Microsoft Microsoft Makers of the Windows Operating System and hundreds of products that run on it.

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Microsoft product.

RSS Feeds for Microsoft security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Microsoft products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Microsoft Sorted by Most Security Vulnerabilities since 2018

Microsoft Windows 104463 vulnerabilities

Microsoft Windows Server 20164261 vulnerabilities

Microsoft Windows Server 20194234 vulnerabilities

Microsoft Windows Server 20123214 vulnerabilities

Microsoft Windows Server 20082820 vulnerabilities

Microsoft Windows Server 20222541 vulnerabilities

Microsoft Windows 112278 vulnerabilities

Microsoft Windows 71810 vulnerabilities

Microsoft Windows 8.11712 vulnerabilities

Microsoft Windows Rt 8 11592 vulnerabilities

Microsoft Windows 10 15071452 vulnerabilities

Microsoft Windows 11 23h21394 vulnerabilities

Microsoft Windows 11 24h21072 vulnerabilities

Microsoft Windows Server 23h21039 vulnerabilities

Microsoft Windows Server 20251020 vulnerabilities

Microsoft Windows Server 2012 R21006 vulnerabilities

Microsoft Windows931 vulnerabilities

Microsoft Windows Server655 vulnerabilities

Microsoft Office589 vulnerabilities

Microsoft Internet Explorer (IE)528 vulnerabilities
Popular web browser for windows

