| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2026-35428 | Azure Cloud Shell Spoofing Vulnerability | Microsoft | Azure Cloud Shell | Critical | 9.6 | 2026-05-07 20:58:58 | Deep Dive |
| CVE-2026-35435 | Azure AI Foundry Elevation of Privilege Vulnerability | Microsoft | Azure AI Foundry | High | 8.6 | 2026-05-07 20:58:56 | Deep Dive |
| CVE-2026-34327 | Microsoft Partner Center Spoofing Vulnerability | Microsoft | Microsoft Partner Center | High | 8.2 | 2026-05-07 20:58:54 | Deep Dive |
| CVE-2026-33844 | Azure Managed Instance for Apache Cassandra Remote Code Execution Vulnerability | Microsoft | Azure Managed Instance for Apache Cassandra | Critical | 9.0 | 2026-05-07 20:58:53 | Deep Dive |
| CVE-2026-33823 | Microsoft Team Events Portal Information Disclosure Vulnerability | Microsoft | Microsoft Teams | Critical | 9.6 | 2026-05-07 20:58:52 | Deep Dive |
| CVE-2026-32207 | Azure Machine Learning Notebook Spoofing Vulnerability | Microsoft | Azure Machine Learning | High | 8.8 | 2026-05-07 20:58:51 | Deep Dive |
| CVE-2026-33109 | Azure Managed Instance for Apache Cassandra Remote Code Execution Vulnerability | Microsoft | Azure Managed Instance for Apache Cassandra | Critical | 9.9 | 2026-05-07 20:58:49 | Deep Dive |
| CVE-2026-41105 | Azure Monitor Action Group Notification System Elevation of Privilege Vulnerability | Microsoft | Azure Monitor Action Group notification system | High | 8.1 | 2026-05-07 20:58:48 | Deep Dive |
| CVE-2026-33111 | Copilot Chat (Microsoft Edge) Information Disclosure Vulnerability | Microsoft | Copilot Chat (Microsoft Edge) | High | 7.5 | 2026-05-07 20:58:48 | Deep Dive |
| CVE-2026-26129 | M365 Copilot Information Disclosure Vulnerability | Microsoft | Microsoft 365 Copilot's Business Chat | High | 7.5 | 2026-05-07 20:58:24 | Deep Dive |
| CVE-2026-26164 | M365 Copilot Information Disclosure Vulnerability | Microsoft | Microsoft 365 Copilot's Business Chat | High | 7.5 | 2026-05-07 20:58:10 | Deep Dive |
| CVE-2026-42449 | n8n-MCP: IPv4-mapped IPv6 addresses bypass SSRF protection in validateUrlSync(), enabling full SSRF for SDK embedders | czlonkowski | n8n-mcp | High | 8.5 | 2026-05-07 20:46:29 | Deep Dive |
| CVE-2026-42047 | Inngest TypeScript SDK exposes environment variables via serve() handler on unhandled HTTP methods | inngest | inngest-js | High | 8.6 | 2026-05-07 20:38:36 | Deep Dive |
| CVE-2026-8098 | code-projects Feedback System checklogin.php sql injection | code-projects | Feedback System | High | 7.3 | 2026-05-07 20:30:16 | Deep Dive |
| CVE-2026-8097 | CodeAstro Online Classroom askquery.php sql injection | CodeAstro | Online Classroom | Medium | 6.3 | 2026-05-07 20:15:13 | Deep Dive |
| CVE-2026-41691 | i18next-http-backend has Path Traversal & URL Injection via Unsanitised lng/ns | i18next | i18next-http-backend | Medium | 6.5 | 2026-05-07 20:09:24 | Deep Dive |
| CVE-2026-41692 | i18nextify is vulnerable to DOM XSS via javascript:/data: URL schemes in translated href/src attributes | i18next | i18nextify | Medium | 4.7 | 2026-05-07 20:01:59 | Deep Dive |
| CVE-2026-8142 | CVE-2026-8142 | CERT/CC | VINCE | - | - | 2026-05-07 19:54:49 | Deep Dive |
| CVE-2026-42501 | Malicious module proxy can bypass checksum database in cmd/go | Go toolchain | cmd/go | - | - | 2026-05-07 19:41:20 | Deep Dive |
| CVE-2026-39823 | Bypass of meta content URL escaping causes XSS in html/template | Go standard library | html/template | - | - | 2026-05-07 19:41:20 | Deep Dive |