Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2025-49676 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-07-08 | No |
Reported By
Anonymous
|
|
| CVE-2025-49674 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-07-08 | No |
Reported By
Anonymous
|
|
| CVE-2025-49673 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-07-08 | No |
Reported By
Anonymous
|
|
| CVE-2025-49672 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-07-08 | No |
Reported By
Anonymous
|
|
| CVE-2025-49670 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-07-08 | No |
Reported By
Anonymous
|
|
| CVE-2025-49669 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-07-08 | No |
Reported By
Anonymous
|
|
| CVE-2025-49668 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-07-08 | No |
Reported By
Anonymous
|
|
| CVE-2025-49663 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-07-08 | No |
Reported By
Anonymous
|
|
| CVE-2025-49657 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-07-08 | No |
Reported By
Anonymous
|
|
| CVE-2025-48824 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-07-08 | No |
Reported By
Anonymous
|
|
| CVE-2025-47998 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-07-08 | No |
Reported By
Anonymous
|
|
| CVE-2025-49691 |
Windows Miracast Wireless Display
|
Windows Miracast Wireless Display Remote Code Execution Vulnerability
CVSS vector: AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-07-08 | No |
Reported By
Marin Duroyon
|
|
| CVE-2025-49744 |
Windows Graphics Component
|
Windows Graphics Component Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-07-08 | No | - | |
| CVE-2025-49732 |
Windows Graphics Component
|
Windows Graphics Component Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-07-08 | No |
Reported By
Marcin Wiazowski working with Trend Zero Day Initiative
|
|
| CVE-2025-49721 |
Windows Fast FAT File System Driver
|
Windows Fast FAT File System Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-07-08 | No |
Reported By
|
|
| CVE-2025-49727 |
Win32k
|
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-07-08 | No |
Reported By
Marcin Wiazowski with Trend Zero Day Initiative
|
|
| CVE-2025-47981 |
SPNEGO Extended Negotiation (NEGOEX) Security Mechanism
|
SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-07-08 | No |
Reported By
Yuki Chen
Anonymous |
|
| CVE-2025-48805 |
Microsoft MPEG-2 Video Extension
|
Microsoft MPEG-2 Video Extension Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-07-08 | No |
Reported By
Anonymous
|
|
| CVE-2025-47987 |
Credential Security Support Provider Protocol (CredSSP)
|
Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-07-08 | No |
Reported By
|
|
| CVE-2025-48810 |
Windows Secure Kernel Mode
|
Windows Secure Kernel Mode Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-07-08 | No |
Reported By
Windows Kernel, Virtualization & Silicon Team
|
|
| CVE-2025-48809 |
Windows Secure Kernel Mode
|
Windows Secure Kernel Mode Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-07-08 | No |
Reported By
Windows Kernel Virtualization & Security Team
|
|
| CVE-2025-26636 |
Windows Kernel
|
Windows Kernel Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-07-08 | No |
Reported By
Windows Kernel, Virtualization & Security Team
|
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2025-33070 |
Windows Netlogon
|
Windows Netlogon Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
Anonymous
|
|
| CVE-2025-33052 |
Windows DWM Core Library
|
Windows DWM Core Library Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
Microsoft Offensive Research & Security Engineering (MORSE) with Microsoft
|
|
| CVE-2025-33053 |
Internet Shortcut Files
|
Internet Shortcut Files Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
|
2025-06-10 | Yes |
Reported By
Alexandra Gofman and David Driker (Check Point Research)
|
|
| CVE-2025-33050 |
DHCP Server Service
|
DHCP Server Service Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
Anonymous
|
|
| CVE-2025-32725 |
DHCP Server Service
|
DHCP Server Service Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
bee13oy with Cyber Kunlun Lab
|
|
| CVE-2025-32721 |
Windows Recovery Driver
|
Windows Recovery Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
BochengXiang(@Crispr) with FDU
|
|
| CVE-2025-33075 |
Windows Installer
|
Windows Installer Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
Simon Zuckerbraun of Trend Zero Day Initiative
|
|
| CVE-2025-33057 |
Windows Local Security Authority (LSA)
|
Windows Local Security Authority (LSA) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
Anonymous
|
|
| CVE-2025-32710 |
Windows Remote Desktop Services
|
Windows Remote Desktop Services Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
ʌ!ɔ⊥ojv with Kunlun Lab
SmallerDragon |
|
| CVE-2025-33071 |
Windows KDC Proxy Service (KPSSVC)
|
Windows KDC Proxy Service (KPSSVC) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
|
|
| CVE-2025-32712 |
Win32k
|
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
Anonymous
|
|
| CVE-2025-29828 |
Windows Schannel
|
Windows Schannel Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
Anonymous
|
|
| CVE-2025-33068 |
Windows Standards-Based Storage Management Service
|
Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
|
|
| CVE-2025-32724 |
Windows Local Security Authority Subsystem Service (LSASS)
|
Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
|
|
| CVE-2025-32722 |
Windows Storage Port Driver
|
Windows Storage Port Driver Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
|
|
| CVE-2025-33073 |
Windows SMB Client
|
Windows SMB Client Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2025-06-10 | No |
Reported By
James Forshaw of Google Project Zero
RedTeam Pentesting GmbH Stefan Walter and Daniel Isern with SySS GmbH Ahamada M'Bamba (h1roki) Cameron Stish with GuidePoint Security Wilfried Bécard with Synacktiv Keisuke Hirata with CrowdStrike |
|
| CVE-2025-47962 |
Windows SDK
|
Windows SDK Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
whoisthatguy
Naor Hodorov Kolja Grassmann with Neodyme AG Ken Kitahara with LAC Co., Ltd. Robbie Corley Julian Härig |
|
| CVE-2025-33056 |
Windows Local Security Authority (LSA)
|
Windows Local Security Authority (LSA) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
Erik Egsgard with Field Effect
|
|
| CVE-2025-32714 |
Windows Installer
|
Windows Installer Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
Simon Zuckerbraun of Trend Zero Day Initiative
|
|
| CVE-2025-33067 |
Windows Task Scheduler
|
Windows Task Scheduler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
Alexander Pudwill
|
|
| CVE-2025-47955 |
Windows Remote Access Connection Manager
|
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
Sergey Bliznyuk with Positive Technologies
|
|
| CVE-2025-47969 |
Windows Virtualization-Based Security (VBS)
|
Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
Ceri Coburn with NetSPI
|
|
| CVE-2025-32718 |
Windows SMB Client
|
Windows SMB Client Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
Genghis Karimov with Microsoft High-Availability Storage Group
|
|
| CVE-2025-24068 |
Windows Storage Management Provider
|
Windows Storage Management Provider Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
nerty_nerty(Ingyu Yang), Mukyoung Kwak, Seongheun Hong, Jaeseok Bae, Jiwon Jang, Seoyun Cho with Best of the Best 13th Team MSRC Gasan
Dan Reynolds with MSRC Vulnerabilities & Mitigations insu with Theori |
|
| CVE-2025-33065 |
Windows Storage Management Provider
|
Windows Storage Management Provider Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
insu with Theori
|
|
| CVE-2025-33063 |
Windows Storage Management Provider
|
Windows Storage Management Provider Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
Anonymous
|
|
| CVE-2025-33062 |
Windows Storage Management Provider
|
Windows Storage Management Provider Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
insu with Theori
|
|
| CVE-2025-33061 |
Windows Storage Management Provider
|
Windows Storage Management Provider Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
insu with Theori
|