Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2025-50157 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
Anonymous
|
|
| CVE-2025-50156 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
Anonymous
|
|
| CVE-2025-53726 |
Windows Push Notifications Apps
|
Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
anonymous
|
|
| CVE-2025-53725 |
Windows Push Notifications Apps
|
Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
Anonymous
|
|
| CVE-2025-53724 |
Windows Push Notifications Apps
|
Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
Anonymous
|
|
| CVE-2025-50155 |
Windows Push Notifications Apps
|
Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
Zhiniang Peng with HUST & R4nger with CyberKunLun
|
|
| CVE-2025-50168 |
Win32k
|
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
Hyeonjin Choi (@d4m0n_8) of Out Of Bounds with Trend Zero Day Initiative
|
|
| CVE-2025-53145 |
Microsoft Message Queuing (MSMQ)
|
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2025-53144 |
Microsoft Message Queuing (MSMQ)
|
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2025-53143 |
Microsoft Message Queuing (MSMQ)
|
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2025-50176 |
DirectX Graphics Kernel
|
DirectX Graphics Kernel Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
b2ahex
cyanbamboo |
|
| CVE-2025-50165 |
Windows Graphics Component
|
Windows Graphics Component Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No | ||
| CVE-2025-49751 |
Windows Hyper-V
|
Windows Hyper-V Denial of Service Vulnerability
CVSS vector: AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
|
|
| CVE-2025-50172 |
DirectX Graphics Kernel
|
DirectX Graphics Kernel Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
cyanbamboo and b2ahex
|
|
| CVE-2025-53772 |
Web Deploy
|
Web Deploy Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
Batuhan Er with HawkTrace
|
|
| CVE-2025-53716 |
Windows Local Security Authority Subsystem Service (LSASS)
|
Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
Anonymous
|
|
| CVE-2025-53154 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
|
|
| CVE-2025-53141 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
Marat Gayanov with Positive Technologies
|
|
| CVE-2025-53133 |
Windows PrintWorkflowUserSvc
|
Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
Jongseong Kim (nevul37) with Ajou University, and working at ENKI WhiteHat
Dongjun Kim (smlijun) with Ajou University, and working at ENKI WhiteHat Seongheun Hong (seongheunh) with Ajou University Pwnforr777 Hwiwon Lee (hwiwonl), SEC-agent team Taewoo (Tae_ω02) |
|
| CVE-2025-53140 |
Windows Kernel Transaction Manager
|
Windows Kernel Transaction Manager Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
Anonymous
|
|
| CVE-2025-53151 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
hazard
|
|
| CVE-2025-49761 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
Anonymous
|
|
| CVE-2025-53721 |
Windows Connected Devices Platform Service
|
Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No | ||
| CVE-2025-53718 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
|
|
| CVE-2025-53147 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
|
|
| CVE-2025-53137 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
|
|
| CVE-2025-50159 |
Remote Access Point-to-Point Protocol (PPP) EAP-TLS
|
Remote Access Point-to-Point Protocol (PPP) EAP-TLS Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
Hussein Aurbyae with Microsoft
|
|
| CVE-2025-50177 |
Microsoft Message Queuing (MSMQ)
|
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
Azure Yang with Kunlun Lab
|
|
| CVE-2025-53142 |
Microsoft Brokering File System
|
Microsoft Brokering File System Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
ChenJian with Sea Security Orca Team
hazard |
|
| CVE-2025-53152 |
Desktop Windows Manager
|
Desktop Windows Manager Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
Varun Goel
|
|
| CVE-2025-50153 |
Desktop Window Manager
|
Desktop Window Manager Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
Varun Goel
|
|
| CVE-2025-53722 |
Windows Remote Desktop Services
|
Windows Remote Desktop Services Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
Erik Egsgard with Field Effect
|
|
| CVE-2025-53788 |
Windows Subsystem for Linux (WSL2) Kernel
|
Windows Subsystem for Linux (WSL2) Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No | ||
| CVE-2025-50158 |
Windows NTFS
|
Windows NTFS Information Disclosure Vulnerability
CVSS vector: AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2025-08-12 | No |
Reported By
Anonymous
|
|
| CVE-2025-53134 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
|
|
| CVE-2025-50169 |
Windows SMB
|
Windows SMB Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
Anonymous
|
|
| CVE-2025-50167 |
Windows Hyper-V
|
Windows Hyper-V Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
Chen Le Qi (@cplearns2h4ck) of STAR Labs SG Pte. Ltd. (@starlabs_sg) with Trend Zero Day Initiative
|
|
| CVE-2025-49743 |
Windows Graphics Component
|
Windows Graphics Component Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
Anonymous
|
|
| CVE-2025-49762 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
|
|
| CVE-2025-53132 |
Win32k
|
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
goodbyeselene with Trend Zero Day Initiative
Anonymous |
|
| CVE-2025-53135 |
DirectX Graphics Kernel
|
DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
cyanbamboo and b2ahex
|
|
| CVE-2025-53789 |
Windows StateRepository API Server file
|
Windows StateRepository API Server file Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
R4nger with CyberKunLun & Zhiniang Peng with HUST
|
|
| CVE-2025-53778 |
Windows NTLM
|
Windows NTLM Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
|
|
| CVE-2025-50170 |
Windows Cloud Files Mini Filter Driver
|
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
|
|
| CVE-2025-53156 |
Windows Storage Port Driver
|
Windows Storage Port Driver Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
Anonymous
DEVCORE - Angelboy (@scwuaptx) from DEVCORE Research Team with Trend Zero Day Initiative |
|
| CVE-2025-53136 |
NT OS Kernel
|
NT OS Kernel Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
|
|
| CVE-2025-53723 |
Windows Hyper-V
|
Windows Hyper-V Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
Chen Le Qi (@cplearns2h4ck) of STAR Labs SG Pte. Ltd. (@starlabs_sg) with Trend Zero Day Initiative
pwnky |
|
| CVE-2025-50166 |
Windows Distributed Transaction Coordinator (MSDTC)
|
Windows Distributed Transaction Coordinator (MSDTC) Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
Anonymous
|
|
| CVE-2025-50173 |
Windows Installer
|
Windows Installer Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
|
|
| CVE-2025-53720 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-08-12 | No |
Reported By
Anonymous
|