.7 CVE-2026-41086 Windows Admin Center in Azure Portal Elevation of Privilege Vulnerability
8.8 7.7 CVE-2026-41094 Microsoft Data Formulator Remote Code Execution Vulnerability
8.8 7.7 CVE-2026-41109 GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability
8.8 7.7 CVE-2026-41613 Visual Studio Code Elevation of Privilege Vulnerability
8.6 7.5 CVE-2026-35435 Azure AI Foundry Elevation of Privilege Vulnerability
8.4 7.3 CVE-2026-40358 Microsoft Office Remote Code Execution Vulnerability
8.4 7.3 CVE-2026-40361 Microsoft Word Remote Code Execution Vulnerability
8.4 7.3 CVE-2026-40363 Microsoft Office Remote Code Execution Vulnerability
8.4 7.3 CVE-2026-40364 Microsoft Word Remote Code Execution Vulnerability
8.4 7.3 CVE-2026-40366 Microsoft Word Remote Code Execution Vulnerability
8.4 7.3 CVE-2026-40367 Microsoft Word Remote Code Execution Vulnerability
8.3 7.2 CVE-2026-35438 Windows Admin Center Elevation of Privilege Vulnerability
8.2 7.1 CVE-2026-33833 Azure Machine Learning Notebook Spoofing Vulnerability
8.2 7.1 CVE-2026-34327 Microsoft Partner Center Spoofing Vulnerability
8.1 7.1 CVE-2026-40415 Windows TCP/IP Remote Code Execution Vulnerability
8.1 7.1 CVE-2026-41105 Azure Monitor Action Group Notification System Elevation of Privilege Vulnerability
8.0 7.0 CVE-2026-34332 Windows Kernel-Mode Driver Remote Code Execution Vulnerability
8.0 7.0 CVE-2026-40368 Microsoft SharePoint Server Remote Code Execution Vulnerability

 

Appendix C: Products Affected

This is a list of May’s patches sorted by product family, then sub-sorted by severity. Each list is further arranged by CVE. Patches that are shared among multiple product families are listed multiple times, once for each product family. All CVE titles are accurate as made available by Microsoft. For further information on why certain products may appear in titles and not product families (or vice versa), please consult Microsoft.

Windows (68 CVEs)

