Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2026-32158 |
Windows Push Notifications
|
Windows Push Notifications Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Yun Cong with Microsoft
|
|
| CVE-2026-26172 |
Windows Push Notifications
|
Windows Push Notifications Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-26167 |
Windows Push Notifications
|
Windows Push Notifications Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
h4urek with secsys lab
|
|
| CVE-2026-27927 |
Windows Projected File System
|
Windows Projected File System Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
ChenJian with Sea Security Orca Team
|
|
| CVE-2026-20930 |
Windows Management Services
|
Windows Management Services Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-32150 |
Windows Function Discovery Service (fdwsd.dll)
|
Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-32093 |
Windows Function Discovery Service (fdwsd.dll)
|
Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-32086 |
Windows Function Discovery Service (fdwsd.dll)
|
Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-27926 |
Windows Cloud Files Mini Filter Driver
|
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Joe Desimone with Elastic Security
|
|
| CVE-2026-26173 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
|
|
| CVE-2026-26168 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Angelboy (@scwuaptx) with DEVCORE
Thanatos Tian & @2st___ of Diffract & Zhiniang Peng with HUST Frederica with Tencent Xuanwu Lab using the Atuin Automated Vulnerability Discovery System |
|
| CVE-2026-33104 |
Win32k
|
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Marcin Wiazowski working with TrendAI Zero Day Initiative
|
|
| CVE-2026-32091 |
Microsoft Brokering File System
|
Microsoft Brokering File System Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-25184 |
Applocker Filter Driver (applockerfltr.sys)
|
Applocker Filter Driver (applockerfltr.sys) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
|
|
| CVE-2026-32162 |
Windows COM
|
Windows COM Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Faiustov Denis with GMO Cybersecurity by Ierae, Inc.
Masahiro Kawada with GMO Cybersecurity by Ierae, Inc. |
|
| CVE-2026-26160 |
Remote Desktop Licensing Service
|
Remote Desktop Licensing Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Howard McGreehan with MSRC V&M
|
|
| CVE-2026-26159 |
Remote Desktop Licensing Service
|
Remote Desktop Licensing Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Howard McGreehan with MSRC V&M
|
|
| CVE-2026-32214 |
Universal Plug and Play (upnp.dll)
|
Universal Plug and Play (upnp.dll) Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-26183 |
Remote Access Management service/API (RPC server)
|
Remote Access Management service/API (RPC server) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
George Hughey with MSRC Vulnerabilities & Mitigations
|
|
| CVE-2026-27914 |
Microsoft Management Console
|
Microsoft Management Console Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
|
|
| CVE-2026-27910 |
Windows Installer
|
Windows Installer Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
JaGoTu with DCIT, a.s.
|
|
| CVE-2026-32181 |
Connected User Experiences and Telemetry Service
|
Connected User Experiences and Telemetry Service Denial of Service Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
h4urek with secsys lab
|
|
| CVE-2026-32149 |
Windows Hyper-V
|
Windows Hyper-V Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No | - | |
| CVE-2026-33826 |
Windows Active Directory
|
Windows Active Directory Remote Code Execution Vulnerability
CVSS vector: AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
|
|
| CVE-2026-26170 |
PowerShell
|
PowerShell Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-32151 |
Windows Shell
|
Windows Shell Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-32084 |
Windows Print Spooler
|
Windows Print Spooler Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
David Zhu with Microsoft
|
|
| CVE-2026-32079 |
Web Account Manager
|
Web Account Manager Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
David Zhu with Microsoft
|
|
| CVE-2026-32085 |
Remote Procedure Call
|
Remote Procedure Call Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
David Zhu with Microsoft
|
|
| CVE-2026-32081 |
Package Catalog
|
Package Catalog Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
David Zhu with Microsoft
|
|
| CVE-2026-27907 |
Windows Storage Spaces Controller
|
Windows Storage Spaces Controller Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Kang Minchae with Best of Best 14th Team JUSTWIN (Kim Dowon, Kang Minju, Kim Donggeon, Wi Siyeon, Yoon Junghyun)
|
|
| CVE-2026-26184 |
Windows Projected File System
|
Windows Projected File System Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
ChenJian with Sea Security Orca Team
|
|
| CVE-2026-26169 |
Windows Kernel Memory
|
Windows Kernel Memory Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Faiustov Denis with GMO Cybersecurity by Ierae, Inc.
Masahiro Kawada with GMO Cybersecurity by Ierae, Inc. |
|
| CVE-2026-26155 |
Microsoft Local Security Authority Subsystem Service
|
Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Howard McGreehan with MSRC V&M
|
|
| CVE-2026-32076 |
Windows Storage Spaces Controller
|
Windows Storage Spaces Controller Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Yoon Jung Hyun(Yuil Muil (@YuilMuil) / X)
|
|
| CVE-2026-27931 |
Windows GDI
|
Windows GDI Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
xina1i@psbc
|
|
| CVE-2026-27930 |
Windows GDI
|
Windows GDI Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
xina1i@psbc
|
|
| CVE-2026-26153 |
Windows Encrypted File System (EFS)
|
Windows Encrypted File System (EFS) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Hangyu Hua(@HBh25Y) with Shuffle Team and Hunan University
|
|
| CVE-2026-33096 |
HTTP.sys
|
HTTP.sys Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
WARP & MORSE teams at Microsoft
Milad Nasr (Anthropic) and Calif.io with Claude |
|
| CVE-2026-32223 |
Windows USB Printing Stack (usbprint.sys)
|
Windows USB Printing Stack (usbprint.sys) Elevation of Privilege Vulnerability
CVSS vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
hao huang with Fudan University secsys lab
Donghyeon Oh with Patchpoint Jonghoi Kim Jongseong Kim (nevul37) working with ENKI Whitehat Dongjun Kim (smiljun), working with ENKI WhiteHat Thanatos Tian & @2st__ with Diffract & Zhiniang Peng with HUST |
|
| CVE-2026-26180 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Jason Lin
|
|
| CVE-2026-26156 |
Windows Hyper-V
|
Windows Hyper-V Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
cyanbamboo and b2ahex
|
|
| CVE-2026-32221 |
Windows Graphics Component
|
Windows Graphics Component Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-32087 |
Windows Function Discovery Service (fdwsd.dll)
|
Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Anonymous
|
|
| CVE-2026-26176 |
Windows Client Side Caching driver (csc.sys)
|
Windows Client Side Caching driver (csc.sys) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
|
|
| CVE-2026-32195 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-14 | No |
Reported By
Jongseong Kim (nevul37), SEC-agent team
Hwiwon Lee (hwiwonl), SEC-agent team Gwanhyun Lee Dongjun Kim Anonymous 0rb1t with None Qanux with None |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2026-34757 |
LIBPNG has a yse-after-free in png_set_PLTE, png_set_tRNS and png_set_hIST leading to corrupted chunk data and potential heap
|
LIBPNG has a yse-after-free in png_set_PLTE, png_set_tRNS and png_set_hIST leading to corrupted chunk data and potential heap information disclosure
CVSS vector: AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
|
2026-04-12 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2026-35611 |
Addressable has a Regular Expression
|
Addressable has a Regular Expression Denial of Service in Addressable templates
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2026-04-11 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2026-32186 |
Microsoft Bing
|
Microsoft Bing Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-04-02 | No |
Reported By
Sriharsha Pallekonda with Microsoft
|
|
| CVE-2026-2436 |
Libsoup: libsoup
|
Libsoup: libsoup: denial of service via use-after-free in soupserver during tls handshake
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
|
2026-04-02 | - | - |