Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2026-4897 |
Polkit: polkit
|
Polkit: polkit: denial of service via unbounded input processing through standard input
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
2026-04-02 | - | - | |
| CVE-2026-5201 |
Gdk-pixbuf: gdk-pixbuf
|
Gdk-pixbuf: gdk-pixbuf: denial of service via heap-based buffer overflow when processing a specially crafted jpeg image
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2026-04-02 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2026-32241 |
Flannel vulnerable to cross-node
|
Flannel vulnerable to cross-node remote code execution via extension backend BackendData injection
CVSS vector: AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
|
2026-03-29 | - | - | |
| CVE-2026-33936 |
python-ecdsa
|
python-ecdsa: Denial of Service via improper DER length validation in crafted private keys
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
|
2026-03-29 | - |
Reported By
|
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2026-33526 |
Squid vulnerable to
|
Squid vulnerable to Denial of Service in ICP Request handling
No CVSS vector published
|
2026-03-27 | - | - | |
| CVE-2026-32748 |
Squid has
|
Squid has Denial of Service in ICP Response handling
No CVSS vector published
|
2026-03-27 | - | - | |
| CVE-2026-4775 |
Libtiff: libtiff: arbitrary code execution or
|
Libtiff: libtiff: arbitrary code execution or denial of service via signed integer overflow in tiff file processing
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
2026-03-27 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2026-4426 |
Libarchive: libarchive
|
Libarchive: libarchive: denial of service via malformed iso file processing
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
|
2026-03-25 | - | - | |
| CVE-2026-4424 |
Libarchive: libarchive
|
Libarchive: libarchive: information disclosure via heap out-of-bounds read in rar archive processing
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
2026-03-25 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2026-30922 |
pyasn1 Vulnerable to
|
pyasn1 Vulnerable to Denial of Service via Unbounded Recursion
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2026-03-21 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2026-27135 |
nghttp2
|
nghttp2 Denial of service: Assertion failure due to the missing state validation
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2026-03-20 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2026-32191 |
Microsoft Bing Images
|
Microsoft Bing Images Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-19 | No |
Reported By
XBOW with XBOW
|
|
| CVE-2026-32194 |
Microsoft Bing Images
|
Microsoft Bing Images Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-19 | No |
Reported By
XBOW with XBOW
|
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2026-4111 |
Libarchive: infinite loop
|
Libarchive: infinite loop denial of service in rar5 decompression via archive_read_data() in libarchive
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2026-03-17 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2025-69652 |
GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an abort (SIGABRT) when processing a crafted ELF binary with malformed DWARF abbrev or debug information. Due to incomplete state cleanup in process_debug_info(), an invalid debug_info_p state may propagate into DWARF attribute parsing routines. When certain malformed attributes result in an unexpected data length of zero, byte_get_little_endian() triggers a fatal abort. No evidence of memory corruption or code execution was observed; the impact is limited to
|
GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an abort (SIGABRT) when processing a crafted ELF binary with malformed DWARF abbrev or debug information. Due to incomplete state cleanup in process_debug_info(), an invalid debug_info_p state may propagate into DWARF attribute parsing routines. When certain malformed attributes result in an unexpected data length of zero, byte_get_little_endian() triggers a fatal abort. No evidence of memory corruption or code execution was observed; the impact is limited to denial of service.
CVSS vector: AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2026-03-11 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2026-26123 |
Microsoft Authenticator
|
Microsoft Authenticator Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
|
|
| CVE-2026-24287 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
ChenJian with Sea Security Orca Team
|
|
| CVE-2026-24291 |
Windows Accessibility Infrastructure (ATBroker.exe)
|
Windows Accessibility Infrastructure (ATBroker.exe) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
James Forshaw with Google Project Zero
|
|
| CVE-2026-25177 |
Active Directory Domain Services
|
Active Directory Domain Services Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
Shai Laron with Semperis
|
|
| CVE-2026-25187 |
Winlogon
|
Winlogon Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
James Forshaw with Google Project Zero
|
|
| CVE-2026-25166 |
Windows System Image Manager Assessment and Deployment Kit (ADK)
|
Windows System Image Manager Assessment and Deployment Kit (ADK) Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
Tim Baker with dotSec
|
|
| CVE-2026-25168 |
Windows Graphics Component
|
Windows Graphics Component Denial of Service Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
0ccbbf129444eb66344ccafb92b00df4
|
|
| CVE-2026-24293 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
|
|
| CVE-2026-25165 |
Performance Counters for Windows
|
Performance Counters for Windows Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
|
|
| CVE-2026-25190 |
Windows GDI
|
Windows GDI Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No | - | |
| CVE-2026-26132 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No | - | |
| CVE-2026-24289 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
Anonymous working with TrendAI Zero Day Initiative
|
|
| CVE-2026-25170 |
Windows Hyper-V
|
Windows Hyper-V Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
hazard
|
|
| CVE-2026-25189 |
Windows DWM Core Library
|
Windows DWM Core Library Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
Varun Goel
|
|
| CVE-2026-24292 |
Windows Connected Devices Platform Service
|
Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No | ||
| CVE-2026-25171 |
Windows Authentication
|
Windows Authentication Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
Anonymous
|
|
| CVE-2026-25178 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
wisiyeon with JUSTWIN
|
|
| CVE-2026-24285 |
Win32k
|
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
Marcin Wiazowski working with TrendAI Zero Day Initiative
|
|
| CVE-2026-23669 |
RPC Runtime Library
|
RPC Runtime Library Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
Andrea Pierini with Semperis
|
|
| CVE-2026-25167 |
Microsoft Brokering File System
|
Microsoft Brokering File System Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
hazard
|
|
| CVE-2026-23667 |
Broadcast DVR
|
Broadcast DVR Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No | ||
| CVE-2026-25169 |
Windows Graphics Component
|
Windows Graphics Component Denial of Service Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
0ccbbf129444eb66344ccafb92b00df4
|
|
| CVE-2026-23668 |
Windows Graphics Component
|
Windows Graphics Component Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
Marcin Wiazowski working with TrendAI Zero Day Initiative
|
|
| CVE-2026-24296 |
Windows Device Association Service
|
Windows Device Association Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No | - | |
| CVE-2026-24295 |
Windows Device Association Service
|
Windows Device Association Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No | - | |
| CVE-2026-23671 |
Windows Bluetooth RFCOM Protocol Driver
|
Windows Bluetooth RFCOM Protocol Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
hazard
|
|
| CVE-2026-26128 |
Windows SMB Server
|
Windows SMB Server Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
Guillaume André with Synacktiv
|
|
| CVE-2026-24294 |
Windows SMB Server
|
Windows SMB Server Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
Guillaume André with Synacktiv
|
|
| CVE-2026-26141 |
Hybrid Worker Extension (Arc‑enabled Windows VMs)
|
Hybrid Worker Extension (Arc‑enabled Windows VMs) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
Michal Kamensky with Microsoft
|
|
| CVE-2026-24290 |
Windows Projected File System
|
Windows Projected File System Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
ChenJian with Sea Security Orca Team
|
|
| CVE-2026-25176 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
|
|
| CVE-2026-20967 |
System Center Operations Manager (SCOM)
|
System Center Operations Manager (SCOM) Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
|
|
| CVE-2026-25186 |
Windows Accessibility Infrastructure (ATBroker.exe)
|
Windows Accessibility Infrastructure (ATBroker.exe) Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
James Forshaw with Google Project Zero
|
|
| CVE-2026-26111 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
Microsoft
|
|
| CVE-2026-25173 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-03-10 | No |
Reported By
Anonymous
|