Search Results (35344 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2022-41105 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2026-05-19 5.5 Medium
Microsoft Excel Information Disclosure Vulnerability
CVE-2021-43875 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2026-05-19 7.8 High
Microsoft Office Graphics Remote Code Execution Vulnerability
CVE-2023-33149 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2026-05-19 7.8 High
Microsoft Office Graphics Remote Code Execution Vulnerability
CVE-2023-29333 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2026-05-19 3.3 Low
Microsoft Access Denial of Service Vulnerability
CVE-2022-44694 1 Microsoft 5 365 Apps, Office, Office 2019 and 2 more 2026-05-19 7.8 High
Microsoft Office Visio Remote Code Execution Vulnerability
CVE-2022-44695 1 Microsoft 8 365 Apps, Office, Office 2019 and 5 more 2026-05-19 7.8 High
Microsoft Office Visio Remote Code Execution Vulnerability
CVE-2026-42832 1 Microsoft 8 Excel, Excel For Android, Office and 5 more 2026-05-19 7.7 High
Improper access control in Microsoft Office allows an unauthorized attacker to perform spoofing locally.
CVE-2023-23398 1 Microsoft 4 365 Apps, Excel, Office and 1 more 2026-05-19 7.1 High
Microsoft Excel Spoofing Vulnerability
CVE-2022-41060 1 Microsoft 8 365 Apps, Office, Office Long Term Servicing Channel and 5 more 2026-05-19 5.5 Medium
Microsoft Word Information Disclosure Vulnerability
CVE-2022-29109 1 Microsoft 4 365 Apps, Office, Office Long Term Servicing Channel and 1 more 2026-05-19 7.8 High
Microsoft Excel Remote Code Execution Vulnerability
CVE-2022-41104 1 Microsoft 4 365 Apps, Excel, Office and 1 more 2026-05-19 5.5 Medium
Microsoft Excel Security Feature Bypass Vulnerability
CVE-2022-44696 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2026-05-19 7.8 High
Microsoft Office Visio Remote Code Execution Vulnerability
CVE-2026-8750 2 H2o, H2oai 2 H2o, H2o-3 2026-05-19 5.3 Medium
A vulnerability was identified in h2oai h2o-3 up to 7402. Affected by this issue is the function importFiles of the file h2o-core/src/main/java/water/persist/PersistNFS.java of the component ImportFile API. Such manipulation leads to information disclosure. The attack can be executed remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2026-8752 2 H2o, H2oai 2 H2o, H2o-3 2026-05-19 5.3 Medium
A weakness has been identified in h2oai h2o-3 up to 7402. This vulnerability affects the function exec of the file h2o-core/src/main/java/water/rapids/ast/prims/misc/AstSetProperty.java of the component Rapids setproperty Primitive Handler. Executing a manipulation can lead to improper access controls. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2026-8536 2 Apple, Google 2 Macos, Chrome 2026-05-19 3.1 Low
Insufficient validation of untrusted input in ReadingMode in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to bypass site Isolation via a crafted HTML page. (Chromium security severity: High)
CVE-2026-45492 1 Microsoft 1 Edge Chromium 2026-05-19 5.4 Medium
Improper input validation in Microsoft Edge (Chromium-based) allows an unauthorized attacker to bypass a security feature over a network.
CVE-2026-31574 1 Linux 1 Linux Kernel 2026-05-19 5.5 Medium
In the Linux kernel, the following vulnerability has been resolved: clockevents: Add missing resets of the next_event_forced flag The prevention mechanism against timer interrupt starvation missed to reset the next_event_forced flag in a couple of places: - When the clock event state changes. That can cause the flag to be stale over a shutdown/startup sequence - When a non-forced event is armed, which then prevents rearming before that event. If that event is far out in the future this will cause missed timer interrupts. - In the suspend wakeup handler. That led to stalls which have been reported by several people. Add the missing resets, which fixes the problems for the reporters.
CVE-2026-40020 2 Dovecot, Open-xchange 3 Dovecot, Dovecot, Ox Dovecot Pro 2026-05-18 3.1 Low
Attacker can use the IMAP SETACL command to inject the anyone permission to user's dovecot-acl file even if imap_acl_allow_anyone=no. This causes folders to be spammed to all users. The impact is limited to being able to spam folders to other users, no unexpected access is gained. Install to fixed version. No publicly available exploits are known.
CVE-2026-44551 2 Open-webui, Openwebui 2 Open-webui, Open Webui 2026-05-18 9.1 Critical
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the LDAP authentication endpoint does not validate that the submitted password is non-empty before performing a Simple Bind against the LDAP server. The LdapForm Pydantic model accepts password: str with no minimum length constraint, so an empty string passes validation. The subsequent Connection.bind() call succeeds on vulnerable LDAP servers, and the application issues a full session token for the target user. This vulnerability is fixed in 0.9.0.
CVE-2026-43331 1 Linux 1 Linux Kernel 2026-05-18 5.5 Medium
In the Linux kernel, the following vulnerability has been resolved: x86/kexec: Disable KCOV instrumentation after load_segments() The load_segments() function changes segment registers, invalidating GS base (which KCOV relies on for per-cpu data). When CONFIG_KCOV is enabled, any subsequent instrumented C code call (e.g. native_gdt_invalidate()) begins crashing the kernel in an endless loop. To reproduce the problem, it's sufficient to do kexec on a KCOV-instrumented kernel: $ kexec -l /boot/otherKernel $ kexec -e The real-world context for this problem is enabling crash dump collection in syzkaller. For this, the tool loads a panic kernel before fuzzing and then calls makedumpfile after the panic. This workflow requires both CONFIG_KEXEC and CONFIG_KCOV to be enabled simultaneously. Adding safeguards directly to the KCOV fast-path (__sanitizer_cov_trace_pc()) is also undesirable as it would introduce an extra performance overhead. Disabling instrumentation for the individual functions would be too fragile, so disable KCOV instrumentation for the entire machine_kexec_64.c and physaddr.c. If coverage-guided fuzzing ever needs these components in the future, other approaches should be considered. The problem is not relevant for 32 bit kernels as CONFIG_KCOV is not supported there. [ bp: Space out comment for better readability. ]