Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-32175 (GCVE-0-2026-32175)
Vulnerability from cvelistv5 – Published: 2026-05-12 16:59 – Updated: 2026-05-13 17:58- CWE-36 - Absolute Path Traversal
| URL | Tags |
|---|---|
| https://msrc.microsoft.com/update-guide/vulnerabi… | vendor-advisorypatch |
| Vendor | Product | Version | |
|---|---|---|---|
| Microsoft | .NET 10.0 |
Affected:
10.0.0 , < 10.0.8
(custom)
|
|
| Microsoft | .NET 8.0 |
Affected:
8.0.0 , < 8.0.27
(custom)
|
|
| Microsoft | .NET 9.0 |
Affected:
9.0.0 , < 9.0.16
(custom)
|
|
| Microsoft | Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) |
Affected:
15.9.0 , < 15.9.80
(custom)
|
|
| Microsoft | Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) |
Affected:
16.11.0 , < 16.11.56
(custom)
|
|
| Microsoft | Microsoft Visual Studio 2022 version 17.12 |
Affected:
17.12.0 , < 17.12.20
(custom)
|
|
| Microsoft | Microsoft Visual Studio 2022 version 17.14 |
Affected:
17.14.0 , < 17.14.31
(custom)
|
|
| Microsoft | Microsoft Visual Studio 2026 version 18.5 |
Affected:
18.5.0 , < 18.5.3
(custom)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-32175",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-05-12T19:22:38.751667Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-05-12T19:22:51.487Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": ".NET 10.0",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.8",
"status": "affected",
"version": "10.0.0",
"versionType": "custom"
}
]
},
{
"product": ".NET 8.0",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "8.0.27",
"status": "affected",
"version": "8.0.0",
"versionType": "custom"
}
]
},
{
"product": ".NET 9.0",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "9.0.16",
"status": "affected",
"version": "9.0.0",
"versionType": "custom"
}
]
},
{
"product": "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "15.9.80",
"status": "affected",
"version": "15.9.0",
"versionType": "custom"
}
]
},
{
"product": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "16.11.56",
"status": "affected",
"version": "16.11.0",
"versionType": "custom"
}
]
},
{
"product": "Microsoft Visual Studio 2022 version 17.12",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "17.12.20",
"status": "affected",
"version": "17.12.0",
"versionType": "custom"
}
]
},
{
"product": "Microsoft Visual Studio 2022 version 17.14",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "17.14.31",
"status": "affected",
"version": "17.14.0",
"versionType": "custom"
}
]
},
{
"product": "Microsoft Visual Studio 2026 version 18.5",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "18.5.3",
"status": "affected",
"version": "18.5.0",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.8",
"versionStartIncluding": "10.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.0.27",
"versionStartIncluding": "8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.0.16",
"versionStartIncluding": "9.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:visual_studio_2026:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.5.3",
"versionStartIncluding": "18.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.14.31",
"versionStartIncluding": "17.14.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.11.56",
"versionStartIncluding": "16.11.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.9.80",
"versionStartIncluding": "15.9.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.12.20",
"versionStartIncluding": "17.12.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"datePublic": "2026-05-12T14:00:00.000Z",
"descriptions": [
{
"lang": "en-US",
"value": "A tampering vulnerability exists when .NET Core improperly handles specially crafted files. An attacker who successfully exploited this vulnerability could write arbitrary files and directories to certain locations on a vulnerable system. However, an attacker would have limited control over the destination of the files and directories.\nTo exploit the vulnerability, an attacker must send a specially crafted file to a vulnerable system.\nThe security update fixes the vulnerability by ensuring .NET Core properly handles files."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en-US",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-36",
"description": "CWE-36: Absolute Path Traversal",
"lang": "en-US",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-13T17:58:53.678Z",
"orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"shortName": "microsoft"
},
"references": [
{
"name": ".NET Core Tampering Vulnerability",
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32175"
}
],
"title": ".NET Core Tampering Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"assignerShortName": "microsoft",
"cveId": "CVE-2026-32175",
"datePublished": "2026-05-12T16:59:01.649Z",
"dateReserved": "2026-03-11T00:26:53.424Z",
"dateUpdated": "2026-05-13T17:58:53.678Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-32175",
"date": "2026-05-13",
"epss": "0.00078",
"percentile": "0.2299"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-32175\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2026-05-12T18:16:58.737\",\"lastModified\":\"2026-05-13T15:34:52.573\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A tampering vulnerability exists when .NET Core improperly handles specially crafted files. An attacker who successfully exploited this vulnerability could write arbitrary files and directories to certain locations on a vulnerable system. However, an attacker would have limited control over the destination of the files and directories.\\nTo exploit the vulnerability, an attacker must send a specially crafted file to a vulnerable system.\\nThe security update fixes the vulnerability by ensuring .NET Core properly handles files.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-36\"}]}],\"references\":[{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32175\",\"source\":\"secure@microsoft.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-32175\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-05-12T19:22:38.751667Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-05-12T19:22:44.313Z\"}}], \"cna\": {\"title\": \".NET Core Tampering Vulnerability\", \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 4.3, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C\"}, \"scenarios\": [{\"lang\": \"en-US\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Microsoft\", \"product\": \".NET 10.0\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.8\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Microsoft\", \"product\": \".NET 8.0\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.0.0\", \"lessThan\": \"8.0.27\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Microsoft\", \"product\": \".NET 9.0\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.0.0\", \"lessThan\": \"9.0.16\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Microsoft\", \"product\": \"Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)\", \"versions\": [{\"status\": \"affected\", \"version\": \"15.9.0\", \"lessThan\": \"15.9.80\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Microsoft\", \"product\": \"Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)\", \"versions\": [{\"status\": \"affected\", \"version\": \"16.11.0\", \"lessThan\": \"16.11.56\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Microsoft\", \"product\": \"Microsoft Visual Studio 2022 version 17.12\", \"versions\": [{\"status\": \"affected\", \"version\": \"17.12.0\", \"lessThan\": \"17.12.20\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Microsoft\", \"product\": \"Microsoft Visual Studio 2022 version 17.14\", \"versions\": [{\"status\": \"affected\", \"version\": \"17.14.0\", \"lessThan\": \"17.14.31\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Microsoft\", \"product\": \"Microsoft Visual Studio 2026 version 18.5\", \"versions\": [{\"status\": \"affected\", \"version\": \"18.5.0\", \"lessThan\": \"18.5.3\", \"versionType\": \"custom\"}]}], \"datePublic\": \"2026-05-12T14:00:00.000Z\", \"references\": [{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32175\", \"name\": \".NET Core Tampering Vulnerability\", \"tags\": [\"vendor-advisory\", \"patch\"]}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"A tampering vulnerability exists when .NET Core improperly handles specially crafted files. An attacker who successfully exploited this vulnerability could write arbitrary files and directories to certain locations on a vulnerable system. However, an attacker would have limited control over the destination of the files and directories.\\nTo exploit the vulnerability, an attacker must send a specially crafted file to a vulnerable system.\\nThe security update fixes the vulnerability by ensuring .NET Core properly handles files.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"type\": \"CWE\", \"cweId\": \"CWE-36\", \"description\": \"CWE-36: Absolute Path Traversal\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.8\", \"versionStartIncluding\": \"10.0.0\"}, {\"criteria\": \"cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"8.0.27\", \"versionStartIncluding\": \"8.0.0\"}, {\"criteria\": \"cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"9.0.16\", \"versionStartIncluding\": \"9.0.0\"}, {\"criteria\": \"cpe:2.3:a:microsoft:visual_studio_2026:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"18.5.3\", \"versionStartIncluding\": \"18.5.0\"}, {\"criteria\": \"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"17.14.31\", \"versionStartIncluding\": \"17.14.0\"}, {\"criteria\": \"cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"16.11.56\", \"versionStartIncluding\": \"16.11.0\"}, {\"criteria\": \"cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"15.9.80\", \"versionStartIncluding\": \"15.9.0\"}, {\"criteria\": \"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"17.12.20\", \"versionStartIncluding\": \"17.12.0\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"shortName\": \"microsoft\", \"dateUpdated\": \"2026-05-13T17:58:53.678Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-32175\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-05-13T17:58:53.678Z\", \"dateReserved\": \"2026-03-11T00:26:53.424Z\", \"assignerOrgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"datePublished\": \"2026-05-12T16:59:01.649Z\", \"assignerShortName\": \"microsoft\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