Critical severity
CVE-2026-32161 Windows Native WiFi Miniport Driver Remote Code Execution Vulnerability
CVE-2026-35421 Windows GDI Remote Code Execution Vulnerability
CVE-2026-40402 Windows Hyper-V Elevation of Privilege Vulnerability
CVE-2026-40403 Windows Graphics Component Remote Code Execution Vulnerability
CVE-2026-41089 Windows Netlogon Remote Code Execution Vulnerability
CVE-2026-41096 Windows DNS Client Remote Code Execution Vulnerability
Important severity
CVE-2026-21530 Windows Rich Text Edit Elevation of Privilege Vulnerability
CVE-2026-32170 Windows Rich Text Edit Elevation of Privilege Vulnerability
CVE-2026-32209 Windows Filtering Platform (WFP) Security Feature Bypass Vulnerability
CVE-2026-33834 Windows Event Logging Service Elevation of Privilege Vulnerability
CVE-2026-33835 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-33837 Windows TCP/IP Local Elevation of Privilege Vulnerability
CVE-2026-33838 Windows Message Queuing (MSMQ) Elevation of Privilege Vulnerability
CVE-2026-33839 Win32k Elevation of Privilege Vulnerability
CVE-2026-33840 Win32k Elevation of Privilege Vulnerability
CVE-2026-33841 Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-34329 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVE-2026-34330 Win32k Elevation of Privilege Vulnerability
CVE-2026-34331 Win32k Elevation of Privilege Vulnerability
CVE-2026-34332 Windows Kernel-Mode Driver Remote Code Execution Vulnerability
CVE-2026-34333 Windows Win32k Elevation of Privilege Vulnerability
CVE-2026-34334 Windows TCP/IP Elevation of Privilege Vulnerability
CVE-2026-34336 Windows DWM Core Library Information Disclosure  Vulnerability
CVE-2026-34337 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-34338 Windows Telephony Service Elevation of Privilege Vulnerability
CVE-2026-34339 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CVE-2026-34340 Windows Projected File System Elevation of Privilege Vulnerability
CVE-2026-34341 Windows Link-Layer Discovery Protocol (LLDP) Elevation of Privilege Vulnerability
CVE-2026-34342 Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2026-34343 Windows Application Identity (AppID) Subsystem Elevation of Privilege Vulnerability
CVE-2026-34344 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-34345 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-34347 Windows Win32k Elevation of Privilege Vulnerability
CVE-2026-34350 Windows Storport Miniport Driver Denial of Service Vulnerability
CVE-2026-34351 Windows TCP/IP Elevation of Privilege Vulnerability
CVE-2026-35415 Windows Storage Spaces Controller Elevation of Privilege Vulnerability
CVE-2026-35416 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-35417 Windows Win32k Elevation of Privilege Vulnerability
CVE-2026-35418 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-35419 Windows DWM Core Library Information Disclosure  Vulnerability
CVE-2026-35420 Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-35422 Windows TCP/IP Driver Security Feature Bypass Vulnerability
CVE-2026-35423 Windows 11 Telnet Client Information Disclosure Vulnerability
CVE-2026-35424 Internet Key Exchange (IKE) Protocol Denial of Service Vulnerability
CVE-2026-40369 Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-40377 Microsoft Cryptographic Services Elevation of Privilege Vulnerability
CVE-2026-40380 Windows Volume Manager Extension Driver Remote Code Execution Vulnerability
CVE-2026-40382 Windows Telephony Service Elevation of Privilege Vulnerability
CVE-2026-40397 Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2026-40398 Windows Remote Desktop Services Elevation of Privilege Vulnerability
CVE-2026-40399 Windows TCP/IP Elevation of Privilege Vulnerability
CVE-2026-40401 Windows TCP/IP Denial of Service Vulnerability
CVE-2026-40405 Windows TCP/IP Denial of Service Vulnerability
CVE-2026-40406 Windows TCP/IP Information Disclosure Vulnerability
CVE-2026-40407 Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2026-40408 Windows WAN ARP Driver Elevation of Privilege Vulnerability
CVE-2026-40410 Windows SMB Client Elevation of Privilege Vulnerability
CVE-2026-40413 Windows TCP/IP Denial of Service Vulnerability
CVE-2026-40414 Windows TCP/IP Denial of Service Vulnerability
CVE-2026-40415 Windows TCP/IP Remote Code Execution Vulnerability
CVE-2026-41088 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-41095 Windows Projected File System Elevation of Privilege Vulnerability
CVE-2026-41097 Secure Boot Security Feature Bypass Vulnerability
CVE-2026-42825 Windows Telephony Service Elevation of Privilege Vulnerability
CVE-2026-42896 Windows DWM Core Library Elevation of Privilege Vulnerability

Office (16 CVEs)

Critical severity
CVE-2026-40358 Microsoft Office Remote Code Execution Vulnerability
CVE-2026-40361 Microsoft Word Remote Code Execution Vulnerability
CVE-2026-40363 Microsoft Office Remote Code Execution Vulnerability
CVE-2026-40364 Microsoft Word Remote Code Execution Vulnerability
CVE-2026-40367 Microsoft Word Remote Code Execution Vulnerability
CVE-2026-42831 Office for Android Remote Code Execution Vulnerability
Important severity
CVE-2026-35436 Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
CVE-2026-35440 Microsoft Word Information Disclosure Vulnerability
CVE-2026-40359 Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-40360 Microsoft Excel Information Disclosure Vulnerability
CVE-2026-40362 Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-40366 Microsoft Word Remote Code Execution Vulnerability
CVE-2026-40418 Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
CVE-2026-40419 Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
CVE-2026-40420 Microsoft Office Click-To-Run Tampering Vulnerability
CVE-2026-40421 Microsoft Word Information Disclosure Vulnerability

 

365 (15 CVEs)

Critical severity
CVE-2026-40358 Microsoft Office Remote Code Execution Vulnerability
CVE-2026-40361 Microsoft Word Remote Code Execution Vulnerability
CVE-2026-40363 Microsoft Office Remote Code Execution Vulnerability
CVE-2026-40364 Microsoft Word Remote Code Execution Vulnerability
CVE-2026-40367 Microsoft Word Remote Code Execution Vulnerability
Important severity
CVE-2026-35436 Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
CVE-2026-35440 Microsoft Word Information Disclosure Vulnerability
CVE-2026-40359 Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-40360 Microsoft Excel Information Disclosure Vulnerability
CVE-2026-40362 Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-40366 Microsoft Word Remote Code Execution Vulnerability
CVE-2026-40418 Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
CVE-2026-40419 Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
CVE-2026-40420 Microsoft Office Click-To-Run Tampering Vulnerability
CVE-2026-40421 Microsoft Word Information Disclosure Vulnerability