Microsoft 365 Apps439 vulnerabilities

Microsoft Edge Browser410 vulnerabilities
Web Browser based on Chromium

Microsoft Sharepoint Server410 vulnerabilities

Microsoft Windows Vista382 vulnerabilities

Microsoft Windows XP326 vulnerabilities

Microsoft Windows 10 1803275 vulnerabilities

Microsoft Windows 10 1909271 vulnerabilities

Microsoft Windows Server 2003262 vulnerabilities

Microsoft Windows Server 2004244 vulnerabilities

Microsoft Windows Server 1903240 vulnerabilities

Microsoft Windows 11 25h2234 vulnerabilities

Microsoft Edge Chromium223 vulnerabilities

Microsoft Windows Server 1909223 vulnerabilities

Microsoft Windows Server 20h2205 vulnerabilities

Microsoft Excel187 vulnerabilities
Spreadsheet Software

Microsoft Office 2024173 vulnerabilities

Microsoft Office 2021167 vulnerabilities

Microsoft Windows 2003 Server162 vulnerabilities

Microsoft Office 2019161 vulnerabilities

Microsoft Office Macos 2024139 vulnerabilities

Microsoft Office Macos 2021137 vulnerabilities

Microsoft Office Online Server135 vulnerabilities

Microsoft Sql Server 2019133 vulnerabilities

Microsoft Exchange Server132 vulnerabilities

Microsoft Visual Studio 2019121 vulnerabilities

Microsoft Visual Studio 2022119 vulnerabilities

Microsoft Windows 2000112 vulnerabilities

Microsoft Sql Server 2022104 vulnerabilities

Microsoft Windows 11 2h2101 vulnerabilities

Microsoft Windows Server 1803101 vulnerabilities

Microsoft Word98 vulnerabilities

Microsoft SQL Server98 vulnerabilities
Database Server

Microsoft Dynamics 36595 vulnerabilities

Microsoft Windows 10 21h195 vulnerabilities

Microsoft Visual Studio 201793 vulnerabilities

Microsoft Sql Server 201792 vulnerabilities

Microsoft Sql Server 201690 vulnerabilities

Microsoft Office 365 Proplus87 vulnerabilities

Microsoft Visual Studio87 vulnerabilities
Developer IDE

Microsoft Outlook85 vulnerabilities

Microsoft Net80 vulnerabilities

Microsoft Excel 201671 vulnerabilities

Microsoft Windows 11 26h166 vulnerabilities

Microsoft Visual Studio Code63 vulnerabilities
VSCode Developer IDE

Microsoft Windows 861 vulnerabilities

Microsoft Windows Nt57 vulnerabilities

Microsoft Office Web Apps55 vulnerabilities

Microsoft Azure Site Recovery53 vulnerabilities

Microsoft Office 201647 vulnerabilities

Microsoft Windows Rt46 vulnerabilities

Microsoft Windows 10 170940 vulnerabilities

Microsoft Azure Devops Server40 vulnerabilities

Microsoft Powershell37 vulnerabilities

Microsoft 36 vulnerabilities

Microsoft Mysql36 vulnerabilities

Microsoft ASP.NET Core35 vulnerabilities

Microsoft .NET Core34 vulnerabilities

Microsoft Excel Viewer34 vulnerabilities

Microsoft Windows 10 170331 vulnerabilities

Microsoft Windows 10 200426 vulnerabilities

Microsoft Remote Desktop26 vulnerabilities

Microsoft Windows 10 190326 vulnerabilities

Microsoft Teams24 vulnerabilities

Microsoft Word 201623 vulnerabilities

Microsoft .NET Framework22 vulnerabilities

Microsoft Visio21 vulnerabilities

Recent Microsoft Security Advisories

Advisory Title Published
CVE-2026-39856 CVE-2026-39856 osslsigncode has an Out-of-Bounds Read via Unvalidated Section Bounds in PE Page Hash Calculation April 12, 2026
CVE-2026-39855 CVE-2026-39855 osslsigncode has an Integer Underflow in PE Page Hash Calculation Can Cause Out-of-Bounds Read April 12, 2026
CVE-2026-39853 CVE-2026-39853 osslsigncode has a Stack Buffer Overflow via Unbounded Digest Copy During Signature Verification April 12, 2026
CVE-2026-40226 CVE-2026-40226 April 12, 2026
CVE-2026-34757 CVE-2026-34757 LIBPNG has a yse-after-free in png_set_PLTE, png_set_tRNS and png_set_hIST leading to corrupted chunk data and potential heap information disclosure April 12, 2026
CVE-2026-35206 CVE-2026-35206 Helm Chart extraction output directory collapse via `Chart.yaml` name dot-segment April 12, 2026
CVE-2026-4878 CVE-2026-4878 Libcap: libcap: privilege escalation via toctou race condition in cap_set_file() April 11, 2026
CVE-2026-33810 CVE-2026-33810 Case-sensitive excludedSubtrees name constraints cause Auth Bypass in crypto/x509 April 11, 2026
CVE-2026-27140 CVE-2026-27140 Code execution vulnerability in SWIG code generation in cmd/go April 11, 2026
CVE-2026-27143 CVE-2026-27143 Missing bound checks can lead to memory corruption in safe Go in cmd/compile April 11, 2026

Known Exploited Microsoft Vulnerabilities

The following Microsoft vulnerabilities have recently been marked by CISA as Known to be Exploited by threat actors.