NCSC-2026-0143
Vulnerability from csaf_ncscnl - Published: 2026-05-12 17:53 - Updated: 2026-05-12 17:53A heap-based buffer overflow vulnerability in the .NET framework allows an unauthorized local attacker to elevate privileges by exploiting memory corruption.
CWE-122 - Heap-based Buffer Overflow| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Microsoft / .NET 10.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 10.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Windows
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Windows
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Azure
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Azure DevOps
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Data Formulator
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.12
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.14
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2026 version 18.5
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Visual Studio Code
|
vers:unknown/* |
Improper input validation in the .NET framework allows unauthorized local users to escalate privileges, potentially compromising system security.
CWE-190 - Integer Overflow or Wraparound| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Microsoft / .NET 10.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 10.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Windows
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Windows
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Azure
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Azure DevOps
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Data Formulator
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.12
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.14
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2026 version 18.5
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Visual Studio Code
|
vers:unknown/* |
A tampering vulnerability in .NET Core allows attackers to write arbitrary files and directories to certain system locations via specially crafted files, fixed by a security update ensuring proper file handling.
CWE-36 - Absolute Path Traversal| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Microsoft / .NET 10.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 10.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Windows
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Windows
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Azure
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Azure DevOps
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Data Formulator
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.12
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.14
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2026 version 18.5
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Visual Studio Code
|
vers:unknown/* |
An infinite loop vulnerability in ASP.NET Core allows unauthorized attackers to cause denial of service over a network by exploiting a loop with an unreachable exit condition.
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Microsoft / .NET 10.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 10.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Windows
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Windows
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Azure
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Azure DevOps
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Data Formulator
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.12
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.14
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2026 version 18.5
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Visual Studio Code
|
vers:unknown/* |
An improper control of code generation vulnerability in Microsoft Data Formulator allows unauthorized remote code execution by attackers.
CWE-94 - Improper Control of Generation of Code ('Code Injection')| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Microsoft / .NET 10.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 10.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Windows
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Windows
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Azure
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Azure DevOps
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Data Formulator
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.12
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.14
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2026 version 18.5
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Visual Studio Code
|
vers:unknown/* |
Improper neutralization of special elements in output within GitHub Copilot and Visual Studio allows unauthorized attackers to bypass security features over a network.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Microsoft / .NET 10.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 10.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Windows
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Windows
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Azure
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Azure DevOps
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Data Formulator
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.12
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.14
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2026 version 18.5
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Visual Studio Code
|
vers:unknown/* |
Visual Studio Code contains a vulnerability where improper input neutralization during web page generation allows a local unauthorized attacker to bypass security features via cross-site scripting.
CWE-59 - Improper Link Resolution Before File Access ('Link Following')| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Microsoft / .NET 10.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 10.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Windows
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Windows
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Azure
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Azure DevOps
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Data Formulator
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.12
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.14
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2026 version 18.5
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Visual Studio Code
|
vers:unknown/* |
An XSS vulnerability in Visual Studio Code caused by improper neutralization of script-related HTML tags enables unauthorized local code execution.
CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Microsoft / .NET 10.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 10.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Windows
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Windows
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Azure
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Azure DevOps
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Data Formulator
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.12
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.14
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2026 version 18.5
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Visual Studio Code
|
vers:unknown/* |
A relative path traversal vulnerability in Visual Studio Code allows unauthorized local information disclosure by enabling access to files outside the intended directory scope.
CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Microsoft / .NET 10.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 10.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Windows
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Windows
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Azure
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Azure DevOps
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Data Formulator
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.12
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.14
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2026 version 18.5
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Visual Studio Code
|
vers:unknown/* |
A session fixation vulnerability in Visual Studio Code enables unauthorized attackers to elevate privileges over a network, potentially compromising user sessions.
