Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2022-21486 |
Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.35 and prior 7.5.25 and prior 7.6.21 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial
|
Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.35 and prior 7.5.25 and prior 7.6.21 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L).
CVSS vector: AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L
|
2022-05-04 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2022-21485 |
Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.35 and prior 7.5.25 and prior 7.6.21 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial
|
Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.35 and prior 7.5.25 and prior 7.6.21 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L).
CVSS vector: AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L
|
2022-05-03 | - | - | |
| CVE-2022-21484 |
Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.35 and prior 7.5.25 and prior 7.6.21 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial
|
Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.35 and prior 7.5.25 and prior 7.6.21 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L).
CVSS vector: AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L
|
2022-05-03 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2022-26924 |
YARP
|
YARP Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No | - | |
| CVE-2022-24498 |
Windows iSCSI Target Service
|
Windows iSCSI Target Service Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
liubenjin with Codesafe Team of Legendsec at Qi'anxin Group
|
|
| CVE-2022-26807 |
Windows Work Folder Service
|
Windows Work Folder Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No | - | |
| CVE-2022-24542 |
Windows Win32k
|
Windows Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
|
|
| CVE-2022-24474 |
Windows Win32k
|
Windows Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
|
|
| CVE-2022-26904 |
Windows User Profile Service
|
Windows User Profile Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
|
2022-04-12 | No |
Reported By
KLINIX5
|
|
| CVE-2022-24543 |
Windows Upgrade Assistant
|
Windows Upgrade Assistant Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
JaeHeng Yoon(@onnoveath) with JENBlack Soft
DoHyun Lee(@l33d0hyun) with DNSLab, Korea University SeungYun LEE(@SeungYun_Le2) |
|
| CVE-2022-24550 |
Windows Telephony Server
|
Windows Telephony Server Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Simon Zuckerbraun of Trend Micro Zero Day Initiative
|
|
| CVE-2022-24541 |
Windows Server Service
|
Windows Server Service Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-26915 |
Windows Secure Channel
|
Windows Secure Channel Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
|
|
| CVE-2022-24500 |
Windows SMB
|
Windows SMB Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-26803 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
George Hughey with MSRC Vulnerabilities and Mitigations
|
|
| CVE-2022-26802 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
George Hughey with MSRC Vulnerabilities and Mitigations
|
|
| CVE-2022-26801 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
George Hughey with MSRC Vulnerabilities and Mitigations
|
|
| CVE-2022-26798 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Microsoft Offensive Research & Security Engineering (MORSE)
|
|
| CVE-2022-26797 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Microsoft Offensive Research & Security Engineering (MORSE)
|
|
| CVE-2022-26796 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Microsoft Offensive Research & Security Engineering (MORSE)
|
|
| CVE-2022-26795 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Microsoft Offensive Research & Security Engineering (MORSE)
|
|
| CVE-2022-26794 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Microsoft Offensive Research & Security Engineering (MORSE)
|
|
| CVE-2022-26793 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Microsoft Offensive Research & Security Engineering (MORSE)
|
|
| CVE-2022-26792 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Microsoft Offensive Research & Security Engineering (MORSE)
|
|
| CVE-2022-26791 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Microsoft Offensive Research & Security Engineering (MORSE)
|
|
| CVE-2022-26790 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Microsoft Offensive Research & Security Engineering (MORSE)
|
|
| CVE-2022-26789 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Microsoft Offensive Research & Security Engineering (MORSE)
|
|
| CVE-2022-26787 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Microsoft Offensive Research & Security Engineering (MORSE)
|
|
| CVE-2022-26786 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Microsoft Offensive Research & Security Engineering (MORSE)
|
|
| CVE-2022-24491 |
Windows Network File System
|
Windows Network File System Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
liubenjin with Codesafe Team of Legendsec at Qi'anxin Group
|
|
| CVE-2022-24487 |
Windows Local Security Authority Subsystem Service (LSASS)
|
Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Microsoft Offensive Research & Security Engineering (MORSE)
|
|
| CVE-2022-24496 |
Windows Local Security Authority (LSA)
|
Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Microsoft Offensive Research & Security Engineering (MORSE)
|
|
| CVE-2022-26919 |
Windows Lightweight Directory Access Protocol (LDAP)
|
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-26831 |
Windows Lightweight Directory Access Protocol (LDAP)
|
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-24483 |
Windows Kernel
|
Windows Kernel Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
|
|
| CVE-2022-24530 |
Windows Installer
|
Windows Installer Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No | - | |
| CVE-2022-24499 |
Windows Installer
|
Windows Installer Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
JeongOh Kyea of THEORI working with Trend Micro Zero Day Initiative
|
|
| CVE-2022-26785 |
Windows Hyper-V Shared Virtual Hard Disks
|
Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2022-26783 |
Windows Hyper-V Shared Virtual Hard Disks
|
Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2022-24539 |
Windows Hyper-V Shared Virtual Hard Disks
|
Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2022-24490 |
Windows Hyper-V Shared Virtual Hard Disks
|
Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2022-24537 |
Windows Hyper-V
|
Windows Hyper-V Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Maxime Villard, of M.O.R.S.E.
|
|
| CVE-2022-23268 |
Windows Hyper-V
|
Windows Hyper-V Denial of Service Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
PETER HLAVATY with Banana Mode
|
|
| CVE-2022-23257 |
Windows Hyper-V
|
Windows Hyper-V Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
|
|
| CVE-2022-22009 |
Windows Hyper-V
|
Windows Hyper-V Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
rezer0dai with NoBananas NoBugzz
|
|
| CVE-2022-22008 |
Windows Hyper-V
|
Windows Hyper-V Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
rezer0dai with Independent Slavic Voyage
|
|
| CVE-2022-26920 |
Windows Graphics Component
|
Windows Graphics Component Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
namnp from Viettel Cyber Security
|
|
| CVE-2022-26903 |
Windows Graphics Component
|
Windows Graphics Component Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Li Shuang and willJ of vulnerability research institute
|
|
| CVE-2022-26827 |
Windows File Server Resource Management Service
|
Windows File Server Resource Management Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No | - | |
| CVE-2022-26810 |
Windows File Server Resource Management Service
|
Windows File Server Resource Management Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
k0shl with Kunlun Lab
|