Title Description Added
Microsoft SharePoint Deserialization of Untrusted Data Vulnerability Microsoft SharePoint contains a deserialization of untrusted data vulnerability that allows an unauthorized attacker to execute code over a network.
CVE-2026-20963 Exploit Probability: 6.0%
March 18, 2026
Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability Microsoft Windows Video ActiveX Control contains a remote code execution vulnerability. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.
CVE-2008-0015 Exploit Probability: 80.6%
February 17, 2026
Microsoft Configuration Manager SQL Injection Vulnerability Microsoft Configuration Manager contains an SQL injection vulnerability. An unauthenticated attacker could exploit this vulnerability by sending specially crafted requests to the target environment which are processed in an unsafe manner enabling the attacker to execute commands on the server and/or underlying database.
CVE-2024-43468 Exploit Probability: 83.1%
February 12, 2026
Microsoft Windows Shell Protection Mechanism Failure Vulnerability Microsoft Windows Shell contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.
CVE-2026-21510 Exploit Probability: 3.5%
February 10, 2026
Microsoft Windows Type Confusion Vulnerability Microsoft Desktop Windows Manager contains a type confusion vulnerability that could allow an authorized attacker to elevate privileges locally.
CVE-2026-21519 Exploit Probability: 4.5%
February 10, 2026
Microsoft Windows Improper Privilege Management Vulnerability Microsoft Windows Remote Desktop Services contains an improper privilege management vulnerability that could allow an authorized attacker to elevate privileges locally.
CVE-2026-21533 Exploit Probability: 22.7%
February 10, 2026
Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability Microsoft Office Word contains a reliance on untrusted inputs in a security decision vulnerability that could allow an authorized attacker to elevate privileges locally.
CVE-2026-21514 Exploit Probability: 4.2%
February 10, 2026
Microsoft Internet Explorer Protection Mechanism Failure Vulnerability Microsoft Internet Explorer contains a protection mechanism failure vulnerability that could allow an unauthorized attacker to bypass a security feature over a network.
CVE-2026-21513 Exploit Probability: 28.0%
February 10, 2026
Microsoft Windows NULL Pointer Dereference Vulnerability Microsoft Windows Remote Access Connection Manager contains a NULL pointer dereference that could allow an unauthorized attacker to deny service locally.
CVE-2026-21525 Exploit Probability: 11.8%
February 10, 2026
Microsoft Office Security Feature Bypass Vulnerability Microsoft Office contains a security feature bypass vulnerability in which reliance on untrusted inputs in a security decision in Microsoft Office could allow an unauthorized attacker to bypass a security feature locally.
CVE-2026-21509 Exploit Probability: 7.5%
January 26, 2026
Microsoft Windows Information Disclosure Vulnerability Microsoft Windows Desktop Windows Manager contains an information disclosure vulnerability that allows an authorized attacker to disclose information locally.
CVE-2026-20805 Exploit Probability: 3.7%
January 13, 2026
Microsoft Office PowerPoint Code Injection Vulnerability Microsoft Office PowerPoint contains a code injection vulnerability that allows remote attackers to execute arbitrary code via a PowerPoint file with an OutlineTextRefAtom containing an invalid index value that triggers memory corruption.
CVE-2009-0556 Exploit Probability: 76.4%
January 7, 2026
Microsoft Windows Use After Free Vulnerability Microsoft Windows Cloud Files Mini Filter Driver contains a use after free vulnerability that can allow an authorized attacker to elevate privileges locally.
CVE-2025-62221 Exploit Probability: 3.2%
December 9, 2025
Microsoft Windows Race Condition Vulnerability Microsoft Windows Kernel contains a race condition vulnerability that allows a local attacker with low-level privileges to escalate privileges. Successful exploitation of this vulnerability could enable the attacker to gain SYSTEM-level access.
CVE-2025-62215 Exploit Probability: 2.4%
November 12, 2025
Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability Microsoft Windows Server Update Service (WSUS) contains a deserialization of untrusted data vulnerability that allows for remote code execution.
CVE-2025-59287 Exploit Probability: 75.7%
October 24, 2025
Microsoft Windows SMB Client Improper Access Control Vulnerability Microsoft Windows SMB Client contains an improper access control vulnerability that could allow for privilege escalation. An attacker could execute a specially crafted malicious script to coerce the victim machine to connect back to the attack system using SMB and authenticate.
CVE-2025-33073 Exploit Probability: 42.0%
October 20, 2025
Microsoft Windows Untrusted Pointer Dereference Vulnerability Microsoft Windows Agere Modem Driver contains an untrusted pointer dereference vulnerability that allows for privilege escalation. An attacker who successfully exploited this vulnerability could gain administrator privileges.
CVE-2025-24990 Exploit Probability: 3.9%
October 14, 2025
Microsoft Windows Improper Access Control Vulnerability Microsoft Windows contains an improper access control vulnerability in Windows Remote Access Connection Manager which could allow an authorized attacker to elevate privileges locally.
CVE-2025-59230 Exploit Probability: 3.7%
October 14, 2025
Microsoft Windows Privilege Escalation Vulnerability Microsoft Windows Common Log File System Driver contains a privilege escalation vulnerability that could allow a local, privileged attacker to bypass certain security mechanisms.
CVE-2021-43226 Exploit Probability: 8.4%
October 6, 2025
Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability Microsoft Internet Explorer contains an uninitialized memory corruption vulnerability that could allow for remote code execution. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.
CVE-2010-3962 Exploit Probability: 89.9%
October 6, 2025

Of the known exploited vulnerabilities above, 3 are in the top 1%, or the 99th percentile of the EPSS exploit probability rankings. 5 known exploited Microsoft vulnerabilities are in the top 5% (95th percentile or greater) of the EPSS exploit probability rankings.

Top 10 Riskiest Microsoft Vulnerabilities

Based on the current exploit probability, these Microsoft vulnerabilities are on CISA's Known Exploited vulnerabilities list (KEV) and are ranked by the current EPSS exploit probability.