CWE-384 - Session Fixation| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Microsoft / .NET 10.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 10.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Windows
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Windows
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Azure
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Azure DevOps
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Data Formulator
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.12
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.14
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2026 version 18.5
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Visual Studio Code
|
vers:unknown/* |
A vulnerability in Azure DevOps allows unauthorized actors to access and disclose sensitive information over a network, posing a significant security risk.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Microsoft / .NET 10.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 10.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 8.0 installed on Windows
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Linux
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Mac OS
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / .NET 9.0 installed on Windows
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Azure
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Azure DevOps
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Data Formulator
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.12
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2022 version 17.14
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Microsoft Visual Studio 2026 version 18.5
|
vers:unknown/* | ||
|
vers:unknown/*
Microsoft / Visual Studio Code
|
vers:unknown/* |
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Microsoft heeft kwetsbaarheden verholpen in diverse Developer Tools.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Omzeilen van een beveiligingsmaatregel\n- Uitvoeren van willekeurige code (gebruikersrechten)\n- Toegang tot gevoelige gegevens\n\nDe kwetsbaarheid met kenmerk CVE-2026-42826 is centraal verholpen door Microsoft en slechts toegevoegd ter informatie. Er zijn hiervoor geen verdere acties benodigd.\n\n```\nAzure DevOps: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2026-42826 | 10.00 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nVisual Studio Code: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2026-41610 | 6.30 | Omzeilen van beveiligingsmaatregel | \n| CVE-2026-41611 | 7.80 | Uitvoeren van willekeurige code | \n| CVE-2026-41612 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2026-41613 | 8.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Data Formulator: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2026-41094 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nASP.NET Core: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2026-42899 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\n.NET: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2026-32177 | 7.30 | Denial-of-Service | \n| CVE-2026-35433 | 7.30 | Verkrijgen van verhoogde rechten | \n| CVE-2026-32175 | 4.30 | \u003cVertaal: Tampering\u003e | \n|----------------|------|-------------------------------------|\n\nGitHub Copilot and Visual Studio: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2026-41109 | 8.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n```\n",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
"title": "CWE-80"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Session Fixation",
"title": "CWE-384"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "general",
"text": "Absolute Path Traversal",
"title": "CWE-36"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"title": "Kwetsbaarheden verholpen in Microsoft Developer Tools",
"tracking": {
"current_release_date": "2026-05-12T17:53:17.575333Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2026-0143",
"initial_release_date": "2026-05-12T17:53:17.575333Z",
"revision_history": [
{
"date": "2026-05-12T17:53:17.575333Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": ".NET 10.0 installed on Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": ".NET 10.0 installed on Mac OS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-3"
}
}
],
"category": "product_name",
"name": ".NET 8.0 installed on Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-4"
}
}
],
"category": "product_name",
"name": ".NET 8.0 installed on Mac OS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-5"
}
}
],
"category": "product_name",
"name": ".NET 8.0 installed on Windows"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-6"
}
}
],
"category": "product_name",
"name": ".NET 9.0 installed on Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-7"
}
}
],
"category": "product_name",
"name": ".NET 9.0 installed on Mac OS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-8"
}
}
],
"category": "product_name",
"name": ".NET 9.0 installed on Windows"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-9"
}
}
],
"category": "product_name",
"name": "Azure"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-10"
}
}
],
"category": "product_name",
"name": "Azure DevOps"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-11"
}
}
],
"category": "product_name",
"name": "Microsoft Data Formulator"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-12"
}
}
],
"category": "product_name",
"name": "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-13"
}
}
],
"category": "product_name",
"name": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-14"
}
}
],
"category": "product_name",
"name": "Microsoft Visual Studio 2022 version 17.12"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-15"
}
}
],
"category": "product_name",
"name": "Microsoft Visual Studio 2022 version 17.14"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-16"
}
}
],
"category": "product_name",
"name": "Microsoft Visual Studio 2026 version 18.5"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-17"
}
}
],
"category": "product_name",
"name": "Visual Studio Code"
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-32177",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "description",
"text": "A heap-based buffer overflow vulnerability in the .NET framework allows an unauthorized local attacker to elevate privileges by exploiting memory corruption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-32177 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-32177.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2026-32177"
},
{
"cve": "CVE-2026-35433",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "description",
"text": "Improper input validation in the .NET framework allows unauthorized local users to escalate privileges, potentially compromising system security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-35433 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-35433.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2026-35433"
},
{
"cve": "CVE-2026-32175",
"cwe": {
"id": "CWE-36",
"name": "Absolute Path Traversal"
},
"notes": [
{