 

Azure (15 CVEs)

Critical severity
CVE-2026-32207 Azure Machine Learning Notebook Spoofing Vulnerability
CVE-2026-33109 Azure Managed Instance for Apache Cassandra Remote Code Execution Vulnerability
CVE-2026-33844 Azure Managed Instance for Apache Cassandra Remote Code Execution Vulnerability
CVE-2026-35428 Azure Cloud Shell Spoofing Vulnerability
CVE-2026-35435 Azure AI Foundry Elevation of Privilege Vulnerability
CVE-2026-40379 Microsoft Enterprise Security Token Service (ESTS) Spoofing Vulnerability
CVE-2026-41105 Azure Monitor Action Group Notification System Elevation of Privilege Vulnerability
CVE-2026-42826 Azure DevOps Information Disclosure Vulnerability
Important severity
CVE-2026-32204 Azure Monitor Agent Elevation of Privilege Vulnerability
CVE-2026-33117 Azure SDK for Java Security Feature Bypass Vulnerability
CVE-2026-33833 Azure Machine Learning Notebook Spoofing Vulnerability
CVE-2026-40381 Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVE-2026-41086 Windows Admin Center in Azure Portal Elevation of Privilege Vulnerability
CVE-2026-42823 Azure Logic Apps Elevation of Privilege Vulnerability
CVE-2026-42830 Azure Monitor Agent Metrics Extension Elevation of Privilege Vulnerability

 

SharePoint (7 CVEs)

Critical severity
CVE-2026-40365 Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-40367 Microsoft Word Remote Code Execution Vulnerability
Important severity
CVE-2026-33110 Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-33112 Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-35439 Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-40357 Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-40368 Microsoft SharePoint Server Remote Code Execution Vulnerability

 

Visual Studio (7 CVEs)

Important severity
CVE-2026-32175 .NET Core Tampering Vulnerability
CVE-2026-32177 .NET Elevation of Privilege Vulnerability
CVE-2026-41109 GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability
CVE-2026-41610 Visual Studio Code Security Feature Bypass Vulnerability
CVE-2026-41611 Visual Studio Code Remote Code Execution Vulnerability
CVE-2026-41612 Visual Studio Code Information Disclosure Vulnerability
CVE-2026-41613 Visual Studio Code Elevation of Privilege Vulnerability

 

Word (7 CVEs)

Critical severity
CVE-2026-40361 Microsoft Word Remote Code Execution Vulnerability
CVE-2026-40364 Microsoft Word Remote Code Execution Vulnerability
CVE-2026-40367 Microsoft Word Remote Code Execution Vulnerability
Important severity
CVE-2026-35440 Microsoft Word Information Disclosure Vulnerability
CVE-2026-40366 Microsoft Word Remote Code Execution Vulnerability
CVE-2026-40421 Microsoft Word Information Disclosure Vulnerability
CVE-2026-41101 Microsoft Word for Android Spoofing Vulnerability

Copilot (5 CVEs)

Critical severity
CVE-2026-26129 M365 Copilot Information Disclosure Vulnerability
CVE-2026-26164 M365 Copilot Information Disclosure Vulnerability
CVE-2026-33111 Copilot Chat (Microsoft Edge) Information Disclosure Vulnerability
Important severity
CVE-2026-41100 Microsoft 365 Copilot for Android Spoofing Vulnerability
CVE-2026-41614 M365 Copilot for Desktop Spoofing Vulnerability

.NET (4 CVEs)

Important severity
CVE-2026-32175 .NET Core Tampering Vulnerability
CVE-2026-32177 .NET Elevation of Privilege Vulnerability
CVE-2026-35433 .NET Elevation of Privilege Vulnerability
CVE-2026-42899 ASP.NET Core Denial of Service Vulnerability

Dynamics 365 (4 CVEs)

Critical severity
CVE-2026-33821 Microsoft Dynamics 365 Customer Insights Elevation of Privilege Vulnerability
CVE-2026-42898 Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability
Important severity
CVE-2026-40417 Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability
CVE-2026-42833 Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability

 

Excel (4 CVEs)

Important severity
CVE-2026-40359 Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-40360 Microsoft Excel Information Disclosure Vulnerability
CVE-2026-40362 Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-42832 Microsoft Excel Spoofing Vulnerability

