Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:* cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:* |
Tue, 12 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network. | |
| Title | Microsoft SharePoint Server Remote Code Execution Vulnerability | |
| First Time appeared |
Microsoft
Microsoft sharepoint Server Microsoft sharepoint Server 2016 Microsoft sharepoint Server 2019 |
|
| Weaknesses | CWE-502 | |
| CPEs | cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:subscription:*:*:* cpe:2.3:a:microsoft:sharepoint_server_2016:*:*:*:*:enterprise:*:*:* cpe:2.3:a:microsoft:sharepoint_server_2019:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microsoft
Microsoft sharepoint Server Microsoft sharepoint Server 2016 Microsoft sharepoint Server 2019 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2026-05-15T17:12:26.509Z
Reserved: 2026-04-02T19:21:11.805Z
Link: CVE-2026-35439
Updated: 2026-05-12T19:47:54.079Z
Status : Analyzed
Published: 2026-05-12T18:17:14.153
Modified: 2026-05-13T20:53:04.193
Link: CVE-2026-35439
No data.
OpenCVE Enrichment
Updated: 2026-05-12T21:00:12Z