"category": "other",
"text": "Absolute Path Traversal",
"title": "CWE-36"
},
{
"category": "description",
"text": "A tampering vulnerability in .NET Core allows attackers to write arbitrary files and directories to certain system locations via specially crafted files, fixed by a security update ensuring proper file handling.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-32175 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-32175.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2026-32175"
},
{
"cve": "CVE-2026-42899",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "description",
"text": "An infinite loop vulnerability in ASP.NET Core allows unauthorized attackers to cause denial of service over a network by exploiting a loop with an unreachable exit condition.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-42899 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42899.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2026-42899"
},
{
"cve": "CVE-2026-41094",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "description",
"text": "An improper control of code generation vulnerability in Microsoft Data Formulator allows unauthorized remote code execution by attackers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-41094 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41094.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2026-41094"
},
{
"cve": "CVE-2026-41109",
"notes": [
{
"category": "description",
"text": "Improper neutralization of special elements in output within GitHub Copilot and Visual Studio allows unauthorized attackers to bypass security features over a network.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-41109 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41109.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2026-41109"
},
{
"cve": "CVE-2026-41610",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
},
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "Visual Studio Code contains a vulnerability where improper input neutralization during web page generation allows a local unauthorized attacker to bypass security features via cross-site scripting.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-41610 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41610.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2026-41610"
},
{
"cve": "CVE-2026-41611",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "other",
"text": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
"title": "CWE-80"
},
{
"category": "description",
"text": "An XSS vulnerability in Visual Studio Code caused by improper neutralization of script-related HTML tags enables unauthorized local code execution.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-41611 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41611.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2026-41611"
},
{
"cve": "CVE-2026-41612",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "description",
"text": "A relative path traversal vulnerability in Visual Studio Code allows unauthorized local information disclosure by enabling access to files outside the intended directory scope.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-41612 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41612.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2026-41612"
},
{
"cve": "CVE-2026-41613",
"cwe": {
"id": "CWE-384",
"name": "Session Fixation"
},
"notes": [
{
"category": "other",
"text": "Session Fixation",
"title": "CWE-384"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "description",
"text": "A session fixation vulnerability in Visual Studio Code enables unauthorized attackers to elevate privileges over a network, potentially compromising user sessions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-41613 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41613.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2026-41613"
},
{
"cve": "CVE-2026-42826",
"notes": [
{
"category": "description",
"text": "A vulnerability in Azure DevOps allows unauthorized actors to access and disclose sensitive information over a network, posing a significant security risk.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-42826 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-42826.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2026-42826"
}
]
}
MSRC_CVE-2026-32175
Vulnerability from csaf_microsoft - Published: 2026-05-12 07:00 - Updated: 2026-05-12 07:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) 15.9.80
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
|
15.9.80 | ||
|
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) 16.11.56
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
|
16.11.56 | ||
|
.NET 8.0 installed on Windows 8.0.27
.NET 8.0 installed on Windows
|
8.0.27 | ||
|
.NET 9.0 installed on Windows 9.0.16
.NET 9.0 installed on Windows
|
9.0.16 | ||
|
Microsoft Visual Studio 2022 version 17.12 17.12.20
Microsoft Visual Studio 2022 version 17.12
|
17.12.20 | ||
|
Microsoft Visual Studio 2022 version 17.14 17.14.31
Microsoft Visual Studio 2022 version 17.14
|
17.14.31 | ||
|
.NET 10.0 installed on Windows 10.0.8
.NET 10.0 installed on Windows
|
10.0.8 | ||
|
Microsoft Visual Studio 2026 version 18.5 18.5.3
Microsoft Visual Studio 2026 version 18.5
|
18.5.3 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Microsoft Visual Studio 2026 version 18.5 <18.5.3
Microsoft Visual Studio 2026 version 18.5
|
<18.5.3 |
Vendor Fix
fix
|
|
|
.NET 10.0 installed on Windows <10.0.8
.NET 10.0 installed on Windows
|
<10.0.8 |
Vendor Fix
fix
|
|
|
Microsoft Visual Studio 2022 version 17.14 <17.14.31
Microsoft Visual Studio 2022 version 17.14
|
<17.14.31 |
Vendor Fix
fix
|
|
|
Microsoft Visual Studio 2022 version 17.12 <17.12.20
Microsoft Visual Studio 2022 version 17.12
|
<17.12.20 |
Vendor Fix
fix
|
|
|
.NET 9.0 installed on Windows <9.0.16
.NET 9.0 installed on Windows
|
<9.0.16 |
Vendor Fix
fix
|
|
|
.NET 8.0 installed on Windows <8.0.27
.NET 8.0 installed on Windows
|
<8.0.27 |
Vendor Fix
fix
|
|
|
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) <16.11.56
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
|
<16.11.56 |
Vendor Fix
fix
|
|
|
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) <15.9.80
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
|
<15.9.80 |
Vendor Fix
fix
|
{
"document": {
"acknowledgments": [
{
"names": [
"Anonymous"
]
},
{
"names": [
"Radek Zikmund with Microsoft s.r.o."
]
}
],
"aggregate_severity": {
"namespace": "https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
},
{
"category": "general",
"text": "Required. The vulnerability documented by this CVE requires customer action to resolve.",
"title": "Customer Action"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2026-32175 .NET Core Tampering Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32175"
},
{
"category": "self",
"summary": "CVE-2026-32175 .NET Core Tampering Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/advisories/2026/msrc_cve-2026-32175.json"
},
{
"category": "external",
"summary": "Microsoft Exploitability Index",