 

Teams (2 CVEs)

Critical severity
CVE-2026-33823 Microsoft Team Events Portal Information Disclosure Vulnerability
Important severity
CVE-2026-32185 Microsoft Teams Spoofing Vulnerability

Confluence / Jira (1 CVE)

Critical severity
CVE-2026-41103 Microsoft SSO Plugin for Jira & Confluence Elevation of Privilege Vulnerability

 

Data Formulator (1 CVE)

Important severity
CVE-2026-41094 Microsoft Data Formulator Remote Code Execution Vulnerability

 

Outlook (1 CVE)

Important severity
CVE-2026-42893 Microsoft Outlook for iOS Tampering Vulnerability

 

Partner Center (1 CVE)

Critical severity
CVE-2026-34327 Microsoft Partner Center Spoofing Vulnerability

 

Power Automate (1 CVE)

Important severity
CVE-2026-40374 Microsoft Power Automate Desktop Information Disclosure Vulnerability

 

PowerPoint(1 CVE)

Important severity
CVE-2026-41102 Microsoft PowerPoint for Android Spoofing Vulnerability

 

SQL (1 CVE)

Important severity
CVE-2026-40370 SQL Server Remote Code Execution Vulnerability

 

Windows Admin Center (1 CVE)

Important severity
CVE-2026-35438 Windows Admin Center Elevation of Privilege Vulnerability

 

Appendix D: Advisories and Other Products

There are 131 Edge-related advisories listed in May’s release, all but five from Chrome. Because the CVEs from Microsoft were (like the Chrome CVEs) patched before Patch Tuesday, and because this post is already shockingly long, we have massed all of them together in the very long table below.

 

