Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2026-21244 |
Windows Hyper-V
|
Windows Hyper-V Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-02-10 | No |
Reported By
cyanbamboo and b2ahex
|
|
| CVE-2026-21246 |
Windows Graphics Component
|
Windows Graphics Component Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-02-10 | No |
Reported By
lubinradar
|
|
| CVE-2026-21236 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-02-10 | No |
Reported By
JUSTWIN Team
|
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2026-0990 |
Libxml2: libxml2
|
Libxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2026-01-19 | - | - | |
| CVE-2026-0992 |
Libxml2: libxml2
|
Libxml2: libxml2: denial of service via crafted xml catalogs
CVSS vector: AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
|
2026-01-19 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2026-0897 |
Keras via Excessive Memory Allocation in HDF5 Metadata
|
Denial of Service in Keras via Excessive Memory Allocation in HDF5 Metadata
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2026-01-16 | - | - | |
| CVE-2026-20960 |
PowerApps Desktop Client
|
PowerApps Desktop Client Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-16 | No |
Reported By
Alasdair Gorniak and Tobias Diehl
|
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2026-20962 |
Dynamic Root of Trust for Measurement (DRTM)
|
Dynamic Root of Trust for Measurement (DRTM) Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Andrea Allievi
Hilal Asmat |
|
| CVE-2026-20860 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
|
|
| CVE-2026-20811 |
Win32k
|
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Daniil Romanovych
|
|
| CVE-2026-20935 |
Windows Virtualization-Based Security (VBS)
|
Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-01-13 | No | - | |
| CVE-2026-20819 |
Windows Virtualization-Based Security (VBS)
|
Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Microsoft Offensive Research and Security Engineering
|
|
| CVE-2026-20940 |
Windows Cloud Files Mini Filter Driver
|
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Vimal Sindh
|
|
| CVE-2026-20857 |
Windows Cloud Files Mini Filter Driver
|
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
haowei yan(jingdong dawnslab)
|
|
| CVE-2026-20931 |
Windows Telephony Service
|
Windows Telephony Service Elevation of Privilege Vulnerability
CVSS vector: AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Sergey Bliznyuk with Positive Technologies
|
|
| CVE-2026-20941 |
Host Process for Windows Tasks
|
Host Process for Windows Tasks Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Filip Dragović
Nacl |
|
| CVE-2026-20810 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
haowei yan(jingdong dawnslab)
|
|
| CVE-2026-20818 |
Windows Kernel
|
Windows Kernel Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Microsoft Offensive Research & Security Engineering
|
|
| CVE-2026-20875 |
Windows Local Security Authority Subsystem Service (LSASS)
|
Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Ziran Lin with Microsoft
|
|
| CVE-2026-20870 |
Windows Win32 Kernel Subsystem
|
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
|
|
| CVE-2026-20924 |
Windows Management Services
|
Windows Management Services Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Anonymous
|
|
| CVE-2026-20923 |
Windows Management Services
|
Windows Management Services Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Anonymous
|
|
| CVE-2026-20877 |
Windows Management Services
|
Windows Management Services Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Anonymous
|
|
| CVE-2026-20865 |
Windows Management Services
|
Windows Management Services Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Anonymous
|
|
| CVE-2026-20858 |
Windows Management Services
|
Windows Management Services Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:T/RC:C
|
2026-01-13 | No |
Reported By
Anonymous
|
|
| CVE-2026-20854 |
Windows Local Security Authority Subsystem Service (LSASS)
|
Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Howard McGreehan with MSRC V&M
|
|
| CVE-2026-20859 |
Windows Kernel-Mode Driver
|
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
hazard
|
|
| CVE-2026-20822 |
Windows Graphics Component
|
Windows Graphics Component Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Anonymous
|
|
| CVE-2026-20844 |
Windows Clipboard Server
|
Windows Clipboard Server Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Anonymous
|
|
| CVE-2026-20920 |
Win32k
|
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Varun Goel
|
|
| CVE-2026-20842 |
Microsoft DWM Core Library
|
Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Varun Goel
|
|
| CVE-2026-21219 |
Inbox COM Objects (Global Memory)
|
Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Zhiniang Peng with HUST & R4nger with CyberKunLun
|
|
| CVE-2026-20871 |
Desktop Window Manager
|
Desktop Window Manager Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Anonymous working with Trend Zero Day Initiative
|
|
| CVE-2026-20832 |
Windows Remote Procedure Call Interface Definition Language (IDL)
|
Windows Remote Procedure Call Interface Definition Language (IDL) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Pwnforr777
|
|
| CVE-2026-20863 |
Win32k
|
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
|
|
| CVE-2026-20809 |
Windows Kernel Memory
|
Windows Kernel Memory Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Microsoft Offensive Research & Security Engineering
|
|
| CVE-2026-20816 |
Windows Installer
|
Windows Installer Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
JaGoTu with DCIT, a.s.
|
|
| CVE-2026-20831 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
|
|
| CVE-2026-20853 |
Windows WalletService
|
Windows WalletService Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No | ||
| CVE-2026-20934 |
Windows SMB Server
|
Windows SMB Server Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Microsoft
|
|
| CVE-2026-20927 |
Windows SMB Server
|
Windows SMB Server Denial of Service Vulnerability
CVSS vector: AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Microsoft
|
|
| CVE-2026-20926 |
Windows SMB Server
|
Windows SMB Server Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Microsoft
|
|
| CVE-2026-20921 |
Windows SMB Server
|
Windows SMB Server Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Microsoft
|
|
| CVE-2026-20919 |
Windows SMB Server
|
Windows SMB Server Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Microsoft
|
|
| CVE-2026-20848 |
Windows SMB Server
|
Windows SMB Server Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Microsoft
|
|
| CVE-2026-20918 |
Windows Management Services
|
Windows Management Services Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
|
|
| CVE-2026-20874 |
Windows Management Services
|
Windows Management Services Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Anonymous
|
|
| CVE-2026-20873 |
Windows Management Services
|
Windows Management Services Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Anonymous
|
|
| CVE-2026-20867 |
Windows Management Services
|
Windows Management Services Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Anonymous
|
|
| CVE-2026-20866 |
Windows Management Services
|
Windows Management Services Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Anonymous
|