Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2022-21874 |
Windows Security Center API
|
Windows Security Center API Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
Jinquan(@jq0904) with DBAPPSecurity Lieying Lab
|
|
| CVE-2022-21963 |
Windows Resilient File System (ReFS)
|
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
CVSS vector: AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
Tobias Groß with Friedrich-Alexander University (FAU) Erlangen-Nürnberg, Germany
|
|
| CVE-2022-21962 |
Windows Resilient File System (ReFS)
|
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
CVSS vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2022-01-11 | No |
Reported By
Tobias Groß with Friedrich-Alexander University (FAU) Erlangen-Nürnberg, Germany
|
|
| CVE-2022-21961 |
Windows Resilient File System (ReFS)
|
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
CVSS vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2022-01-11 | No |
Reported By
Tobias Groß with Friedrich-Alexander University (FAU) Erlangen-Nürnberg, Germany
|
|
| CVE-2022-21960 |
Windows Resilient File System (ReFS)
|
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
CVSS vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2022-01-11 | No |
Reported By
Tobias Groß with Friedrich-Alexander University (FAU) Erlangen-Nürnberg, Germany
|
|
| CVE-2022-21959 |
Windows Resilient File System (ReFS)
|
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
CVSS vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2022-01-11 | No |
Reported By
Tobias Groß with Friedrich-Alexander University (FAU) Erlangen-Nürnberg, Germany
|
|
| CVE-2022-21958 |
Windows Resilient File System (ReFS)
|
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
CVSS vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2022-01-11 | No |
Reported By
Tobias Groß with Friedrich-Alexander University (FAU) Erlangen-Nürnberg, Germany
|
|
| CVE-2022-21928 |
Windows Resilient File System (ReFS)
|
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
CVSS vector: AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2022-01-11 | No |
Reported By
Tobias Groß with Friedrich-Alexander University (FAU) Erlangen-Nürnberg, Germany
|
|
| CVE-2022-21892 |
Windows Resilient File System (ReFS)
|
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
CVSS vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2022-01-11 | No |
Reported By
Tobias Groß with Friedrich-Alexander University (FAU) Erlangen-Nürnberg, Germany
|
|
| CVE-2022-21914 |
Windows Remote Access Connection Manager
|
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
StackLeader in Tianfu Cup
|
|
| CVE-2022-21885 |
Windows Remote Access Connection Manager
|
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
StackLeader in Tianfu Cup
|
|
| CVE-2022-21867 |
Windows Push Notifications Apps
|
Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No | - | |
| CVE-2022-21888 |
Windows Modern Execution Server
|
Windows Modern Execution Server Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
|
|
| CVE-2022-21881 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
HuanGMz@KnownSec 404 Team
sunglin@KnownSec 404 Team Tongqing Zhu@KnownSec 404 Team Hcamael@KnownSec 404 Team Zhiniang Peng @edwardzpeng & Byzero with Sangfor Kunlun lab (https://www.cyberkl.com) via TianfuCup (https://www.tianfucup.com) |
|
| CVE-2022-21879 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
JIWO Technology Co., Ltd
|
|
| CVE-2022-21908 |
Windows Installer
|
Windows Installer Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
Levi Broderick, Microsoft and Andrew Ruddick, Microsoft Security Response Center
Michael DePlante (@izobashi) of Trend Micro Zero Day Initiative |
|
| CVE-2022-21901 |
Windows Hyper-V
|
Windows Hyper-V Elevation of Privilege Vulnerability
CVSS vector: AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
Maxime Villard, of M.O.R.S.E.
|
|
| CVE-2022-21847 |
Windows Hyper-V
|
Windows Hyper-V Denial of Service Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
Wei in Kunlun Lab
|
|
| CVE-2022-21878 |
Windows Geolocation Service
|
Windows Geolocation Service Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
|
|
| CVE-2022-21915 |
Windows GDI+
|
Windows GDI+ Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
|
|
| CVE-2022-21880 |
Windows GDI+
|
Windows GDI+ Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
yyjb with http://blog.noah.360.net/
|
|
| CVE-2022-21904 |
Windows GDI
|
Windows GDI Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
|
|
| CVE-2022-21903 |
Windows GDI
|
Windows GDI Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
|
|
| CVE-2022-21839 |
Windows Event Tracing Discretionary Access Control List
|
Windows Event Tracing Discretionary Access Control List Denial of Service Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H/E:P/RL:O/RC:C
|
2022-01-11 | No | - | |
| CVE-2022-21872 |
Windows Event Tracing
|
Windows Event Tracing Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
aks.doker ,99k ,yuanheng lab
|
|
| CVE-2022-21868 |
Windows Devices Human Interface
|
Windows Devices Human Interface Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No | - | |
| CVE-2022-21902 |
Windows DWM Core Library
|
Windows DWM Core Library Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No | ||
| CVE-2022-21896 |
Windows DWM Core Library
|
Windows DWM Core Library Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No | ||
| CVE-2022-21852 |
Windows DWM Core Library
|
Windows DWM Core Library Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No | ||
| CVE-2022-21916 |
Windows Common Log File System Driver
|
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
|
|
| CVE-2022-21897 |
Windows Common Log File System Driver
|
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No | ||
| CVE-2022-21838 |
Windows Cleanup Manager
|
Windows Cleanup Manager Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
Abdelhamid Naceri working with Trend Micro Zero Day Initiative
|
|
| CVE-2022-21858 |
Windows Bind Filter Driver
|
Windows Bind Filter Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2022-21862 |
Windows Application Model Core API
|
Windows Application Model Core API Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No | - | |
| CVE-2022-21860 |
Windows AppContracts API Server
|
Windows AppContracts API Server Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No | - | |
| CVE-2022-21859 |
Windows Accounts Control
|
Windows Accounts Control Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No | - | |
| CVE-2022-21887 |
Win32k
|
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2022-21882 |
Win32k
|
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | Yes |
Reported By
RyeLv (@b2ahex)
Big CJTeam of Tianfu Cup |
|
| CVE-2022-21876 |
Win32k
|
Win32k Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
namnp working with Trend Micro Zero Day Initiative
|
|
| CVE-2022-21833 |
Virtual Machine IDE Drive
|
Virtual Machine IDE Drive Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
Microsoft Offensive Research & Security Engineering
|
|
| CVE-2022-21873 |
Tile Data Repository
|
Tile Data Repository Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No | - | |
| CVE-2022-21861 |
Task Flow Data Engine
|
Task Flow Data Engine Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No | - | |
| CVE-2022-21870 |
Tablet Windows User Interface Application Core
|
Tablet Windows User Interface Application Core Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No | - | |
| CVE-2022-21877 |
Storage Spaces Controller
|
Storage Spaces Controller Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
|
|
| CVE-2022-21922 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No | - | |
| CVE-2022-21893 |
Remote Desktop Protocol
|
Remote Desktop Protocol Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
|
|
| CVE-2022-21964 |
Remote Desktop Licensing Diagnoser
|
Remote Desktop Licensing Diagnoser Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-01-11 | No | - | |
| CVE-2022-21851 |
Remote Desktop Client
|
Remote Desktop Client Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No | - | |
| CVE-2022-21850 |
Remote Desktop Client
|
Remote Desktop Client Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No | - | |
| CVE-2022-21871 |
Microsoft Diagnostics Hub Standard Collector Runtime
|
Microsoft Diagnostics Hub Standard Collector Runtime Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No | - |