Rank CVE EPSS Vulnerability
1 CVE-2019-0708 94.5% "BlueKeep" Microsoft Windows Remote Desktop Remote Code Execution Vulnerability
2 CVE-2019-0604 94.4% Microsoft SharePoint Remote Code Execution Vulnerability
3 CVE-2017-7269 94.4% Microsft Windows Server 2003 R2 IIS WEBDAV buffer overflow Remote Code Execution vulnerability (COVI
4 CVE-2020-0796 94.4% Microsoft SMBv3 Remote Code Execution Vulnerability
5 CVE-2020-0688 94.4% Microsoft Exchange Server Key Validation Vulnerability
6 CVE-2017-11882 94.4% Microsoft Office memory corruption vulnerability
7 CVE-2020-1472 94.4% NetLogon Privilege Escalation Vulnerability
8 CVE-2021-38647 94.4% Microsoft Azure Open Management Infrastructure (OMI) Remote Code Execution Vulnerability
9 CVE-2023-29357 94.4% Microsoft SharePoint Server Privilege Escalation Vulnerability
10 CVE-2021-40444 94.3% Microsoft Windows, Server (spec. IE) All Arbitrary Code Execution

By the Year

In 2026 there have been 1016 vulnerabilities in Microsoft with an average score of 7.2 out of ten. Last year, in 2025 Microsoft had 2727 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in Microsoft in 2026 could surpass last years number. However, the average CVE base score of the vulnerabilities in 2026 is greater by 0.11.




Year Vulnerabilities Average Score
2026 1016 7.21
2025 2727 7.10
2024 2181 7.30
2023 1695 7.22
2022 1389 7.43
2021 1152 7.43
2020 1253 7.20
2019 831 7.09
2018 661 7.03

