Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2022-21835 |
Microsoft Cryptographic Services
|
Microsoft Cryptographic Services Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
|
|
| CVE-2022-21910 |
Microsoft Cluster Port Driver
|
Microsoft Cluster Port Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
JIWO Technology Co., Ltd
|
|
| CVE-2022-21884 |
Local Security Authority Subsystem Service
|
Local Security Authority Subsystem Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
|
|
| CVE-2021-36976 |
Libarchive
|
Libarchive Remote Code Execution Vulnerability
No CVSS vector published
|
2022-01-11 | No | - | |
| CVE-2022-21907 |
HTTP Protocol Stack
|
HTTP Protocol Stack Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
|
|
| CVE-2022-21917 |
HEVC Video Extensions
|
HEVC Video Extensions Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2022-01-11 | No |
Reported By
Dhanesh Kizhakkinan with Mandiant
|
|
| CVE-2022-21918 |
DirectX Graphics Kernel File
|
DirectX Graphics Kernel File Denial of Service Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
HongZhenhao of Ant Group Light-Year Security Lab
|
|
| CVE-2022-21912 |
DirectX Graphics Kernel
|
DirectX Graphics Kernel Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
HongZhenhao of Ant Group Light-Year Security Lab
|
|
| CVE-2022-21898 |
DirectX Graphics Kernel
|
DirectX Graphics Kernel Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No |
Reported By
HongZhenhao of Ant Group Light-Year Security Lab
|
|
| CVE-2022-21865 |
Connected Devices Platform Service
|
Connected Devices Platform Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No | - | |
| CVE-2022-21869 |
Clipboard User Service
|
Clipboard User Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No | - | |
| CVE-2022-21857 |
Active Directory Domain Services
|
Active Directory Domain Services Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-01-11 | No | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2014-9638 |
oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a
|
oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a WAV file with the number of channels set to zero.
No CVSS vector published
|
2021-12-16 | - | - | |
| CVE-2020-13962 |
Qt 5.12.2 through 5.14.2 as used in unofficial builds of Mumble 1.3.0 and other products mishandles OpenSSL's error queue which can cause a
|
Qt 5.12.2 through 5.14.2 as used in unofficial builds of Mumble 1.3.0 and other products mishandles OpenSSL's error queue which can cause a denial of service to QSslSocket users. Because errors leak in unrelated TLS sessions an unrelated session may be disconnected when any handshake fails. (Mumble 1.3.1 is not affected regardless of the Qt version.)
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2021-12-16 | - | - | |
| CVE-2014-9639 |
Integer overflow in oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a
|
Integer overflow in oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (crash) via a crafted number of channels in a WAV file which triggers an out-of-bounds memory access.
No CVSS vector published
|
2021-12-16 | - | - | |
| CVE-2021-44228 |
Apache Log4j
|
Apache Log4j Remote Code Execution Vulnerability
No CVSS vector published
|
2021-12-16 | Yes | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2021-43215 |
iSNS Server Memory Corruption Vulnerability Can Lead to
|
iSNS Server Memory Corruption Vulnerability Can Lead to Remote Code Execution
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
liubenjin with Codesafe Team of Legendsec at Qi'anxin Group
|
|
| CVE-2021-43247 |
Windows TCP/IP Driver
|
Windows TCP/IP Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
Fraunhofer FKIE CA&D working with Trend Micro Zero Day Initiative
|
|
| CVE-2021-43237 |
Windows Setup
|
Windows Setup Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
Abdelhamid Naceri working with Trend Micro Zero Day Initiative
|
|
| CVE-2021-43223 |
Windows Remote Access Connection Manager
|
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
|
|
| CVE-2021-43238 |
Windows Remote Access
|
Windows Remote Access Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
Abdelhamid Naceri working with Trend Micro Zero Day Initiative
|
|
| CVE-2021-43239 |
Windows Recovery Environment Agent
|
Windows Recovery Environment Agent Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
Rahul Varanasi of Microsoft
|
|
| CVE-2021-41333 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
|
2021-12-14 | No |
Reported By
|
|
| CVE-2021-43231 |
Windows NTFS
|
Windows NTFS Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
JeongOh Kyea with THEORI
|
|
| CVE-2021-43230 |
Windows NTFS
|
Windows NTFS Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
HyungSeok Han with Theori
|
|
| CVE-2021-43229 |
Windows NTFS
|
Windows NTFS Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
HyungSeok Han with Theori
|
|
| CVE-2021-43880 |
Windows Mobile Device Management
|
Windows Mobile Device Management Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2021-12-14 | No | - | |
| CVE-2021-40441 |
Windows Media Center
|
Windows Media Center Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
JIWO Technology Co., Ltd
|
|
| CVE-2021-43244 |
Windows Kernel
|
Windows Kernel Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
|
|
| CVE-2021-43883 |
Windows Installer
|
Windows Installer Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2021-12-14 | No | - | |
| CVE-2021-43246 |
Windows Hyper-V
|
Windows Hyper-V Denial of Service Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
HongZhenhao of Ant Group Light-Year Security Lab
|
|
| CVE-2021-43234 |
Windows Fax Service
|
Windows Fax Service Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
|
|
| CVE-2021-43232 |
Windows Event Tracing
|
Windows Event Tracing Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
|
|
| CVE-2021-43893 |
Windows Encrypting File System (EFS)
|
Windows Encrypting File System (EFS) Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
James Forshaw of Google Project Zero
|
|
| CVE-2021-43217 |
Windows Encrypting File System (EFS)
|
Windows Encrypting File System (EFS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
|
|
| CVE-2021-43245 |
Windows Digital TV Tuner
|
Windows Digital TV Tuner Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
JIWO Technology Co., Ltd
|
|
| CVE-2021-43248 |
Windows Digital Media Receiver
|
Windows Digital Media Receiver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
|
|
| CVE-2021-43226 |
Windows Common Log File System Driver
|
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
JeongOh Kyea with THEORI
|
|
| CVE-2021-43224 |
Windows Common Log File System Driver
|
Windows Common Log File System Driver Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
|
|
| CVE-2021-43207 |
Windows Common Log File System Driver
|
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
JeongOh Kyea with THEORI
|
|
| CVE-2021-43214 |
Web Media Extensions
|
Web Media Extensions Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
|
|
| CVE-2021-42295 |
Visual Basic for Applications
|
Visual Basic for Applications Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
5n1p3r0010 from Topsec ChiXiao lab
|
|
| CVE-2021-43228 |
SymCrypt
|
SymCrypt Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2021-12-14 | No | - | |
| CVE-2021-43235 |
Storage Spaces Controller
|
Storage Spaces Controller Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
HyungSeok Han with Theori
|
|
| CVE-2021-43227 |
Storage Spaces Controller
|
Storage Spaces Controller Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
HyungSeok Han with Theori
|
|
| CVE-2021-43233 |
Remote Desktop Client
|
Remote Desktop Client Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
Yuchao Zhou, Zirui Yang and Wenqun Wang of ThreatBook
|
|
| CVE-2021-43240 |
NTFS Set Short Name
|
NTFS Set Short Name Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2021-12-14 | No | - | |
| CVE-2021-43236 |
Microsoft Message Queuing
|
Microsoft Message Queuing Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
liubenjin with Codesafe Team of Legendsec at Qianxin Group
|
|
| CVE-2021-43222 |
Microsoft Message Queuing
|
Microsoft Message Queuing Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
liubenjin with Codesafe Team of Legendsec at Qi'anxin Group
|
|
| CVE-2021-43216 |
Microsoft Local Security Authority (LSA) Server
|
Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-12-14 | No |
Reported By
|