Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2026-6479 |
PostgreSQL SSL/GSS init causes
|
PostgreSQL SSL/GSS init causes denial of service, via uncontrolled recursion
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2026-05-16 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2026-34956 |
Openvswitch: open vswitch
|
Openvswitch: open vswitch: denial of service via malformed ftp epasv command
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2026-05-15 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2026-41615 |
Microsoft Authenticator
|
Microsoft Authenticator Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-14 | No |
Reported By
Sridhar Periyasamy
|
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2026-41094 |
Microsoft Data Formulator
|
Microsoft Data Formulator Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
|
|
| CVE-2026-35438 |
Windows Admin Center
|
Windows Admin Center Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
sho odagiri with GMO Cybersecurity by Ierae inc
|
|
| CVE-2026-35417 |
Windows Win32k
|
Windows Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
Owen McCullough
|
|
| CVE-2026-34344 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
|
|
| CVE-2026-40369 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
Calif.io in collaboration with Claude and Anthropic Research
Adrian Denkiewicz at Doyensec in collaboration with Anthropic Research Len Sadowski (lytnc) and Oguz Bektas (_ozb_) Théo DUTEIS |
|
| CVE-2026-41088 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
Soon Oh with Microsoft
|
|
| CVE-2026-40414 |
Windows TCP/IP
|
Windows TCP/IP Denial of Service Vulnerability
CVSS vector: AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
Windows Attack Research & Protection (WARP) with Microsoft
|
|
| CVE-2026-40413 |
Windows TCP/IP
|
Windows TCP/IP Denial of Service Vulnerability
CVSS vector: AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
Microsoft
|
|
| CVE-2026-40405 |
Windows TCP/IP
|
Windows TCP/IP Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
Microsoft
|
|
| CVE-2026-40401 |
Windows TCP/IP
|
Windows TCP/IP Denial of Service Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
Windows Attack Research & Protection (WARP) with Microsoft
|
|
| CVE-2026-34350 |
Windows Storport Miniport Driver
|
Windows Storport Miniport Driver Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
Microsoft Offensive Research & Security Engineering
|
|
| CVE-2026-34339 |
Windows Lightweight Directory Access Protocol (LDAP)
|
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
Aniq Fakhrul
Howard McGreehan with MSRC V&M |
|
| CVE-2026-34347 |
Windows Win32k
|
Windows Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
wenqunwang with China Telecom Research Institute
|
|
| CVE-2026-34333 |
Windows Win32k
|
Windows Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
wenqunwang with China Telecom Research Institute
|
|
| CVE-2026-40408 |
Windows WAN ARP Driver
|
Windows WAN ARP Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
hazard
|
|
| CVE-2026-42825 |
Windows Telephony Service
|
Windows Telephony Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
Anonymous
|
|
| CVE-2026-40382 |
Windows Telephony Service
|
Windows Telephony Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
DongJun Kim with Enki WhiteHat
|
|
| CVE-2026-34338 |
Windows Telephony Service
|
Windows Telephony Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
DongJun Kim with Enki WhiteHat
|
|
| CVE-2026-40415 |
Windows TCP/IP
|
Windows TCP/IP Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
Windows Attack Research & Protection (WARP) with Microsoft
|
|
| CVE-2026-40406 |
Windows TCP/IP
|
Windows TCP/IP Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
Microsoft
|
|
| CVE-2026-40410 |
Windows SMB Client
|
Windows SMB Client Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
Anonymous
|
|
| CVE-2026-34340 |
Windows Projected File System
|
Windows Projected File System Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
ChenJian with Sea Security Orca Team
|
|
| CVE-2026-34332 |
Windows Kernel-Mode Driver
|
Windows Kernel-Mode Driver Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
Microsoft Offensive Research & Security Engineering
|
|
| CVE-2026-40402 |
Windows Hyper-V
|
Windows Hyper-V Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
Ashutosh with skyhighsecurity
|
|
| CVE-2026-35418 |
Windows Cloud Files Mini Filter Driver
|
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
Anonymous
|
|
| CVE-2026-34337 |
Windows Cloud Files Mini Filter Driver
|
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
Microsoft
|
|
| CVE-2026-33835 |
Windows Cloud Files Mini Filter Driver
|
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
Joe Desimone with Elastic Security
|
|
| CVE-2026-35416 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
|
|
| CVE-2026-33840 |
Win32k
|
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
|
|
| CVE-2026-41095 |
Data Deduplication
|
Data Deduplication Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
ChenJian with Sea Security Orca Team
|
|
| CVE-2026-32170 |
Windows Rich Text Edit
|
Windows Rich Text Edit Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No | - | |
| CVE-2026-21530 |
Windows Rich Text Edit
|
Windows Rich Text Edit Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
|
|
| CVE-2026-33838 |
Windows Message Queuing (MSMQ)
|
Windows Message Queuing (MSMQ) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
Anonymous working with TrendAI Zero Day Initiative
|
|
| CVE-2026-34341 |
Windows Link-Layer Discovery Protocol (LLDP)
|
Windows Link-Layer Discovery Protocol (LLDP) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
hazard
|
|
| CVE-2026-34351 |
Windows TCP/IP
|
Windows TCP/IP Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
hazard
|
|
| CVE-2026-34334 |
Windows TCP/IP
|
Windows TCP/IP Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
hazard
|
|
| CVE-2026-34342 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
Marcin Wiazowski working with TrendAI Zero Day Initiative
|
|
| CVE-2026-32161 |
Windows Native WiFi Miniport Driver
|
Windows Native WiFi Miniport Driver Remote Code Execution Vulnerability
CVSS vector: AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
|
|
| CVE-2026-34345 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
|
|
| CVE-2026-34331 |
Win32k
|
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
wenqunwang with China Telecom Research Institute
|
|
| CVE-2026-33839 |
Win32k
|
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
Anonymous
|
|
| CVE-2026-41103 |
Microsoft SSO Plugin for Jira & Confluence
|
Microsoft SSO Plugin for Jira & Confluence Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
Robert Fitzpatrick with Microsoft
|
|
| CVE-2026-33834 |
Windows Event Logging Service
|
Windows Event Logging Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
George Hughey with MSRC Vulnerabilities & Mitigations
|
|
| CVE-2026-40397 |
Windows Common Log File System Driver
|
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
Puneeth Kumar Katikela
Microsoft |
|
| CVE-2026-35415 |
Windows Storage Spaces Controller
|
Windows Storage Spaces Controller Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
Jan Vojtesek with SentinelOne
|
|
| CVE-2026-42896 |
Windows DWM Core Library
|
Windows DWM Core Library Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
namnp with Viettel Cyber Security
|
|
| CVE-2026-34330 |
Win32k
|
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2026-05-12 | No |
Reported By
wenqunwang with China Telecom Research Institute
|