It may take a day or so for new Microsoft vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Microsoft Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2026-33118 Apr 10, 2026
Apr 2026: Microsoft Edge (Chromium-based) Spoofing Vulnerability Microsoft Edge (Chromium-based) Spoofing Vulnerability
Edge Chromium
CVE-2026-33119 Apr 10, 2026
Apr 2026: Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability User interface (ui) misrepresentation of critical information in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.
Edge Browser
CVE-2026-40226 Apr 10, 2026
nspawn Escape-to-Host via Crafted Config File in systemd <260 In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file.
CVE-2026-35206 Apr 09, 2026
Helm <=3.20.1/4.1.3 Write to Wrong Dir on helm pull --untar Helm is a package manager for Charts for Kubernetes. In Helm versions <=3.20.1 and <=4.1.3, a specially crafted Chart will cause helm pull --untar [chart URL | repo/chartname] to write the Chart's contents to the immediate output directory (as defaulted to the current working directory; or as given by the --destination and --untardir flags), rather than the expected output directory suffixed by the chart's name. This vulnerability is fixed in 3.20.2 and 4.1.4.
CVE-2026-39856 Apr 09, 2026
OOBR in osslsigncode PE Page-Hash (pre2.13) osslsigncode is a tool that implements Authenticode signing and timestamping. Prior to 2.13, an out-of-bounds read vulnerability exists in osslsigncode version 2.12 and earlier in the PE page-hash computation code (pe_page_hash_calc()). When processing PE sections for page hashing, the function uses PointerToRawData and SizeOfRawData values from section headers without validating that the referenced region lies within the mapped file. An attacker can craft a PE file with section headers that point beyond the end of the file. When osslsigncode computes page hashes for such a file, it may attempt to hash data from an invalid memory region, causing an out-of-bounds read and potentially crashing the process. The vulnerability can be triggered while signing a malicious PE file with page hashing enabled (-ph), or while verifying a malicious signed PE file that already contains page hashes. Verification of an already signed file does not require the verifier to pass -ph. This vulnerability is fixed in 2.13.
CVE-2026-39855 Apr 09, 2026
osslsigncode PE page-hash integer underflow <2.13 osslsigncode is a tool that implements Authenticode signing and timestamping. Prior to 2.13, an integer underflow vulnerability exists in osslsigncode version 2.12 and earlier in the PE page-hash computation code (pe_page_hash_calc()). When page hash processing is performed on a PE file, the function subtracts hdrsize from pagesize without first validating that pagesize >= hdrsize. If a malicious PE file sets SizeOfHeaders (hdrsize) larger than SectionAlignment (pagesize), the subtraction underflows and produces a very large unsigned length. The code allocates a zero-filled buffer of pagesize bytes and then attempts to hash pagesize - hdrsize bytes from that buffer. After the underflow, this results in an out-of-bounds read from the heap and can crash the process. The vulnerability can be triggered while signing a malicious PE file with page hashing enabled (-ph), or while verifying a malicious signed PE file that already contains page hashes. Verification of an already signed file does not require the verifier to pass -ph. This vulnerability is fixed in 2.13.
CVE-2026-39853 Apr 09, 2026
osslsigncode <2.12 Stack Buffer Overflow in PKCS#7 Verif osslsigncode is a tool that implements Authenticode signing and timestamping. Prior to 2.12, A stack buffer overflow vulnerability exists in osslsigncode in several signature verification paths. During verification of a PKCS#7 signature, the code copies the digest value from a parsed SpcIndirectDataContent structure into a fixed-size stack buffer (mdbuf[EVP_MAX_MD_SIZE], 64 bytes) without validating that the source length fits within the destination buffer. This pattern is present in the verification handlers for PE, MSI, CAB, and script files. An attacker can craft a malicious signed file with an oversized digest field in SpcIndirectDataContent. When a user verifies such a file with osslsigncode verify, the unbounded memcpy can overflow the stack buffer and corrupt adjacent stack state. This vulnerability is fixed in 2.12.
CVE-2026-4878 Apr 09, 2026
libcap TOCTOU in cap_set_file() leads to privilege escalation A flaw was found in libcap. A local unprivileged user can exploit a Time-of-check-to-time-of-use (TOCTOU) race condition in the `cap_set_file()` function. This allows an attacker with write access to a parent directory to redirect file capability updates to an attacker-controlled file. By doing so, capabilities can be injected into or stripped from unintended executables, leading to privilege escalation.
CVE-2026-34757 Apr 09, 2026
libpng 1.0.9-1.6.56 offheap free read via PLTE/tRNS/HIST LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.0.9 to before 1.6.57, passing a pointer obtained from png_get_PLTE, png_get_tRNS, or png_get_hIST back into the corresponding setter on the same png_struct/png_info pair causes the setter to read from freed memory and copy its contents into the replacement buffer. The setter frees the internal buffer before copying from the caller-supplied pointer, which now dangles. The freed region may contain stale data (producing silently corrupted chunk metadata) or data from subsequent heap allocations (leaking unrelated heap contents into the chunk struct). This vulnerability is fixed in 1.6.57.
