Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2025-33060 |
Windows Storage Management Provider
|
Windows Storage Management Provider Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
insu with Theori
|
|
| CVE-2025-33059 |
Windows Storage Management Provider
|
Windows Storage Management Provider Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
insu with Theori
|
|
| CVE-2025-33058 |
Windows Storage Management Provider
|
Windows Storage Management Provider Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
insu with Theori
|
|
| CVE-2025-33055 |
Windows Storage Management Provider
|
Windows Storage Management Provider Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
Mukyoung Kwak, Seongheun Hong, Jaeseok Bae, Ingyu Yang, Jiwon Jang, Seoyun Cho with Best of the Best 13th Team MSRC Gasan
|
|
| CVE-2025-32720 |
Windows Storage Management Provider
|
Windows Storage Management Provider Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
insu with Theori
|
|
| CVE-2025-32719 |
Windows Storage Management Provider
|
Windows Storage Management Provider Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
insu with Theori
|
|
| CVE-2025-24069 |
Windows Storage Management Provider
|
Windows Storage Management Provider Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
insu with Theori
nerty_nerty(Ingyu Yang), Mukyoung Kwak, Seongheun Hong, Jaeseok Bae, Jiwon Jang, Seoyun Cho with Best of the Best 13th Team MSRC Gasan Mukyoung Kwak, Seongheun Hong, Jaeseok Bae, Ingyu Yang, Jiwon Jang, Seoyun Cho with Best of the Best 13th Team MSRC Gasan |
|
| CVE-2025-24065 |
Windows Storage Management Provider
|
Windows Storage Management Provider Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
nerty_nerty(Ingyu Yang), Mukyoung Kwak, Seongheun Hong, Jaeseok Bae, Jiwon Jang, Seoyun Cho with Best of the Best 13th Team MSRC Gasan
Dan Reynolds with MSRC Vulnerabilities & Mitigations insu with Theori |
|
| CVE-2025-32716 |
Windows Media
|
Windows Media Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
Anonymous
|
|
| CVE-2025-32715 |
Remote Desktop Protocol Client
|
Remote Desktop Protocol Client Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
Fraunhofer FKIE CA&D
|
|
| CVE-2025-33066 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
Anonymous with Codesafe Team of Legendsec at QI-ANXIN Group
|
|
| CVE-2025-33064 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
Anonymous with Codesafe Team of Legendsec at QI-ANXIN Group
|
|
| CVE-2025-32713 |
Windows Common Log File System Driver
|
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-06-10 | No |
Reported By
Seunghoe Kim with S2W Inc.
|
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2025-47966 |
Power Automate
|
Power Automate Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-06-05 | No |
Reported By
Felix B.
|
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2023-37732 |
Yasm v1.3.0.78 was found prone to NULL Pointer Dereference in /libyasm/intnum.c and /elf/elf.c, which allows the attacker to cause a
|
Yasm v1.3.0.78 was found prone to NULL Pointer Dereference in /libyasm/intnum.c and /elf/elf.c, which allows the attacker to cause a denial of service via a crafted file.
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
|
2025-05-27 | - | - | |
| CVE-2025-2953 |
PyTorch torch.mkldnn_max_pool2d
|
PyTorch torch.mkldnn_max_pool2d denial of service
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
|
2025-05-27 | - | - | |
| CVE-2023-51258 |
A memory leak issue discovered in YASM v.1.3.0 allows a local attacker to cause a
|
A memory leak issue discovered in YASM v.1.3.0 allows a local attacker to cause a denial of service via the new_Token function in the modules/preprocs/nasm/nasm-pp:1512.
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
2025-05-27 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2022-25858 |
Regular Expression
|
Regular Expression Denial of Service (ReDoS)
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
|
2025-05-15 | - | - | |
| CVE-2024-39133 |
Heap Buffer Overflow vulnerability in zziplib v0.13.77 allows attackers to cause a
|
Heap Buffer Overflow vulnerability in zziplib v0.13.77 allows attackers to cause a denial of service via the __zzip_parse_root_directory() function at /zzip/zip.c.
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
|
2025-05-15 | - | - | |
| CVE-2024-39134 |
A Stack Buffer Overflow vulnerability in zziplibv 0.13.77 allows attackers to cause a
|
A Stack Buffer Overflow vulnerability in zziplibv 0.13.77 allows attackers to cause a denial of service via the __zzip_fetch_disk_trailer() function at /zzip/zip.c.