CVE-2026-7896 Chromium: CVE-2026-7896 Integer overflow in Blink
CVE-2026-7897 Chromium: CVE-2026-7897 Use after free in Mobile
CVE-2026-7898 Chromium: CVE-2026-7898 Use after free in Chromoting
CVE-2026-7899 Chromium: CVE-2026-7899 Out of bounds read and write in V8
CVE-2026-7900 Chromium: CVE-2026-7900 Heap buffer overflow in ANGLE
CVE-2026-7901 Chromium: CVE-2026-7901 Use after free in ANGLE
CVE-2026-7902 Chromium: CVE-2026-7902 Out of bounds memory access in V8
CVE-2026-7903 Chromium: CVE-2026-7903 Integer overflow in ANGLE
CVE-2026-7904 Chromium: CVE-2026-7904 Out of bounds read in Fonts
CVE-2026-7905 Chromium: CVE-2026-7905 Insufficient validation of untrusted input in Media
CVE-2026-7906 Chromium: CVE-2026-7906 Use after free in SVG
CVE-2026-7907 Chromium: CVE-2026-7907 Use after free in DOM
CVE-2026-7908 Chromium: CVE-2026-7908 Use after free in Fullscreen
CVE-2026-7909 Chromium: CVE-2026-7909 Inappropriate implementation in ServiceWorker
CVE-2026-7910 Chromium: CVE-2026-7910 Use after free in Views
CVE-2026-7911 Chromium: CVE-2026-7911 Use after free in Aura
CVE-2026-7912 Chromium: CVE-2026-7912 Integer overflow in GPU
CVE-2026-7913 Chromium: CVE-2026-7913 Insufficient policy enforcement in DevTools
CVE-2026-7914 Chromium: CVE-2026-7914 Type Confusion in Accessibility
CVE-2026-7915 Chromium: CVE-2026-7915 Insufficient data validation in DevTools
CVE-2026-7916 Chromium: CVE-2026-7916 Insufficient data validation in InterestGroups
CVE-2026-7917 Chromium: CVE-2026-7917 Use after free in Fullscreen
CVE-2026-7918 Chromium: CVE-2026-7918 Use after free in GPU
CVE-2026-7919 Chromium: CVE-2026-7919 Use after free in Aura
CVE-2026-7920 Chromium: CVE-2026-7920 Use after free in Skia
CVE-2026-7921 Chromium: CVE-2026-7921 Use after free in Passwords
CVE-2026-7922 Chromium: CVE-2026-7922 Use after free in ServiceWorker
CVE-2026-7923 Chromium: CVE-2026-7923 Out of bounds write in Skia
CVE-2026-7924 Chromium: CVE-2026-7924 Uninitialized Use in Dawn
CVE-2026-7925 Chromium: CVE-2026-7925 Use after free in Chromoting
CVE-2026-7926 Chromium: CVE-2026-7926 Use after free in PresentationAPI
CVE-2026-7927 Chromium: CVE-2026-7927 Type Confusion in Runtime
CVE-2026-7928 Chromium: CVE-2026-7928 Use after free in WebRTC
CVE-2026-7929 Chromium: CVE-2026-7929 Use after free in MediaRecording
CVE-2026-7930 Chromium: CVE-2026-7930 Insufficient validation of untrusted input in Cookies
CVE-2026-7931 Chromium: CVE-2026-7931 Insufficient validation of untrusted input in iOS
CVE-2026-7932 Chromium: CVE-2026-7932 Insufficient policy enforcement in Downloads
CVE-2026-7933 Chromium: CVE-2026-7933 Out of bounds read in WebCodecs
CVE-2026-7934 Chromium: CVE-2026-7934 Insufficient validation of untrusted input in Popup Blocker
CVE-2026-7935 Chromium: CVE-2026-7935 Inappropriate implementation in Speech
CVE-2026-7936 Chromium: CVE-2026-7936 Object lifecycle issue in V8
CVE-2026-7937 Chromium: CVE-2026-7937 Insufficient policy enforcement in DevTools
CVE-2026-7938 Chromium: CVE-2026-7938 Use after free in CSS
CVE-2026-7939 Chromium: CVE-2026-7939 Inappropriate implementation in SanitizerAPI
CVE-2026-7940 Chromium: CVE-2026-7940 Use after free in V8
CVE-2026-7941 Chromium: CVE-2026-7941 Insufficient validation of untrusted input in Mobile
CVE-2026-7942 Chromium: CVE-2026-7942 Integer overflow in ANGLE
CVE-2026-7943 Chromium: CVE-2026-7943 Insufficient validation of untrusted input in ANGLE
CVE-2026-7944 Chromium: CVE-2026-7944 Insufficient validation of untrusted input in Persistent Cache
CVE-2026-7945 Chromium: CVE-2026-7945 Insufficient validation of untrusted input in COOP
CVE-2026-7946 Chromium: CVE-2026-7946 Insufficient policy enforcement in WebUI
CVE-2026-7947 Chromium: CVE-2026-7947 Insufficient validation of untrusted input in Network
CVE-2026-7948 Chromium: CVE-2026-7948 Race in Chromoting
CVE-2026-7949 Chromium: CVE-2026-7949 Out of bounds read in Skia
CVE-2026-7950 Chromium: CVE-2026-7950 Out of bounds read and write in GFX
CVE-2026-7951 Chromium: CVE-2026-7951 Out of bounds write in WebRTC
CVE-2026-7952 Chromium: CVE-2026-7952 Insufficient policy enforcement in Extensions
CVE-2026-7953 Chromium: CVE-2026-7953 Insufficient validation of untrusted input in Omnibox
CVE-2026-7954 Chromium: CVE-2026-7954 Race in Shared Storage
CVE-2026-7955 Chromium: CVE-2026-7955 Uninitialized Use in GPU
CVE-2026-7956 Chromium: CVE-2026-7956 Use after free in Navigation
CVE-2026-7957 Chromium: CVE-2026-7957 Out of bounds write in Media
CVE-2026-7958 Chromium: CVE-2026-7958 Inappropriate implementation in ServiceWorker
CVE-2026-7959 Chromium: CVE-2026-7959 Inappropriate implementation in Navigation
CVE-2026-7960 Chromium: CVE-2026-7960 Race in Speech
CVE-2026-7961 Chromium: CVE-2026-7961 Insufficient validation of untrusted input in Permissions
CVE-2026-7962 Chromium: CVE-2026-7962 Insufficient policy enforcement in DirectSockets
CVE-2026-7963 Chromium: CVE-2026-7963 Inappropriate implementation in ServiceWorker