CVE-2026-40026 Apr 08, 2026
CVE-2026-40026: SleuthKit 4.14.0 ISO9660 OOB Read The Sleuth Kit through 4.14.0 contains an out-of-bounds read vulnerability in the ISO9660 filesystem parser where the parse_susp() function trusts len_id, len_des, and len_src fields from the disk image to memcpy data into a stack buffer without verifying that the source data falls within the parsed SUSP block. An attacker can craft a malicious ISO image that causes reads past the end of the SUSP data buffer, and a zero-length SUSP entry can trigger an infinite parsing loop.
CVE-2026-40025 Apr 08, 2026
SleuthKit 4.14.0 APFS keybag OOB Heap Read (Info Disclosure) The Sleuth Kit through 4.14.0 contains an out-of-bounds read vulnerability in the APFS filesystem keybag parser where the wrapped_key_parser class follows attacker-controlled length fields without bounds checking, causing heap reads past the allocated buffer. An attacker can craft a malicious APFS disk image that triggers information disclosure or crashes when processed by any Sleuth Kit tool that parses APFS volumes.
CVE-2026-40024 Apr 08, 2026
The Sleuth Kit <=4.14.0 tsk_recover Path Traversal Allows File Write The Sleuth Kit through 4.14.0 contains a path traversal vulnerability in tsk_recover that allows an attacker to write files to arbitrary locations outside the intended recovery directory via crafted filenames or directory paths with path traversal sequences in a filesystem image. An attacker can craft a malicious filesystem image with embedded /../ sequences in filenames that, when processed by tsk_recover, writes files outside the output directory, potentially achieving code execution by overwriting shell configuration or cron entries.
CVE-2026-5919 Apr 08, 2026
Google Chrome <147.0.7727.55: WebSocket Same-Origin Policy Bypass Insufficient validation of untrusted input in WebSockets in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to bypass same origin policy via a crafted HTML page. (Chromium security severity: Low)
CVE-2026-5918 Apr 08, 2026
Chrome Nav CVE-2026-5918: Cross-Origin Leak via Renderer <147.0.7727.55 Inappropriate implementation in Navigation in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)
CVE-2026-5915 Apr 08, 2026
Google Chrome WebML OOB on <147.0.7727.55 Insufficient validation of untrusted input in WebML in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Low)
CVE-2026-5914 Apr 08, 2026
Chrome <147.0.7727.55: CSS T. Confusion -> Heap Corrupt via Malicious Ext Type Confusion in CSS in Google Chrome prior to 147.0.7727.55 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: Low)
CVE-2026-5913 Apr 08, 2026
CVE-2026-5913: OOB Read in Blink (Chrome <147.0.7727.55) Out of bounds read in Blink in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Low)
CVE-2026-5912 Apr 08, 2026
Google Chrome WebRTC OOB Memory Write via Integer Overflow (CVE-2026-5912) Integer overflow in WebRTC in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Low)
CVE-2026-5911 Apr 08, 2026
Chrome CSP Bypass via ServiceWorkers (147.0.7727.55) Policy bypass in ServiceWorkers in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Low)
CVE-2026-5910 Apr 08, 2026
Chrome Integer Overflow in Media Component <147.0.7727.55 Integer overflow in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to potentially exploit heap corruption via a crafted video file. (Chromium security severity: Low)
CVE-2026-5909 Apr 08, 2026
Google Chrome Integer Overflow in Media <147.0.7727.55 (Remote Heap Corruption) Integer overflow in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to potentially exploit heap corruption via a crafted video file. (Chromium security severity: Low)
CVE-2026-5908 Apr 08, 2026
Integer Overflow in Google Chrome Media (prior to 147.0.7727.55) Integer overflow in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to potentially exploit heap corruption via a crafted video file. (Chromium security severity: Low)
CVE-2026-5907 Apr 08, 2026
Google Chrome <147.0.7727.55 Media OOB Read via crafted video file Insufficient data validation in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to perform an out of bounds memory read via a crafted video file. (Chromium security severity: Low)
CVE-2026-5906 Apr 08, 2026
Chrome Android <147.0.7727.55: Omnibox spoofing via crafted page Incorrect security UI in Omnibox in Google Chrome on Android prior to 147.0.7727.55 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Low)
CVE-2026-5903 Apr 08, 2026
Policy Bypass via IFrameSandbox in Chrome <147.0.7727.55 Policy bypass in IFrameSandbox in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)
CVE-2026-5904 Apr 08, 2026
Use-after-free in V8 before 147.0.7727.55 via malicious Chrome Extension Use after free in V8 in Google Chrome prior to 147.0.7727.55 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: Low)
CVE-2026-5905 Apr 08, 2026
Chrome Windows Prior 147.0.7727.55 Perms UI Bug Allows Domain Spoofing Incorrect security UI in Permissions in Google Chrome on Windows prior to 147.0.7727.55 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Low)