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2025-05-15 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2025-29829 |
Windows Trusted Runtime Interface Driver
|
Windows Trusted Runtime Interface Driver Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-05-13 | No |
Reported By
|
|
| CVE-2025-29959 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-05-13 | No |
Reported By
Anonymous with Codesafe Team of Legendsec at QI-ANXIN Group
|
|
| CVE-2025-29958 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-05-13 | No |
Reported By
Anonymous with Codesafe Team of Legendsec at QI-ANXIN Group
|
|
| CVE-2025-29830 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-05-13 | No |
Reported By
Anonymous with Codesafe Team of Legendsec at QI-ANXIN Group
|
|
| CVE-2025-27488 |
Microsoft Windows Hardware Lab Kit (HLK)
|
Microsoft Windows Hardware Lab Kit (HLK) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-05-13 | No |
Reported By
Microsoft
|
|
| CVE-2025-29837 |
Windows Installer
|
Windows Installer Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-05-13 | No |
Reported By
Simon Zuckerbraun of Trend Zero Day Initiative
|
|
| CVE-2025-29975 |
Microsoft PC Manager
|
Microsoft PC Manager Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-05-13 | No |
Reported By
Simon (@sim0nsecurity)
Anonymous working with Trend Zero Day Initiative |
|
| CVE-2025-30394 |
Windows Remote Desktop Gateway (RD Gateway)
|
Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2025-05-13 | No |
Reported By
Anonymous
bee13oy with Cyber Kunlun Lab ʌ!ɔ⊥ojv with Kunlun Lab SmallerDragon Anonymous working with Trend Zero Day Initiative |
|
| CVE-2025-29838 |
Windows ExecutionContext Driver
|
Windows ExecutionContext Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-05-13 | No | ||
| CVE-2025-29831 |
Windows Remote Desktop Services
|
Windows Remote Desktop Services Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-05-13 | No |
Reported By
ʌ!ɔ⊥ojv with Kunlun Lab
|
|
| CVE-2025-32701 |
Windows Common Log File System Driver
|
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
|
2025-05-13 | Yes |
Reported By
Microsoft Threat Intelligence Center
|
|
| CVE-2025-30385 |
Windows Common Log File System Driver
|
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-05-13 | No |
Reported By
George Hughey with MSRC Vulnerabilities & Mitigations
Dan Reynolds with MSRC Vulnerabilities & Mitigations |
|
| CVE-2025-32709 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-05-13 | Yes |
Reported By
Anonymous
|
|
| CVE-2025-30400 |
Microsoft DWM Core Library
|
Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
|
2025-05-13 | Yes |
Reported By
Microsoft Threat Intelligence Center
|
|
| CVE-2025-29970 |
Microsoft Brokering File System
|
Microsoft Brokering File System Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-05-13 | No |
Reported By
hazard
Maxime Villard, of M.O.R.S.E. |
|
| CVE-2025-26677 |
Windows Remote Desktop Gateway (RD Gateway)
|
Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2025-05-13 | No |
Reported By
|
|
| CVE-2025-29954 |
Windows Lightweight Directory Access Protocol (LDAP)
|
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2025-05-13 | No |
Reported By
|
|
| CVE-2025-29957 |
Windows Deployment Services
|
Windows Deployment Services Denial of Service Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2025-05-13 | No |
Reported By
R4nger & Zhiniang Peng
|
|
| CVE-2025-29833 |
Microsoft Virtual Machine Bus (VMBus)
|
Microsoft Virtual Machine Bus (VMBus) Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-05-13 | No |
Reported By
Chief Banana
|
|
| CVE-2025-29969 |
MS-EVEN RPC
|
MS-EVEN RPC Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-05-13 | No |
Reported By
Yarin Aharoni with SafeBreach
|
|
| CVE-2025-29841 |
Universal Print Management Service
|
Universal Print Management Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-05-13 | No |
Reported By
|
|
| CVE-2025-27468 |
Windows Kernel-Mode Driver
|
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-05-13 | No |
Reported By
Naceri with MSRC Vulnerabilities & Mitigations
|
|
| CVE-2025-30387 |
Document Intelligence Studio On-Prem
|
Document Intelligence Studio On-Prem Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-05-13 | No |
Reported By
|
|
| CVE-2025-29955 |
Windows Hyper-V
|
Windows Hyper-V Denial of Service Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2025-05-13 | No |
Reported By
MORSE with Microsoft
|
|
| CVE-2025-32706 |
Windows Common Log File System Driver
|
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
|
2025-05-13 | Yes |
Reported By
CrowdStrike Advanced Research Team
Benoit Sevens of Google Threat Intelligence Group |
|
| CVE-2025-29968 |
Active Directory Certificate Services (AD CS)
|
Active Directory Certificate Services (AD CS) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2025-05-13 | No |
Reported By
Anonymous
|
|
| CVE-2025-29974 |
Windows Kernel
|
Windows Kernel Information Disclosure Vulnerability
CVSS vector: AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-05-13 | No |
Reported By
Anonymous
|
|
| CVE-2025-29956 |
Windows SMB
|
Windows SMB Information Disclosure Vulnerability
CVSS vector: AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C
|
2025-05-13 | No |
Reported By
Genghis Karimov with Microsoft High Availability Storage Group
|
|
| CVE-2025-29961 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-05-13 | No |
Reported By
Anonymous with Codesafe Team of Legendsec at QI-ANXIN Group
|
|
| CVE-2025-29960 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2025-05-13 | No |
Reported By
Anonymous with Codesafe Team of Legendsec at QI-ANXIN Group
|