Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2022-24497 |
Windows Network File System
|
Windows Network File System Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-05 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-24482 |
Windows ALPC
|
Windows ALPC Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-04-05 | No |
Reported By
Jarvis_1oop
|
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2022-21967 |
Xbox Live Auth Manager for Windows
|
Xbox Live Auth Manager for Windows Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
Rick Veldhoven
|
|
| CVE-2022-24525 |
Windows Update Stack
|
Windows Update Stack Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
Lockheed Martin Red Team
|
|
| CVE-2022-24454 |
Windows Security Support Provider Interface
|
Windows Security Support Provider Interface Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
|
|
| CVE-2022-23284 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2022-03-08 | No |
Reported By
JeongOh Kyea with THEORI
|
|
| CVE-2022-23253 |
Windows Point-to-Point Tunneling Protocol
|
Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
Alex Nichols with Nettitude
|
|
| CVE-2022-23299 |
Windows PDEV
|
Windows PDEV Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
Lucas Leong (@_wmliang_) of Trend Micro Zero Day Initiative
|
|
| CVE-2022-23298 |
Windows NT OS Kernel
|
Windows NT OS Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No | - | |
| CVE-2022-23297 |
Windows NT Lan Manager Datagram Receiver Driver
|
Windows NT Lan Manager Datagram Receiver Driver Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
ZiMi (@YHZX_2013) with Alibaba Orion Security Lab
|
|
| CVE-2022-21973 |
Windows Media Center Update
|
Windows Media Center Update Denial of Service Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
JIWO Technology Co., Ltd
|
|
| CVE-2022-23296 |
Windows Installer
|
Windows Installer Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
Anonymous
Ronnie Salomonsen from Mandiant |
|
| CVE-2022-23290 |
Windows Inking COM
|
Windows Inking COM Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
|
|
| CVE-2022-21975 |
Windows Hyper-V
|
Windows Hyper-V Denial of Service Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
rezer0dai with Calories for GOOD
|
|
| CVE-2022-24459 |
Windows Fax and Scan Service
|
Windows Fax and Scan Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2022-03-08 | No | - | |
| CVE-2022-23293 |
Windows Fast FAT File System Driver
|
Windows Fast FAT File System Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
HyungSeok Han with Theori
|
|
| CVE-2022-23294 |
Windows Event Tracing
|
Windows Event Tracing Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
Azure Yang with Kunlun Lab
|
|
| CVE-2022-23291 |
Windows DWM Core Library
|
Windows DWM Core Library Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No | ||
| CVE-2022-23288 |
Windows DWM Core Library
|
Windows DWM Core Library Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No | ||
| CVE-2022-23281 |
Windows Common Log File System Driver
|
Windows Common Log File System Driver Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
Anonymous working with Trend Micro Zero Day Initiative
keqi hu |
|
| CVE-2022-23286 |
Windows Cloud Files Mini Filter Driver
|
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2022-24455 |
Windows CD-ROM Driver
|
Windows CD-ROM Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
Walied Assar
Hugo Cao of SandCastle, LilangWu, Moony Li of mobile security research of Trend Micro |
|
| CVE-2022-24507 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
ZiMi (@YHZX_2013) with Alibaba Orion Security Lab
|
|
| CVE-2022-24505 |
Windows ALPC
|
Windows ALPC Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
Jarvis_1oop
|
|
| CVE-2022-23287 |
Windows ALPC
|
Windows ALPC Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
Jarvis_1oop
|
|
| CVE-2022-23283 |
Windows ALPC
|
Windows ALPC Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
Jarvis_1oop
|
|
| CVE-2022-24508 |
Win32 File Enumeration
|
Win32 File Enumeration Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No | - | |
| CVE-2022-24460 |
Tablet Windows User Interface Application
|
Tablet Windows User Interface Application Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No | - | |
| CVE-2022-24503 |
Remote Desktop Protocol Client
|
Remote Desktop Protocol Client Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
Steven21
|
|
| CVE-2022-23285 |
Remote Desktop Client
|
Remote Desktop Client Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
|
|
| CVE-2022-21990 |
Remote Desktop Client
|
Remote Desktop Client Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2022-03-08 | No | - | |
| CVE-2022-23300 |
Raw Image Extension
|
Raw Image Extension Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
|
|
| CVE-2022-23295 |
Raw Image Extension
|
Raw Image Extension Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
|
|
| CVE-2022-23282 |
Paint 3D
|
Paint 3D Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
Sooraj K S (@soorajks) with Sophos
|
|
| CVE-2022-22010 |
Media Foundation
|
Media Foundation Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
|
|
| CVE-2022-21977 |
Media Foundation
|
Media Foundation Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
|
|
| CVE-2022-24456 |
HEVC Video Extensions
|
HEVC Video Extensions Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
bugwhale
Dhanesh Kizhakkinan with Mandiant |
|
| CVE-2022-24453 |
HEVC Video Extensions
|
HEVC Video Extensions Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
|
|
| CVE-2022-24452 |
HEVC Video Extensions
|
HEVC Video Extensions Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
|
|
| CVE-2022-23301 |
HEVC Video Extensions
|
HEVC Video Extensions Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
Azure Yang with Kunlun Lab
|
|
| CVE-2022-22007 |
HEVC Video Extensions
|
HEVC Video Extensions Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
Dhanesh Kizhakkinan of Mandian
|
|
| CVE-2022-22006 |
HEVC Video Extensions
|
HEVC Video Extensions Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
|
|
| CVE-2022-24457 |
HEIF Image Extensions
|
HEIF Image Extensions Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-03-08 | No |
Reported By
Dhanesh Kizhakkinan with Mandiant
|
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2022-22002 |
Windows User Account Profile Picture
|
Windows User Account Profile Picture Denial of Service Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-02-08 | No |
Reported By
Abdelhamid Naceri working with Trend Micro Zero Day Initiative
|
|
| CVE-2022-21993 |
Windows Services for NFS ONCRPC XDR Driver
|
Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-02-08 | No |
Reported By
yyjb with http://blog.noah.360.net/
|
|
| CVE-2022-21971 |
Windows Runtime
|
Windows Runtime Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-02-08 | No |
Reported By
Anonymous
Jinquan(@jq0904) with DBAPPSecurity Lieying Lab Zesen Ye (@wh1tc) and Zhiniang Peng (@edwardzpeng) with Sangfor |
|
| CVE-2022-22001 |
Windows Remote Access Connection Manager
|
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-02-08 | No |
Reported By
ziming zhang of Ant Security Light-Year Lab
|
|
| CVE-2022-21985 |
Windows Remote Access Connection Manager
|
Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-02-08 | No |
Reported By
ziming zhang with Ant Security Light-Year Lab
|
|
| CVE-2022-22718 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-02-08 | No |
Reported By
NSFOCUS TIANJI Lab via TianfuCup
|
|
| CVE-2022-22717 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-02-08 | No |
Reported By
|