Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2026-27917 |
Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys)
|
Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
|
|
| CVE-2026-32165 |
Windows User Interface Core
|
Windows User Interface Core Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-32156 |
Windows UPnP Device Host
|
Windows UPnP Device Host Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-32075 |
Windows UPnP Device Host
|
Windows UPnP Device Host Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-27925 |
Windows UPnP Device Host
|
Windows UPnP Device Host Information Disclosure Vulnerability
CVSS vector: AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-27916 |
Windows UPnP Device Host
|
Windows UPnP Device Host Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-27915 |
Windows UPnP Device Host
|
Windows UPnP Device Host Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-27908 |
Windows TDI Translation Driver (tdx.sys)
|
Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
|
|
| CVE-2026-32153 |
Windows Speech Runtime
|
Windows Speech Runtime Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-32089 |
Windows Speech Brokered Api
|
Windows Speech Brokered Api Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-26165 |
Windows Shell
|
Windows Shell Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-32224 |
Windows Server Update Service (WSUS)
|
Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-27909 |
Windows Search Service
|
Windows Search Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
|
|
| CVE-2026-32078 |
Windows Projected File System
|
Windows Projected File System Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
ChenJian with Sea Security Orca Team
|
|
| CVE-2026-33101 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Nafiez with NLab Security
|
|
| CVE-2026-33098 |
Windows Container Isolation FS Filter Driver
|
Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-32070 |
Windows Common Log File System Driver
|
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
|
|
| CVE-2026-33100 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous working with TrendAI Zero Day Initiative
|
|
| CVE-2026-33099 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous working with TrendAI Zero Day Initiative
|
|
| CVE-2026-32073 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous working with TrendAI Zero Day Initiative
|
|
| CVE-2026-27922 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
|
|
| CVE-2026-26182 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
|
|
| CVE-2026-26177 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
|
|
| CVE-2026-32157 |
Remote Desktop Client
|
Remote Desktop Client Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
pwn2addr
|
|
| CVE-2026-26181 |
Microsoft Brokering File System
|
Microsoft Brokering File System Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
hazard
|
|
| CVE-2026-32155 |
Desktop Window Manager
|
Desktop Window Manager Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Joe Desimone with Elastic Security
|
|
| CVE-2026-32154 |
Desktop Window Manager
|
Desktop Window Manager Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Joe Desimone with Elastic Security
|
|
| CVE-2026-32152 |
Desktop Window Manager
|
Desktop Window Manager Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Joe Desimone with Elastic Security
|
|
| CVE-2026-27924 |
Desktop Window Manager
|
Desktop Window Manager Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Varun Goel
|
|
| CVE-2026-27923 |
Desktop Window Manager
|
Desktop Window Manager Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Varun Goel
|
|
| CVE-2026-26166 |
Windows Shell
|
Windows Shell Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-32074 |
Windows Projected File System
|
Windows Projected File System Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
ChenJian with Sea Security Orca Team
|
|
| CVE-2026-32069 |
Windows Projected File System
|
Windows Projected File System Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
ChenJian with Sea Security Orca Team
|
|
| CVE-2026-26179 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
fastfail working with TrendAI Zero Day Initiative
|
|
| CVE-2026-26163 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Samer Karim with Microsoft Inc.
|
|
| CVE-2026-32219 |
Microsoft Brokering File System
|
Microsoft Brokering File System Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
hazard
|
|
| CVE-2026-27929 |
Windows LUA File Virtualization Filter Driver
|
Windows LUA File Virtualization Filter Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
|
|
| CVE-2026-32164 |
Windows User Interface Core
|
Windows User Interface Core Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-32163 |
Windows User Interface Core
|
Windows User Interface Core Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-27911 |
Windows User Interface Core
|
Windows User Interface Core Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-27921 |
Windows TDI Translation Driver (tdx.sys)
|
Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
|
|
| CVE-2026-33827 |
Windows TCP/IP
|
Windows TCP/IP Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
WARP & MORSE team at Microsoft
|
|
| CVE-2026-32090 |
Windows Speech Brokered Api
|
Windows Speech Brokered Api Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-32083 |
Windows Simple Search and Discovery Protocol (SSDP) Service
|
Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-32082 |
Windows Simple Search and Discovery Protocol (SSDP) Service
|
Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-32068 |
Windows Simple Search and Discovery Protocol (SSDP) Service
|
Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-27918 |
Windows Shell
|
Windows Shell Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
[h4urek](https://x.com/h4urek) with [secsys lab](https://security.fudan.edu.cn/)
|
|
| CVE-2026-26174 |
Windows Server Update Service (WSUS)
|
Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-32160 |
Windows Push Notifications
|
Windows Push Notifications Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Yun Cong with Microsoft
|
|
| CVE-2026-32159 |
Windows Push Notifications
|
Windows Push Notifications Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Yun Cong with Microsoft
|