Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2022-26808 |
Windows File Explorer
|
Windows File Explorer Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No | - | |
| CVE-2022-26918 |
Windows Fax Compose Form
|
Windows Fax Compose Form Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Communications Security Establishment
|
|
| CVE-2022-26917 |
Windows Fax Compose Form
|
Windows Fax Compose Form Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Communications Security Establishment
|
|
| CVE-2022-26916 |
Windows Fax Compose Form
|
Windows Fax Compose Form Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Communications Security Establishment
|
|
| CVE-2022-24495 |
Windows Direct Show
|
Windows Direct Show Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Azure Yang with Kunlun Lab
|
|
| CVE-2022-24547 |
Windows Digital Media Receiver
|
Windows Digital Media Receiver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
|
|
| CVE-2022-24488 |
Windows Desktop Bridge
|
Windows Desktop Bridge Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No | - | |
| CVE-2022-24546 |
Windows DWM Core Library
|
Windows DWM Core Library Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No | ||
| CVE-2022-26829 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2022-04-12 | No | - | |
| CVE-2022-26826 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No | - | |
| CVE-2022-26825 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
|
|
| CVE-2022-26824 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
|
|
| CVE-2022-26823 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
|
|
| CVE-2022-26822 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
|
|
| CVE-2022-26821 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
|
|
| CVE-2022-26820 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
|
|
| CVE-2022-26819 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
|
|
| CVE-2022-26818 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
|
|
| CVE-2022-26817 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
|
|
| CVE-2022-26816 |
Windows DNS Server
|
Windows DNS Server Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
|
|
| CVE-2022-26815 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
|
|
| CVE-2022-26814 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-26813 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
|
|
| CVE-2022-26812 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2022-04-12 | No |
Reported By
|
|
| CVE-2022-26811 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
|
|
| CVE-2022-24536 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
George Hughey with MSRC Vulnerabilities and Mitigations
|
|
| CVE-2022-24521 |
Windows Common Log File System Driver
|
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
|
2022-04-12 | Yes |
Reported By
Adam Podlosky and Amir Bazine of Crowdstrike
National Security Agency |
|
| CVE-2022-24481 |
Windows Common Log File System Driver
|
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
|
|
| CVE-2022-26784 |
Windows Cluster Shared Volume (CSV)
|
Windows Cluster Shared Volume (CSV) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2022-24538 |
Windows Cluster Shared Volume (CSV)
|
Windows Cluster Shared Volume (CSV) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2022-24484 |
Windows Cluster Shared Volume (CSV)
|
Windows Cluster Shared Volume (CSV) Denial of Service Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2022-26828 |
Windows Bluetooth Driver
|
Windows Bluetooth Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No | - | |
| CVE-2022-24549 |
Windows AppX Package Manager
|
Windows AppX Package Manager Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
AppModel Deployment (DXP)
|
|
| CVE-2022-24494 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Victor Portal with Deloitte Spain
|
|
| CVE-2022-24540 |
Windows ALPC
|
Windows ALPC Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Anonymous
|
|
| CVE-2022-26914 |
Win32k
|
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Anonymous
|
|
| CVE-2022-24534 |
Win32 Stream Enumeration
|
Win32 Stream Enumeration Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-21983 |
Win32 Stream Enumeration
|
Win32 Stream Enumeration Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-24485 |
Win32 File Enumeration
|
Win32 File Enumeration Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-26809 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
BugHunter010 (@CyberKunlun)
|
|
| CVE-2022-24528 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-24492 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-24533 |
Remote Desktop Protocol
|
Remote Desktop Protocol Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
|
|
| CVE-2022-26788 |
PowerShell
|
PowerShell Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Zubair Ashraf with Crowdstrike
Firooz Akbari of VMware Mattias Borg and Stefan Schörling with Onevinn AB |
|
| CVE-2022-24493 |
Microsoft Local Security Authority (LSA) Server
|
Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-04-12 | No | - | |
| CVE-2022-24527 |
Microsoft Endpoint Configuration Manager
|
Microsoft Endpoint Configuration Manager Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Jake Baines with Rapid7
|
|
| CVE-2022-24532 |
HEVC Video Extensions
|
HEVC Video Extensions Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
Dhanesh Kizhakkinan with Mandiant
|
|
| CVE-2022-26830 |
DiskUsage.exe
|
DiskUsage.exe Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No | - | |
| CVE-2022-24479 |
Connected User Experiences and Telemetry
|
Connected User Experiences and Telemetry Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
JeongOh Kyea of THEORI working with Trend Micro's Zero Day Initiative
|
|
| CVE-2022-24489 |
Cluster Client Failover (CCF)
|
Cluster Client Failover (CCF) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-12 | No |
Reported By
k0shl with Kunlun Lab
|