CVE-2026-5902 Apr 08, 2026
Google Chrome Android Race Condition in Media Metadata <147.0.7727.55 Race in Media in Google Chrome on Android prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to corrupt media stream metadata via a crafted HTML page. (Chromium security severity: Low)
CVE-2026-5900 Apr 08, 2026
Chrome policy bypass via crafted HTML pre-147.0.7727.55 Policy bypass in Downloads in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to bypass of multi-download protections via a crafted HTML page. (Chromium security severity: Low)
CVE-2026-5899 Apr 08, 2026
UXSS in Chrome <=147.0.7727.55 via History Navigation Insufficient policy enforcement in History Navigation in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who convinced a user to engage in specific UI gestures to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page. (Chromium security severity: Low)
CVE-2026-5901 Apr 08, 2026
Chrome (pre-147.0.7727.55) DevTools policy bypass via malicious extension Insufficient policy enforcement in DevTools in Google Chrome prior to 147.0.7727.55 allowed an attacker who convinced a user to install a malicious extension to bypass enterprise host restrictions for cookie modification via a crafted Chrome Extension. (Chromium security severity: Low)
CVE-2026-5896 Apr 08, 2026
Chrome Audio Policy Bypass <147.0.7727.55 via Crafted HTML Policy bypass in Audio in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass sandbox download restrictions via a crafted HTML page. (Chromium security severity: Low)
CVE-2026-5897 Apr 08, 2026
Chrome<147.0.7727.55 UI Spoofing via Download Page Incorrect security UI in Downloads in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
CVE-2026-5898 Apr 08, 2026
Chrome iOS <147.0.7727.55 UI Spoofing via Omnibox Incorrect security UI in Omnibox in Google Chrome on iOS prior to 147.0.7727.55 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
CVE-2026-5894 Apr 08, 2026
Google Chrome <147.0.7727.55: PDF Nav Bypass via crafted HTML Inappropriate implementation in PDF in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)
CVE-2026-5895 Apr 08, 2026
Google Chrome iOS 147.0.7727.55: Omnibox Spoofing via Incorrect Security UI Incorrect security UI in Omnibox in Google Chrome on iOS prior to 147.0.7727.55 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. (Chromium security severity: Low)
CVE-2026-5893 Apr 08, 2026
Heap Corruption via Race in V8 (Chrome <147.0.7727.55) Race in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
CVE-2026-5892 Apr 08, 2026
Chrome PWA Policy Bypass (before 147.0.7727.55) Insufficient policy enforcement in PWAs in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to install a PWA without user consent via a crafted HTML page. (Chromium security severity: Medium)
CVE-2026-5891 Apr 08, 2026
Google Chrome UI Spoofing via Renderer Compromise before 147.0.7727.55 Insufficient policy enforcement in browser UI in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
CVE-2026-5889 Apr 08, 2026
PDFium Crypto Brute-Force in Chrome <147.0.7727.55 Cryptographic Flaw in PDFium in Google Chrome prior to 147.0.7727.55 allowed an attacker to read potentially sensitive information from encrypted PDFs via a brute-force attack. (Chromium security severity: Medium)
CVE-2026-5890 Apr 08, 2026
Remote Memory Disclosure via Race in WebCodecs (Chrome <147.0.7727.55) Race in WebCodecs in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)
CVE-2026-5887 Apr 08, 2026
Google Chrome Downloads Bypass via Crafted HTML (<=147.0.7727.55) Insufficient validation of untrusted input in Downloads in Google Chrome on Windows prior to 147.0.7727.55 allowed a remote attacker to bypass download restrictions via a crafted HTML page. (Chromium security severity: Medium)
CVE-2026-5888 Apr 08, 2026
Uninitialized Use in Chrome WebCodecs <147 (Medium) Uninitialized Use in WebCodecs in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)
CVE-2026-5886 Apr 08, 2026
Chrome WebAudio OOB Read before 147.0.7727.55 on Mac Out of bounds read in WebAudio in Google Chrome on Mac prior to 147.0.7727.55 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)
CVE-2026-5885 Apr 08, 2026
CVE-2026-5885: WebML Reflected Input (Chrome <147.0.7727.55) Memory Leak Insufficient validation of untrusted input in WebML in Google Chrome on Windows prior to 147.0.7727.55 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)
CVE-2026-5884 Apr 08, 2026
Chrome Media: <147.0.7727.55 Remote Code Exec via Crafted HTML Insufficient validation of untrusted input in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)
CVE-2026-5883 Apr 08, 2026
Google Chrome <147.0.7727.55 UseAF in Media allows remote code exec Use after free in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)
CVE-2026-5881 Apr 08, 2026
Google Chrome <147.0.7727.55: Policy Bypass via LocalNetworkAccess Policy bypass in LocalNetworkAccess in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)
CVE-2026-5882 Apr 08, 2026
Chrome: UI Spoofing in Fullscreen <=147.0.7727.55 Incorrect security UI in Fullscreen in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
CVE-2026-5879 Apr 08, 2026
Chrome<147 ANGLE RCE via crafted HTML (Mac) Insufficient validation of untrusted input in ANGLE in Google Chrome on Mac prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.