"url": "https://www.microsoft.com/en-us/msrc/exploitability-index?rtc=1"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": ".NET Core Tampering Vulnerability",
"tracking": {
"current_release_date": "2026-05-12T07:00:00.000Z",
"generator": {
"date": "2026-05-12T17:08:13.543Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2026-32175",
"initial_release_date": "2026-05-12T07:00:00.000Z",
"revision_history": [
{
"date": "2026-05-12T07:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.8",
"product": {
"name": ".NET 10.0 installed on Windows \u003c10.0.8",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "10.0.8",
"product": {
"name": ".NET 10.0 installed on Windows 10.0.8",
"product_id": "20837"
}
}
],
"category": "product_name",
"name": ".NET 10.0 installed on Windows"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.0.27",
"product": {
"name": ".NET 8.0 installed on Windows \u003c8.0.27",
"product_id": "6"
}
},
{
"category": "product_version",
"name": "8.0.27",
"product": {
"name": ".NET 8.0 installed on Windows 8.0.27",
"product_id": "12414"
}
}
],
"category": "product_name",
"name": ".NET 8.0 installed on Windows"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c9.0.16",
"product": {
"name": ".NET 9.0 installed on Windows \u003c9.0.16",
"product_id": "5"
}
},
{
"category": "product_version",
"name": "9.0.16",
"product": {
"name": ".NET 9.0 installed on Windows 9.0.16",
"product_id": "12434"
}
}
],
"category": "product_name",
"name": ".NET 9.0 installed on Windows"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c18.5.3",
"product": {
"name": "Microsoft Visual Studio 2026 version 18.5 \u003c18.5.3",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "18.5.3",
"product": {
"name": "Microsoft Visual Studio 2026 version 18.5 18.5.3",
"product_id": "21244"
}
}
],
"category": "product_name",
"name": "Microsoft Visual Studio 2026 version 18.5"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c17.14.31",
"product": {
"name": "Microsoft Visual Studio 2022 version 17.14 \u003c17.14.31",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "17.14.31",
"product": {
"name": "Microsoft Visual Studio 2022 version 17.14 17.14.31",
"product_id": "16767"
}
}
],
"category": "product_name",
"name": "Microsoft Visual Studio 2022 version 17.14"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c16.11.56",
"product": {
"name": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) \u003c16.11.56",
"product_id": "7"
}
},
{
"category": "product_version",
"name": "16.11.56",
"product": {
"name": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) 16.11.56",
"product_id": "11935"
}
}
],
"category": "product_name",
"name": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c15.9.80",
"product": {
"name": "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) \u003c15.9.80",
"product_id": "8"
}
},
{
"category": "product_version",
"name": "15.9.80",
"product": {
"name": "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) 15.9.80",
"product_id": "11600"
}
}
],
"category": "product_name",
"name": "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c17.12.20",
"product": {
"name": "Microsoft Visual Studio 2022 version 17.12 \u003c17.12.20",
"product_id": "4"
}
},
{
"category": "product_version",
"name": "17.12.20",
"product": {
"name": "Microsoft Visual Studio 2022 version 17.12 17.12.20",
"product_id": "12459"
}
}
],
"category": "product_name",
"name": "Microsoft Visual Studio 2022 version 17.12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-32175",
"cwe": {
"id": "CWE-36",
"name": "Absolute Path Traversal"
},
"notes": [
{
"category": "general",
"text": "Microsoft",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"11600",
"11935",
"12414",
"12434",
"12459",
"16767",
"20837",
"21244"
],
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-32175 .NET Core Tampering Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32175"
},
{
"category": "self",
"summary": "CVE-2026-32175 .NET Core Tampering Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/advisories/2026/msrc_cve-2026-32175.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-12T07:00:00.000Z",
"details": "10.0.8:Security Update:https://support.microsoft.com/help/5093446",
"product_ids": [
"2"
],
"url": "https://support.microsoft.com/help/5093446"
},
{
"category": "vendor_fix",
"date": "2026-05-12T07:00:00.000Z",
"details": "8.0.27:Security Update:https://support.microsoft.com/help/5093447",
"product_ids": [
"6"
],
"url": "https://support.microsoft.com/help/5093447"
},
{
"category": "vendor_fix",
"date": "2026-05-12T07:00:00.000Z",
"details": "9.0.16:Security Update:https://support.microsoft.com/help/5093448",
"product_ids": [
"5"
],
"url": "https://support.microsoft.com/help/5093448"
},
{
"category": "vendor_fix",
"date": "2026-05-12T07:00:00.000Z",
"details": "18.5.3:Security Update:https://learn.microsoft.com/en-us/visualstudio/releases/2026/release-notes",
"product_ids": [
"1"
],
"url": "https://learn.microsoft.com/en-us/visualstudio/releases/2026/release-notes"
},
{
"category": "vendor_fix",
"date": "2026-05-12T07:00:00.000Z",
"details": "17.14.31:Security Update:https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes",
"product_ids": [
"3"
],
"url": "https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes"
},
{
"category": "vendor_fix",
"date": "2026-05-12T07:00:00.000Z",
"details": "16.11.56:Security Update:https://learn.microsoft.com/en-us/visualstudio/releases/2019/release-notes",
"product_ids": [
"7"
],
"url": "https://learn.microsoft.com/en-us/visualstudio/releases/2019/release-notes"
},
{
"category": "vendor_fix",
"date": "2026-05-12T07:00:00.000Z",
"details": "15.9.80:Security Update:https://learn.microsoft.com/en-us/visualstudio/releases/2017/release-notes",
"product_ids": [
"8"
],
"url": "https://learn.microsoft.com/en-us/visualstudio/releases/2017/release-notes"
},
{
"category": "vendor_fix",
"date": "2026-05-12T07:00:00.000Z",
"details": "17.12.20:Security Update:https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes",
"product_ids": [
"4"
],
"url": "https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"exploitCodeMaturity": "UNPROVEN",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"remediationLevel": "OFFICIAL_FIX",
"reportConfidence": "CONFIRMED",
"scope": "UNCHANGED",
"temporalScore": 3.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Tampering"
},
{
"category": "exploit_status",
"details": "Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely"
}
],
"title": ".NET Core Tampering Vulnerability"
}
]
}
FKIE_CVE-2026-32175
Vulnerability from fkie_nvd - Published: 2026-05-12 18:16 - Updated: 2026-05-13 15:34| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A tampering vulnerability exists when .NET Core improperly handles specially crafted files. An attacker who successfully exploited this vulnerability could write arbitrary files and directories to certain locations on a vulnerable system. However, an attacker would have limited control over the destination of the files and directories.\nTo exploit the vulnerability, an attacker must send a specially crafted file to a vulnerable system.\nThe security update fixes the vulnerability by ensuring .NET Core properly handles files."
