CVE Tracker
Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.
2,234
Total CVEs
1,589
CISA KEV
41
Known Exploits
8.8
Avg CVSS Score
Showing 20 of 536 CVEs matching "Microsoft"
Referenced in article: Microsoft March 2026 Patch Tuesday fixes 2 zero-days, 79 flaws
Referenced in article: Microsoft March 2026 Patch Tuesday fixes 2 zero-days, 79 flaws
Referenced in article: Microsoft March 2026 Patch Tuesday fixes 2 zero-days, 79 flaws
Referenced in article: Microsoft Patches 83 Vulnerabilities
Referenced in article: Microsoft Patches 83 Vulnerabilities
Referenced in article: Microsoft Patches 83 Vulnerabilities
Referenced in article: Microsoft Patches 83 Vulnerabilities
Referenced in article: Microsoft Patches 83 Vulnerabilities
Referenced in article: Microsoft Patch Tuesday, March 2026 Edition
Referenced in article: Microsoft Patch Tuesday, March 2026 Edition
Referenced in article: Microsoft Patch Tuesday, March 2026 Edition
Referenced in article: Microsoft Patch Tuesday, March 2026 Edition
Referenced in article: Microsoft Patch Tuesday, March 2026 Edition
Referenced in article: Microsoft Patch Tuesday, March 2026 Edition
Referenced in article: Microsoft Patch Tuesday, March 2026 Edition
Referenced in article: Microsoft Patch Tuesday, March 2026 Edition
Referenced in article: Microsoft Patch Tuesday, March 2026 Edition
Microsoft SharePoint contains a deserialization of untrusted data vulnerability that allows an unauthorized attacker to execute code over a network.
Google Chromium V8 contains an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
Microsoft Windows Video ActiveX Control contains a remote code execution vulnerability. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.