Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2021-34457 |
Windows Remote Access Connection Manager
|
Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
ziming zhang of Ant Security Light-Year Lab
|
|
| CVE-2021-34456 |
Windows Remote Access Connection Manager
|
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
ziming zhang of Ant Security Light-Year Lab
|
|
| CVE-2021-34454 |
Windows Remote Access Connection Manager
|
Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
ziming zhang of Ant Security Light-Year Lab
|
|
| CVE-2021-34445 |
Windows Remote Access Connection Manager
|
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
ziming zhang of Ant Security Light-Year Lab
|
|
| CVE-2021-33773 |
Windows Remote Access Connection Manager
|
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
ziming zhang of Ant Security Light-Year Lab
|
|
| CVE-2021-33763 |
Windows Remote Access Connection Manager
|
Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
ziming zhang of Ant Security Light-Year Lab
|
|
| CVE-2021-33761 |
Windows Remote Access Connection Manager
|
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
ziming zhang of Ant Security Light-Year Lab
|
|
| CVE-2021-33743 |
Windows Projected File System
|
Windows Projected File System Elevation of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
k0shl
|
|
| CVE-2021-34493 |
Windows Partition Management Driver
|
Windows Partition Management Driver Elevation of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No | - | |
| CVE-2021-33740 |
Windows Media
|
Windows Media Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
HAO LI of VenusTech ADLab
|
|
| CVE-2021-34497 |
Windows MSHTML Platform
|
Windows MSHTML Platform Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
|
|
| CVE-2021-34447 |
Windows MSHTML Platform
|
Windows MSHTML Platform Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
|
|
| CVE-2021-33788 |
Windows LSA
|
Windows LSA Denial of Service Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No | - | |
| CVE-2021-33764 |
Windows Key Distribution Center
|
Windows Key Distribution Center Information Disclosure Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
Windows Authentication Dev Team
|
|
| CVE-2021-34500 |
Windows Kernel Memory
|
Windows Kernel Memory Information Disclosure Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-07-13 | No | - | |
| CVE-2021-34514 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
|
|
| CVE-2021-34508 |
Windows Kernel
|
Windows Kernel Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No | - | |
| CVE-2021-34458 |
Windows Kernel
|
Windows Kernel Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
Cody Hartwig of Microsoft
|
|
| CVE-2021-33771 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
|
2021-07-13 | Yes |
Reported By
Microsoft Threat Intelligence Center (MSTIC)
Microsoft Security Response Center (MSRC)
|
|
| CVE-2021-31979 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
|
2021-07-13 | Yes |
Reported By
Microsoft Threat Intelligence Center (MSTIC)
Microsoft Security Response Center (MSRC)
|
|
| CVE-2021-34511 |
Windows Installer
|
Windows Installer Elevation of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
Polar Bear at Microsoft
|
|
| CVE-2021-31961 |
Windows InstallService
|
Windows InstallService Elevation of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
JeongOh Kyea (@kkokkokye) of THEORI working with Trend Micro Zero Day Initiative
|
|
| CVE-2021-34450 |
Windows Hyper-V
|
Windows Hyper-V Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
Microsoft Platform Security Assurance & Vulnerability Research
|
|
| CVE-2021-33758 |
Windows Hyper-V
|
Windows Hyper-V Denial of Service Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
Huichen Lin and Dong Seong Kim of School of Information Technology and Electrical Engineering - The University of Queensland
|
|
| CVE-2021-33755 |
Windows Hyper-V
|
Windows Hyper-V Denial of Service Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
Microsoft Platform Security Assurance & Vulnerability Research
|
|
| CVE-2021-34498 |
Windows GDI
|
Windows GDI Elevation of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
Marcin Wiązowski working with Trend Micro Zero Day Initiative
|
|
| CVE-2021-34496 |
Windows GDI
|
Windows GDI Information Disclosure Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
Zhangjie and willJ
|
|
| CVE-2021-34438 |
Windows Font Driver Host
|
Windows Font Driver Host Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
|
|
| CVE-2021-34455 |
Windows File History Service
|
Windows File History Service Elevation of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
Tao Yan (@Ga1ois) from Palo Alto Networks
|
|
| CVE-2021-33774 |
Windows Event Tracing
|
Windows Event Tracing Elevation of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
He YiSheng, Zhang WangJunJie, and Li WenYue of Hillstone Network Security Research Institute
|
|
| CVE-2021-33759 |
Windows Desktop Bridge
|
Windows Desktop Bridge Elevation of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
Tao Yan (@Ga1ois) from Palo Alto Networks
|
|
| CVE-2021-33756 |
Windows DNS Snap-in
|
Windows DNS Snap-in Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
|
|
| CVE-2021-33752 |
Windows DNS Snap-in
|
Windows DNS Snap-in Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
|
|
| CVE-2021-33750 |
Windows DNS Snap-in
|
Windows DNS Snap-in Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
|
|
| CVE-2021-33749 |
Windows DNS Snap-in
|
Windows DNS Snap-in Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
|
|
| CVE-2021-34525 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
|
|
| CVE-2021-34499 |
Windows DNS Server
|
Windows DNS Server Denial of Service Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No | - | |
| CVE-2021-34494 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
|
|
| CVE-2021-34444 |
Windows DNS Server
|
Windows DNS Server Denial of Service Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
Yuki Chen
Zhiyi Zhang And Liubenjin from Codesafe Team of Legendsec at Qi'anxin Group Ting Yu from CERT Team of Legendsec at Qi'anxin Group |
|
| CVE-2021-34442 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
Yuki Chen
ZhiyiZhang from Codesafe Team of Legendsec at Qi'anxin Group |
|
| CVE-2021-33780 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
|
|
| CVE-2021-33754 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
|
|
| CVE-2021-33746 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
|
|
| CVE-2021-33745 |
Windows DNS Server
|
Windows DNS Server Denial of Service Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
Yuki Chen
Ting Yu from CERT Team of Legendsec at Qi'anxin Group ZhiyiZhang from Codesafe Team of Legendsec at Qi'anxin Group |
|
| CVE-2021-34461 |
Windows Container Isolation FS Filter Driver
|
Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
k0shl
|
|
| CVE-2021-34488 |
Windows Console Driver
|
Windows Console Driver Elevation of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
Vbty
|
|
| CVE-2021-33784 |
Windows Cloud Files Mini Filter Driver
|
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No | - | |
| CVE-2021-34462 |
Windows AppX Deployment Extensions
|
Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
Tao Yan (@Ga1ois) working with Trend Micro Zero Day Initiative
|
|
| CVE-2021-34459 |
Windows AppContainer
|
Windows AppContainer Elevation Of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
Alex Ionescu, CrowdStrike Inc.
|
|
| CVE-2021-34504 |
Windows Address Book
|
Windows Address Book Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-07-13 | No |
Reported By
BOXER (@SecBoxer)
|