}
],
"id": "CVE-2026-32175",
"lastModified": "2026-05-13T15:34:52.573",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "secure@microsoft.com",
"type": "Primary"
}
]
},
"published": "2026-05-12T18:16:58.737",
"references": [
{
"source": "secure@microsoft.com",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32175"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-36"
}
],
"source": "secure@microsoft.com",
"type": "Primary"
}
]
}
CERTFR-2026-AVI-0585
Vulnerability from certfr_avis - Published: 2026-05-13 - Updated: 2026-05-13
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Windows Server 2012 R2 versions antérieures à 6.3.9600.23181 | ||
| Microsoft | N/A | Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.7291 | ||
| Microsoft | N/A | Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.7291 | ||
| Microsoft | N/A | Windows Admin Center in Azure Portal versions antérieures à 2.6.7 | ||
| Microsoft | N/A | Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.8390 | ||
| Microsoft | N/A | Windows Admin Center versions antérieures à 2.6.5.16 | ||
| Microsoft | N/A | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.7079 | ||
| Microsoft | N/A | Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.9140 | ||
| Microsoft | N/A | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.8755 | ||
| Microsoft | N/A | Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.7291 | ||
| Microsoft | N/A | Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.7291 | ||
| Microsoft | N/A | Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.9140 | ||
| Microsoft | N/A | Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.7291 | ||
| Microsoft | N/A | Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.7291 | ||
| Microsoft | N/A | Windows 11 Version 26H1 pour systèmes x64 versions antérieures à 10.0.28000.2113 | ||
| Microsoft | N/A | Windows Server 2016 versions antérieures à 10.0.14393.9140 | ||
| Microsoft | N/A | Windows Server 2019 versions antérieures à 10.0.17763.8755 | ||
| Microsoft | N/A | Windows 11 Version 25H2 pour systèmes ARM64 versions antérieures à 10.0.26200.8457 | ||
| Microsoft | N/A | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.7079 | ||
| Microsoft | N/A | Windows 11 Version 26H1 pour systèmes ARM64 versions antérieures à 10.0.28000.2113 | ||
| Microsoft | N/A | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.5139 | ||
| Microsoft | N/A | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.2330 | ||
| Microsoft | N/A | Windows Server 2022 versions antérieures à 10.0.20348.5139 | ||
| Microsoft | N/A | Windows Server 2025 versions antérieures à 10.0.26100.32860 | ||
| Microsoft | N/A | Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.8755 | ||
| Microsoft | N/A | Windows 11 Version 25H2 pour systèmes x64 versions antérieures à 10.0.26200.8457 | ||
| Microsoft | N/A | Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.8755 | ||
| Microsoft | N/A | Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.8390 | ||
| Microsoft | N/A | Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.32860 | ||
| Microsoft | N/A | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.9140 | ||
| Microsoft | N/A | Windows Server 2012 versions antérieures à 6.2.9200.26079 | ||
| Microsoft | N/A | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.23181 | ||
| Microsoft | N/A | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.26079 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.23181",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.7291",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.7291",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Admin Center in Azure Portal versions ant\u00e9rieures \u00e0 2.6.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.8390",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Admin Center versions ant\u00e9rieures \u00e0 2.6.5.16",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.7079",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.9140",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.8755",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.7291",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.7291",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.9140",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.7291",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.7291",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 26H1 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.28000.2113",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.9140",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.8755",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 25H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26200.8457",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.7079",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 26H1 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.28000.2113",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.5139",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.2330",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.5139",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.32860",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.8755",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 25H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26200.8457",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.8755",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.8390",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.32860",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.9140",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.26079",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.23181",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.26079",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-34342",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34342"
},
{
"name": "CVE-2026-32209",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32209"
},
{
"name": "CVE-2026-40397",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40397"
},
{
"name": "CVE-2026-35419",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35419"
},
{
"name": "CVE-2026-41089",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41089"
},
{
"name": "CVE-2026-40401",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40401"
},
{
"name": "CVE-2026-35438",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35438"
},
{
"name": "CVE-2026-40377",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40377"
},
{
"name": "CVE-2026-40380",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40380"
},
{
"name": "CVE-2026-40402",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40402"
},
{
"name": "CVE-2026-34345",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34345"
},
{
"name": "CVE-2026-33837",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33837"
},
{
"name": "CVE-2026-32175",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32175"
},
{
"name": "CVE-2026-40405",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40405"
},
{
"name": "CVE-2026-34338",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34338"
},
{
"name": "CVE-2026-34331",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34331"
},
{
"name": "CVE-2026-34343",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34343"
},
{
"name": "CVE-2026-40369",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40369"
},
{
"name": "CVE-2026-35420",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35420"
},
{
"name": "CVE-2026-34337",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34337"
},
{
"name": "CVE-2026-35433",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35433"
},
{
"name": "CVE-2026-32170",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32170"
},
{
"name": "CVE-2026-34341",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34341"
},
{
"name": "CVE-2026-34351",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34351"
},
{
"name": "CVE-2026-34340",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34340"
},
{
"name": "CVE-2026-34344",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34344"
},
{
"name": "CVE-2026-35424",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35424"
},
{
"name": "CVE-2026-34329",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34329"
},
{
"name": "CVE-2026-40382",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40382"
},
{
"name": "CVE-2026-40408",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40408"
},
{
"name": "CVE-2026-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-42896"
},
{
"name": "CVE-2026-35422",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35422"
},
{
"name": "CVE-2026-40415",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40415"
},
{
"name": "CVE-2026-35418",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35418"
},
{
"name": "CVE-2026-35423",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35423"
},
{
"name": "CVE-2026-42899",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-42899"
},
{
"name": "CVE-2026-41097",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41097"
},
{
"name": "CVE-2026-35417",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35417"
},
{
"name": "CVE-2026-41086",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41086"
},
{
"name": "CVE-2026-34330",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34330"
},
{
"name": "CVE-2026-32177",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32177"
},
{
"name": "CVE-2026-40407",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40407"
},
{
"name": "CVE-2026-32161",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32161"
},
{
"name": "CVE-2026-34334",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34334"
},
{
"name": "CVE-2026-33834",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33834"
},
{
"name": "CVE-2026-34332",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34332"
},
{
"name": "CVE-2026-40413",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40413"
},
{
"name": "CVE-2026-41096",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41096"
},
{
"name": "CVE-2025-54518",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54518"
},
{
"name": "CVE-2026-34333",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34333"
},
{
"name": "CVE-2026-21530",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21530"
},
{
"name": "CVE-2026-33838",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33838"
},
{
"name": "CVE-2026-34347",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34347"
},
{
"name": "CVE-2026-34339",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34339"
},
{
"name": "CVE-2026-42825",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-42825"
},
{
"name": "CVE-2026-40398",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40398"
},
{
"name": "CVE-2026-35415",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35415"
},
{
"name": "CVE-2026-33840",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33840"
},
{
"name": "CVE-2026-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41088"
},
{
"name": "CVE-2026-40410",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40410"
},
{
"name": "CVE-2026-35421",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35421"
},
{
"name": "CVE-2026-40406",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40406"
},
{
"name": "CVE-2026-33841",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33841"
},
{
"name": "CVE-2026-33835",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33835"
},
{
"name": "CVE-2026-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40403"
},
{
"name": "CVE-2026-40399",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40399"
},
{
"name": "CVE-2026-34350",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34350"
},
{
"name": "CVE-2026-40414",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40414"
},
{