CVE-2026-7964 Chromium: CVE-2026-7964 Insufficient validation of untrusted input in FileSystem
CVE-2026-7965 Chromium: CVE-2026-7965 Insufficient validation of untrusted input in DevTools
CVE-2026-7966 Chromium: CVE-2026-7966 Insufficient validation of untrusted input in SiteIsolation
CVE-2026-7967 Chromium: CVE-2026-7967 Insufficient validation of untrusted input in Navigation
CVE-2026-7968 Chromium: CVE-2026-7968 Insufficient validation of untrusted input in CORS
CVE-2026-7969 Chromium: CVE-2026-7969 Integer overflow in Network
CVE-2026-7970 Chromium: CVE-2026-7970 Use after free in TopChrome
CVE-2026-7971 Chromium: CVE-2026-7971 Inappropriate implementation in ORB
CVE-2026-7972 Chromium: CVE-2026-7972 Uninitialized Use in GPU
CVE-2026-7973 Chromium: CVE-2026-7973 Integer overflow in Dawn
CVE-2026-7974 Chromium: CVE-2026-7974 Use after free in Blink
CVE-2026-7975 Chromium: CVE-2026-7975 Use after free in DevTools
CVE-2026-7976 Chromium: CVE-2026-7976 Use after free in Views
CVE-2026-7977 Chromium: CVE-2026-7977 Inappropriate implementation in Canvas
CVE-2026-7978 Chromium: CVE-2026-7978 Inappropriate implementation in Companion
CVE-2026-7979 Chromium: CVE-2026-7979 Inappropriate implementation in Media
CVE-2026-7980 Chromium: CVE-2026-7980 Use after free in WebAudio
CVE-2026-7981 Chromium: CVE-2026-7981 Out of bounds read in Codecs
CVE-2026-7982 Chromium: CVE-2026-7982 Uninitialized Use in WebCodecs
CVE-2026-7983 Chromium: CVE-2026-7983 Out of bounds read in Dawn
CVE-2026-7984 Chromium: CVE-2026-7984 Use after free in ReadingMode
CVE-2026-7985 Chromium: CVE-2026-7985 Use after free in GPU
CVE-2026-7986 Chromium: CVE-2026-7986 Insufficient policy enforcement in Autofill
CVE-2026-7987 Chromium: CVE-2026-7987 Use after free in WebRTC
CVE-2026-7988 Chromium: CVE-2026-7988 Type Confusion in WebRTC
CVE-2026-7989 Chromium: CVE-2026-7989 Insufficient data validation in DataTransfer
CVE-2026-7990 Chromium: CVE-2026-7990 Insufficient validation of untrusted input in Updater
CVE-2026-7991 Chromium: CVE-2026-7991 Use after free in UI
CVE-2026-7992 Chromium: CVE-2026-7992 Insufficient validation of untrusted input in UI
CVE-2026-7993 Chromium: CVE-2026-7993 Insufficient validation of untrusted input in Payments
CVE-2026-7994 Chromium: CVE-2026-7994 Inappropriate implementation in Chromoting
CVE-2026-7995 Chromium: CVE-2026-7995 Out of bounds read in AdFilter
CVE-2026-7996 Chromium: CVE-2026-7996 Insufficient validation of untrusted input in SSL
CVE-2026-7997 Chromium: CVE-2026-7997 Insufficient validation of untrusted input in Updater
CVE-2026-7998 Chromium: CVE-2026-7998 Insufficient validation of untrusted input in Dialog
CVE-2026-7999 Chromium: CVE-2026-7999 Inappropriate implementation in V8
CVE-2026-8000 Chromium: CVE-2026-8000 Insufficient validation of untrusted input in ChromeDriver
CVE-2026-8001 Chromium: CVE-2026-8001 Use after free in Printing
CVE-2026-8002 Chromium: CVE-2026-8002 Use after free in Audio
CVE-2026-8003 Chromium: CVE-2026-8003 Insufficient validation of untrusted input in TabGroups
CVE-2026-8004 Chromium: CVE-2026-8004 Insufficient policy enforcement in DevTools
CVE-2026-8005 Chromium: CVE-2026-8005 Insufficient validation of untrusted input in Cast
CVE-2026-8006 Chromium: CVE-2026-8006 Insufficient policy enforcement in DevTools
CVE-2026-8007 Chromium: CVE-2026-8007 Insufficient validation of untrusted input in Cast
CVE-2026-8008 Chromium: CVE-2026-8008 Inappropriate implementation in DevTools
CVE-2026-8009 Chromium: CVE-2026-8009 Inappropriate implementation in Cast
CVE-2026-8010 Chromium: CVE-2026-8010 Insufficient validation of untrusted input in SiteIsolation
CVE-2026-8011 Chromium: CVE-2026-8011 Insufficient policy enforcement in Search
CVE-2026-8012 Chromium: CVE-2026-8012 Inappropriate implementation in MHTML
CVE-2026-8013 Chromium: CVE-2026-8013 Insufficient validation of untrusted input in FedCM
CVE-2026-8014 Chromium: CVE-2026-8014 Inappropriate implementation in Preload
CVE-2026-8015 Chromium: CVE-2026-8015 Inappropriate implementation in Media
CVE-2026-8016 Chromium: CVE-2026-8016 Use after free in WebRTC
CVE-2026-8017 Chromium: CVE-2026-8017 Side-channel information leakage in Media
CVE-2026-8018 Chromium: CVE-2026-8018 Insufficient policy enforcement in DevTools
CVE-2026-8019 Chromium: CVE-2026-8019 Insufficient policy enforcement in WebApp
CVE-2026-8020 Chromium: CVE-2026-8020 Uninitialized Use in GPU
CVE-2026-8021 Chromium: CVE-2026-8021 Script injection in UI
CVE-2026-8022 Chromium: CVE-2026-8022 Inappropriate implementation in MHTML
CVE-2026-35429 Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability
CVE-2026-40416 Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability
CVE-2026-41107 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
CVE-2026-42838 Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
CVE-2026-42891 Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability

Meanwhile, there are 13 updates from Adobe, all affecting Adobe Commerce – 2.4.9, 2.4.8-p5, 2.4.7-p10, 2.4.6-p15, 2.4.5-p17, 2.4.4-p18. These are collectively addresseḍ as APSB26-49. 

CVE-2026-34645 Incorrect Authorization (CWE-863)
CVE-2026-34646 Incorrect Authorization (CWE-863)
CVE-2026-34647 Server-Side Request Forgery (SSRF) (CWE-918)
CVE-2026-34648 Uncontrolled Resource Consumption (CWE-400)
CVE-2026-34649 Uncontrolled Resource Consumption (CWE-400)
CVE-2026-34650 Uncontrolled Resource Consumption (CWE-400)
CVE-2026-34651 Uncontrolled Resource Consumption (CWE-400)
CVE-2026-34652 Dependency on Vulnerable Third-Party Component (CWE-1395)
CVE-2026-34653 Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) (CWE-22)
CVE-2026-34654 Dependency on Vulnerable Third-Party Component (CWE-1395)
CVE-2026-34655 Cross-site Scripting (Stored XSS) (CWE-79)
CVE-2026-34656 Improper Authorization (CWE-285)
CVE-2026-34658 Cross-site Scripting (Stored XSS) (CWE-79)

 

Microsoft also issued the usual servicing stack updates this month (ADV990000).

Finally, there is one Important-severity CVE from AMD (CVE-2025-54518, CPU OP Cache Corruption) in this month’s set; we have covered it elsewhere in this post, including in the table below. Microsoft is releasing advisory information on this issue to state that the latest builds of windows protect against this cache-corruption vulnerability.

Appendix E: Affected Windows Server versions

This is a table of 66 CVEs in the May release affecting Windows Server versions 2012 through 2025. The table differentiates among major versions of the platform but doesn’t go into deeper detail (eg., Server Core). An “x” indicates that the CVE does not apply to that version. We include the Important-severity, Windows-touching advisory from AMD, since the Server versions they affect are known; those are indicated in this chart in blue.

Administrators are encouraged to use this appendix as a starting point to ascertain their specific exposure, as each reader’s situation, especially as it concerns products out of mainstream support, will vary. For specific Knowledge Base numbers, please consult Microsoft. 

