Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2026-20861 |
Windows Management Services
|
Windows Management Services Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Anonymous
|
|
| CVE-2026-20869 |
Windows Local Session Manager (LSM)
|
Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Jose Polo Bolano with Microsoft
|
|
| CVE-2026-20808 |
Windows File Explorer
|
Windows File Explorer Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Taewoo (Tae_ω02)
|
|
| CVE-2026-20826 |
Tablet Windows User Interface (TWINUI) Subsystem
|
Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Anonymous
|
|
| CVE-2026-20836 |
DirectX Graphics Kernel
|
DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
cyanbamboo and b2ahex
|
|
| CVE-2026-20814 |
DirectX Graphics Kernel
|
DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
cyanbamboo and b2ahex
|
|
| CVE-2026-21221 |
Capability Access Management Service (camsvc)
|
Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
|
|
| CVE-2026-20830 |
Capability Access Management Service (camsvc)
|
Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
|
|
| CVE-2026-20815 |
Capability Access Management Service (camsvc)
|
Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
|
|
| CVE-2026-20965 |
Windows Admin Center
|
Windows Admin Center Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
|
|
| CVE-2026-20843 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
|
|
| CVE-2026-20825 |
Windows Hyper-V
|
Windows Hyper-V Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Andrey Markovytch
|
|
| CVE-2026-20929 |
Windows HTTP.sys
|
Windows HTTP.sys Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
|
|
| CVE-2026-0386 |
Windows Deployment Services
|
Windows Deployment Services Remote Code Execution Vulnerability
CVSS vector: AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Microsoft Offensive Research and Security Engineering (MORSE) with Microsoft
|
|
| CVE-2026-20839 |
Windows Client-Side Caching (CSC) Service
|
Windows Client-Side Caching (CSC) Service Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Microsoft Offensive Research & Security Engineering
|
|
| CVE-2026-20817 |
Windows Error Reporting Service
|
Windows Error Reporting Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
|
|
| CVE-2026-20856 |
Windows Server Update Service (WSUS)
|
Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
|
|
| CVE-2026-20838 |
Windows Kernel
|
Windows Kernel Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Microsoft Offensive Research & Security Engineering
|
|
| CVE-2026-20862 |
Windows Management Services
|
Windows Management Services Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Anonymous
|
|
| CVE-2026-20939 |
Windows File Explorer
|
Windows File Explorer Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-01-13 | No | - | |
| CVE-2026-20937 |
Windows File Explorer
|
Windows File Explorer Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-01-13 | No | - | |
| CVE-2026-20932 |
Windows File Explorer
|
Windows File Explorer Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-01-13 | No | - | |
| CVE-2026-20823 |
Windows File Explorer
|
Windows File Explorer Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Anonymous
|
|
| CVE-2026-20827 |
Tablet Windows User Interface (TWINUI) Subsystem
|
Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-01-13 | No | - | |
| CVE-2026-20821 |
Remote Procedure Call
|
Remote Procedure Call Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
|
|
| CVE-2026-20805 |
Desktop Window Manager
|
Desktop Window Manager Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-01-13 | Yes |
Reported By
Microsoft Threat Intelligence Center and Microsoft Security Response Center
|
|
| CVE-2026-20828 |
Windows rndismp6.sys
|
Windows rndismp6.sys Information Disclosure Vulnerability
CVSS vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
B1aN
|
|
| CVE-2026-20936 |
Windows NDIS
|
Windows NDIS Information Disclosure Vulnerability
CVSS vector: AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-01-13 | No | - | |
| CVE-2026-20829 |
TPM Trustlet
|
TPM Trustlet Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Microsoft Offensive Research & Security Engineering
|
|
| CVE-2026-20851 |
Capability Access Management Service (camsvc)
|
Capability Access Management Service (camsvc) Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
|
|
| CVE-2026-20835 |
Capability Access Management Service (camsvc)
|
Capability Access Management Service (camsvc) Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-01-13 | No | ||
| CVE-2026-20868 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Anonymous
|
|
| CVE-2026-20922 |
Windows NTFS
|
Windows NTFS Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
|
|
| CVE-2026-20840 |
Windows NTFS
|
Windows NTFS Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
|
|
| CVE-2024-55414 |
Windows Motorola Soft Modem Driver
|
Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
|
|
| CVE-2026-20837 |
Windows Media
|
Windows Media Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
Kai Lu with Palo Alto Networks
|
|
| CVE-2026-20864 |
Windows Connected Devices Platform Service
|
Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No | ||
| CVE-2026-20820 |
Windows Common Log File System Driver
|
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-01-13 | No |
Reported By
0rb1t with None
|
|
| CVE-2023-31096 |
MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver
|
MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
|
2026-01-13 | No |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2025-13699 |
MariaDB mariadb-dump Utility Directory Traversal
|
MariaDB mariadb-dump Utility Directory Traversal Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
|
2025-12-27 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2025-68156 |
Expr has
|
Expr has Denial of Service via Unbounded Recursion in Builtin Functions
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2025-12-19 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2025-64663 |
Custom Question Answering
|
Custom Question Answering Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-12-18 | No | - | |
| CVE-2025-65041 |
Microsoft Partner Center
|
Microsoft Partner Center Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:T/RC:C
|
2025-12-18 | No |
Reported By
Gautam Peri
|
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2025-62472 |
Windows Remote Access Connection Manager
|
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-12-09 | No |
Reported By
anonymous
|
|
| CVE-2025-62549 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-12-09 | No |
Reported By
Anonymous
|
|
| CVE-2025-54100 |
PowerShell
|
PowerShell Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-12-09 | No |
Reported By
|
|
| CVE-2025-62466 |
Windows Client-Side Caching
|
Windows Client-Side Caching Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-12-09 | No |
Reported By
|
|
| CVE-2025-62465 |
DirectX Graphics Kernel
|
DirectX Graphics Kernel Denial of Service Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2025-12-09 | No |
Reported By
cyanbamboo and b2ahex
|
|
| CVE-2025-62463 |
DirectX Graphics Kernel
|
DirectX Graphics Kernel Denial of Service Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2025-12-09 | No |
Reported By
cyanbamboo and b2ahex
|
|
| CVE-2025-62565 |
Windows File Explorer
|
Windows File Explorer Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-12-09 | No |
Reported By
Anonymous
|