"name": "CVE-2026-41095",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41095"
},
{
"name": "CVE-2026-33839",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33839"
},
{
"name": "CVE-2026-35416",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35416"
},
{
"name": "CVE-2026-34336",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34336"
}
],
"initial_release_date": "2026-05-13T00:00:00",
"last_revision_date": "2026-05-13T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0585",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-05-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-40407",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40407"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-35418",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35418"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-34345",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34345"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-32209",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32209"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-35422",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35422"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-34330",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34330"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-32170",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32170"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-34350",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34350"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-40401",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40401"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-35415",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35415"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-40415",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40415"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-40397",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40397"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-34333",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34333"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-40406",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40406"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-34339",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34339"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-34334",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34334"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-41088",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41088"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-35419",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35419"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-34332",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34332"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-34351",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34351"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-34329",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34329"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-42896",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42896"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54518",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54518"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-40398",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40398"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-35438",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35438"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-35421",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35421"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-33834",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33834"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-35416",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35416"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-41086",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41086"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-40382",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40382"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-40410",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40410"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-35433",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35433"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-34338",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34338"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-34342",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34342"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-32177",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32177"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-35420",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35420"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-33838",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33838"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-41089",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41089"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-33840",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33840"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-40408",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40408"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-35423",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35423"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-32161",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32161"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-34343",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34343"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-40402",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40402"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-34336",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34336"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-35424",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35424"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-40405",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40405"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-42899",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42899"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-40377",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40377"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-33835",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33835"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-40399",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40399"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-34337",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34337"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-40380",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40380"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-35417",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35417"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-34340",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34340"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-40414",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40414"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-33839",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33839"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-41095",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41095"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-41097",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41097"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-34331",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34331"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-32175",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32175"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-33841",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33841"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-40369",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40369"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-40403",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40403"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-41096",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41096"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-34347",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34347"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-40413",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40413"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-42825",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42825"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-33837",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33837"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-34341",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34341"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-34344",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34344"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-21530",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21530"
}
]
}
CERTFR-2026-AVI-0588
Vulnerability from certfr_avis - Published: 2026-05-13 - Updated: 2026-05-13
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Microsoft SQL Server 2017 pour systèmes x64 (GDR) versions antérieures à 14.0.2110.2 | ||
| Microsoft | N/A | Microsoft Visual Studio 2017 version 15.9 (inclus 15.0 - 15.8) antérieures à 15.9.80 | ||
| Microsoft | N/A | Microsoft SharePoint Enterprise Server 2016 versions antérieures à 16.0.5552.1002 | ||
| Microsoft | N/A | Microsoft Dynamics 365 Business Central Release Wave 2 2025 versions antérieures à 27.6 | ||
| Microsoft | N/A | Microsoft Dynamics 365 Business Central Release Wave 1 2025 versions antérieures à 26.12 | ||
| Microsoft | N/A | Microsoft JIRA SAML SSO plugin versions antérieures à 1.3.3 | ||
| Microsoft | N/A | Microsoft Visual Studio 2026 version 18.5 antérieures à 18.5.3 | ||
| Microsoft | N/A | Microsoft SQL Server 2022 pour systèmes x64 (GDR) versions antérieures à 16.0.1180.1 | ||
| Microsoft | N/A | Microsoft SharePoint Server 2019 versions antérieures à 16.0.10417.20128 | ||
| Microsoft | N/A | M365 Copilot pour Desktop versions antérieures à 19.2604.43111.0 | ||
| Microsoft | N/A | Microsoft SQL Server 2022 pour systèmes x64 (CU 24) versions antérieures à 16.0.4252.3 | ||
| Microsoft | N/A | Microsoft SQL Server 2019 pour systèmes x64 (CU 32) versions antérieures à 15.0.4470.1 | ||
| Microsoft | N/A | Microsoft Data Formulator versions antérieures à 0.7 | ||
| Microsoft | N/A | Microsoft SQL Server 2016 pour systèmes x64 Service Pack 3 (GDR) versions antérieures à 13.0.6490.1 | ||
| Microsoft | N/A | Microsoft Teams pour Android versions antérieures à 1.0.0.2026092103 | ||
| Microsoft | N/A | Microsoft SharePoint Server Subscription Edition versions antérieures à 16.0.19725.20280 | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.1 antérieures à 9.1.44.15 | ||
| Microsoft | N/A | Microsoft SQL Server 2025 pour systèmes x64 (CU4) versions antérieures à 17.0.4040.1 | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.11 (inclus 16.0 - 16.10) antérieures à 16.11.56 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.14 antérieures à 17.14.31 | ||
| Microsoft | N/A | Microsoft SQL Server 2019 pour systèmes x64 (GDR) versions antérieures à 15.0.2170.1 | ||
| Microsoft | N/A | Microsoft SQL Server 2016 pour systèmes x64 Service Pack 3 Azure Connect Feature Pack versions antérieures à 13.0.7085.1 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.12 antérieures à 17.12.20 | ||
| Microsoft | N/A | Microsoft SQL Server 2017 pour systèmes x64 (CU 31) versions antérieures à 14.0.3530.2 | ||
| Microsoft | N/A | Microsoft Confluence SAML SSO plugin versions antérieures à 7.4.0 | ||
| Microsoft | N/A | Visual Studio Code - Live Preview extension versions antérieures à 0.4.19 | ||