CVE

S-12

12r2

S-16

S-19

S-22

23h2

S-25

CVE-2025-54518

×

×

CVE-2026-21530

CVE-2026-32161

CVE-2026-32170

CVE-2026-32209

CVE-2026-33834

CVE-2026-33835

×

×

×

CVE-2026-33837

CVE-2026-33838

CVE-2026-33839

×

×

×

CVE-2026-33840

×

×

×

×

×

×

CVE-2026-33841

×

×

×

×

CVE-2026-34329

CVE-2026-34330

CVE-2026-34331

CVE-2026-34332

×

×

×

×

×

×

CVE-2026-34333

CVE-2026-34334

CVE-2026-34336

×

×

CVE-2026-34337

×

×

×

CVE-2026-34338

CVE-2026-34339

×

×

CVE-2026-34340

×

×

×

CVE-2026-34341

CVE-2026-34342

CVE-2026-34343

CVE-2026-34344

CVE-2026-34345

×

×

CVE-2026-34347

CVE-2026-34350

×

×

×

×

×

×

CVE-2026-34351

CVE-2026-35415

×

CVE-2026-35416

CVE-2026-35417

×

×

×

CVE-2026-35418

×

×

×

CVE-2026-35419

×

×

×

×

×

×

CVE-2026-35420

CVE-2026-35421

CVE-2026-35422

CVE-2026-35423

CVE-2026-35424

CVE-2026-40369

×

×

×

×

×

×

CVE-2026-40377

CVE-2026-40380

CVE-2026-40382

CVE-2026-40397

CVE-2026-40398

CVE-2026-40399

×

×

CVE-2026-40401

CVE-2026-40402

×

×

×

×

×

×

CVE-2026-40403

CVE-2026-40405

×

×

×

×

×

×

CVE-2026-40406

CVE-2026-40407

CVE-2026-40408

CVE-2026-40410

×

CVE-2026-40413

CVE-2026-40414

CVE-2026-40415

×

×

×

CVE-2026-41088

×

×

×

×

CVE-2026-41089

CVE-2026-41095

×

CVE-2026-41096

×

×

×

×

×

CVE-2026-41097

×

×

×

CVE-2026-42825

CVE-2026-42896

×

×

×

×

×

×

 

Appendix F: Common Weakness Enumeration

As mentioned above, Microsoft now states which CWEs affect the CVEs they address. This month, we looked at which CWEs were most heavily represented in the dataset and compared them to last month’s inaugural numbers. The May dataset of 132 CVEs gave us 152 CWEs overall; 17 CVEs had two CVEs, and 3 had three CWEs. There were 49 unique CWEs, slightly more than last month’s 42. Once again CWE-416, Use After Free, leads the pack, though it accounts for just 18.42 percent of vulnerabilities rather than the commanding 28.57 percent in April’s haul. With just two months’ worth of data it’s too early to identify significant patterns yet, but we once again find ourselves looking at CWE-835 — Loop with Unreachable Exit Condition (‘Infinite Loop’) and asking why the number for that couldn’t be either zero (0) or a sideways eight (∞). 

 

CWE Count CWE Name
416 28 Use After Free
122 18 Heap-based Buffer Overflow
284 13 Improper Access Control
362 8 Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
476 6 NULL Pointer Dereference
502 5 Deserialization of Untrusted Data
190 5 Integer Overflow or Wraparound
415 4 Double Free
200 4 Exposure of Sensitive Information to an Unauthorized Actor
125 4 Out-of-bounds Read
77 4 Improper Neutralization of Special Elements used in a Command (‘Command Injection’)
73 4 External Control of File Name or Path
843 3 Access of Resource Using Incompatible Type (‘Type Confusion’)
74 3 Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’)
20 3 Improper Input Validation
1220 2 Insufficient Granularity of Access Control
822 2 Untrusted Pointer Dereference
552 2 Files or Directories Accessible to External Parties
121 2 Stack-based Buffer Overflow
94 2 Improper Control of Generation of Code (‘Code Injection’)
79 2 Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
1390 1 Weak Authentication
1329 1 Reliance on Component That is Not Updateable
918 1 Server-Side Request Forgery (SSRF)
908 1 Use of Uninitialized Resource
862 1 Missing Authorization
835 1 Loop with Unreachable Exit Condition (‘Infinite Loop’)
610 1 Externally Controlled Reference to a Resource in Another Sphere
426 1 Untrusted Search Path
401 1 Missing Release of Memory after Effective Lifetime
384 1 Session Fixation
367 1 Time-of-check Time-of-use (TOCTOU) Race Condition
347 1 Improper Verification of Cryptographic Signature
303 1 Incorrect Implementation of Authentication Algorithm
288 1 Authentication Bypass Using an Alternate Path or Channel
287 1 Improper Authentication
285 1 Improper Authorization
269 1 Improper Privilege Management
250 1 Execution with Unnecessary Privileges
197 1 Numeric Truncation Error
191 1 Integer Underflow (Wrap or Wraparound)
138 1 Improper Neutralization of Special Elements
126 1 Buffer Over-read
80 1 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
78 1 Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)
59 1 Improper Link Resolution Before File Access (‘Link Following’)
36 1 Absolute Path Traversal
23 1 Relative Path Traversal
22 1 Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)

 

 

 

 



Source link

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *