Heap-based buffer overflow in Microsoft Windows DNS allows an unauthorized attacker to execute code over a network.
Loading...
Loading...
Score 9.8 from GitHub Security Advisory (severity: CRITICAL) published 2026-05-12. NVD baseline CVSS 9.8; sources differ by 0.0.
Heap-based buffer overflow in Microsoft Windows DNS allows an unauthorized attacker to execute code over a network.
May 12, 2026
May 15, 2026
Security Update Guide - Microsoft Security Response Center. Patch available via Microsoft Security Update
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41096These vendors published their own advisory mentioning this CVE โ often with vendor-specific remediation steps + affected product lists not in NVD.
See which npm, PyPI, Go, and Maven packages are affected by CVE-2026-41096
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.