| Microsoft | N/A | Microsoft SQL Server 2025 pour systèmes x64 (GDR) versions antérieures à 17.0.1115.1 | ||
| Microsoft | N/A | Microsoft Dynamics 365 Business Central 2026 Release Wave 1 versions antérieures à 28.1 | ||
| Microsoft | N/A | Visual Studio Code versions antérieures à 1.119.1 | ||
| Microsoft | N/A | Microsoft Dynamics 365 Business Central 2024 Release Wave 2 versions antérieures à 25.18 | ||
| Microsoft | N/A | Power Automate pour Desktop versions antérieures à 2.67 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft SQL Server 2017 pour syst\u00e8mes x64 (GDR) versions ant\u00e9rieures \u00e0 14.0.2110.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2017 version 15.9 (inclus 15.0 - 15.8) ant\u00e9rieures \u00e0 15.9.80",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Enterprise Server 2016 versions ant\u00e9rieures \u00e0 16.0.5552.1002",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 Business Central Release Wave 2 2025 versions ant\u00e9rieures \u00e0 27.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 Business Central Release Wave 1 2025 versions ant\u00e9rieures \u00e0 26.12",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft JIRA SAML SSO plugin versions ant\u00e9rieures \u00e0 1.3.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2026 version 18.5 ant\u00e9rieures \u00e0 18.5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2022 pour syst\u00e8mes x64 (GDR) versions ant\u00e9rieures \u00e0 16.0.1180.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server 2019 versions ant\u00e9rieures \u00e0 16.0.10417.20128",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "M365 Copilot pour Desktop versions ant\u00e9rieures \u00e0 19.2604.43111.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2022 pour syst\u00e8mes x64 (CU 24) versions ant\u00e9rieures \u00e0 16.0.4252.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2019 pour syst\u00e8mes x64 (CU 32) versions ant\u00e9rieures \u00e0 15.0.4470.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Data Formulator versions ant\u00e9rieures \u00e0 0.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2016 pour syst\u00e8mes x64 Service Pack 3 (GDR) versions ant\u00e9rieures \u00e0 13.0.6490.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Teams pour Android versions ant\u00e9rieures \u00e0 1.0.0.2026092103",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server Subscription Edition versions ant\u00e9rieures \u00e0 16.0.19725.20280",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.1 ant\u00e9rieures \u00e0 9.1.44.15",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2025 pour syst\u00e8mes x64 (CU4) versions ant\u00e9rieures \u00e0 17.0.4040.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.11 (inclus 16.0 - 16.10) ant\u00e9rieures \u00e0 16.11.56",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.14 ant\u00e9rieures \u00e0 17.14.31",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2019 pour syst\u00e8mes x64 (GDR) versions ant\u00e9rieures \u00e0 15.0.2170.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2016 pour syst\u00e8mes x64 Service Pack 3 Azure Connect Feature Pack versions ant\u00e9rieures \u00e0 13.0.7085.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.12 ant\u00e9rieures \u00e0 17.12.20",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2017 pour syst\u00e8mes x64 (CU 31) versions ant\u00e9rieures \u00e0 14.0.3530.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Confluence SAML SSO plugin versions ant\u00e9rieures \u00e0 7.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Visual Studio Code - Live Preview extension versions ant\u00e9rieures \u00e0 0.4.19",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2025 pour syst\u00e8mes x64 (GDR) versions ant\u00e9rieures \u00e0 17.0.1115.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 Business Central 2026 Release Wave 1 versions ant\u00e9rieures \u00e0 28.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Visual Studio Code versions ant\u00e9rieures \u00e0 1.119.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 Business Central 2024 Release Wave 2 versions ant\u00e9rieures \u00e0 25.18",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Power Automate pour Desktop versions ant\u00e9rieures \u00e0 2.67",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-40417",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40417"
},
{
"name": "CVE-2026-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-42898"
},
{
"name": "CVE-2026-41612",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41612"
},
{
"name": "CVE-2026-40365",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40365"
},
{
"name": "CVE-2026-41614",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41614"
},
{
"name": "CVE-2026-41602",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41602"
},
{
"name": "CVE-2026-42833",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-42833"
},
{
"name": "CVE-2026-40368",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40368"
},
{
"name": "CVE-2026-32175",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32175"
},
{
"name": "CVE-2026-33110",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33110"
},
{
"name": "CVE-2026-41613",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41613"
},
{
"name": "CVE-2026-41094",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41094"
},
{
"name": "CVE-2026-6665",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6665"
},
{
"name": "CVE-2026-40357",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40357"
},
{
"name": "CVE-2026-41603",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41603"
},
{
"name": "CVE-2026-35439",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35439"
},
{
"name": "CVE-2026-40367",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40367"
},
{
"name": "CVE-2026-6667",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6667"
},
{
"name": "CVE-2026-6664",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6664"
},
{
"name": "CVE-2026-32177",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32177"
},
{
"name": "CVE-2026-40370",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40370"
},
{
"name": "CVE-2026-41636",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41636"
},
{
"name": "CVE-2026-41109",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41109"
},
{
"name": "CVE-2026-44656",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-44656"
},
{
"name": "CVE-2026-6666",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6666"
},
{
"name": "CVE-2026-41611",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41611"
},
{
"name": "CVE-2026-40374",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40374"
},
{
"name": "CVE-2026-41605",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41605"
},
{
"name": "CVE-2026-41103",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41103"
},
{
"name": "CVE-2026-33112",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33112"
},
{
"name": "CVE-2026-32185",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32185"
},
{
"name": "CVE-2026-45130",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-45130"
},
{
"name": "CVE-2025-48431",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48431"
},
{
"name": "CVE-2026-41610",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41610"
}
],
"initial_release_date": "2026-05-13T00:00:00",
"last_revision_date": "2026-05-13T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0588",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-05-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33110",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33110"
},
{
"published_at": "2026-05-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-6664",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6664"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-32185",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32185"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-41602",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41602"
},
{
"published_at": "2026-05-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-45130",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-45130"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-48431",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48431"
},
{
"published_at": "2026-05-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-6665",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6665"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-41103",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41103"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-35439",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35439"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-32177",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32177"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-41610",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41610"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-40417",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40417"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-42898",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42898"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-41614",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41614"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-41612",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41612"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-40374",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40374"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-41636",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41636"
},
{
"published_at": "2026-05-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-44656",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-44656"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-32175",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32175"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-40370",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40370"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-40368",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40368"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-41605",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41605"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-41611",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41611"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-41109",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41109"
},
{
"published_at": "2026-05-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-6667",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6667"
},
{
"published_at": "2026-05-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-6666",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-6666"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-40365",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40365"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33112",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33112"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-40357",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40357"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-41094",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41094"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-41603",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41603"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-42833",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42833"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-41613",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41613"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-40367",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40367"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.