Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2021-26416 |
Windows Hyper-V
|
Windows Hyper-V Denial of Service Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No | - | |
| CVE-2021-28350 |
Windows GDI+
|
Windows GDI+ Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
@expend20
|
|
| CVE-2021-28349 |
Windows GDI+
|
Windows GDI+ Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
@expend20
|
|
| CVE-2021-28348 |
Windows GDI+
|
Windows GDI+ Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
@expend20
|
|
| CVE-2021-28318 |
Windows GDI+
|
Windows GDI+ Information Disclosure Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Zhangjie and willJ
|
|
| CVE-2021-28435 |
Windows Event Tracing
|
Windows Event Tracing Information Disclosure Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Wen
|
|
| CVE-2021-27088 |
Windows Event Tracing
|
Windows Event Tracing Elevation of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Zhang WangJunJie and He YiSheng of Hillstone Network Neuron Security Team
Yuki Chen Jarvis_1oop ziming zhang of Ant Security Light-Year Lab Wen |
|
| CVE-2021-28328 |
Windows DNS
|
Windows DNS Information Disclosure Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Quan Luo from Codesafe Team of Legendsec at Qi'anxin Group
|
|
| CVE-2021-28323 |
Windows DNS
|
Windows DNS Information Disclosure Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Quan Luo from Codesafe Team of Legendsec at Qi'anxin Group
|
|
| CVE-2021-28443 |
Windows Console Driver
|
Windows Console Driver Denial of Service Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
nghiadt12 (@nghiadt1098) from Viettel Cyber Security
|
|
| CVE-2021-28438 |
Windows Console Driver
|
Windows Console Driver Denial of Service Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
|
|
| CVE-2021-28311 |
Windows Application Compatibility Cache
|
Windows Application Compatibility Cache Denial of Service Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
lm0963 & hackyzh at Zion Lab and YanZiShuang of DBAppSecurity
|
|
| CVE-2021-28326 |
Windows AppX Deployment Server
|
Windows AppX Deployment Server Denial of Service Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Abdelhamid Naceri (halov) working with Trend Micro's Zero Day Initiative
|
|
| CVE-2021-28310 |
Win32k
|
Win32k Elevation of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
|
2021-04-13 | Yes |
Reported By
Boris Larin (Oct0xor) of Kaspersky Lab
|
|
| CVE-2021-27072 |
Win32k
|
Win32k Elevation of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
|
|
| CVE-2021-28434 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-28358 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-28357 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-28356 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-28355 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-28354 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-28353 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-28352 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-28346 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-28345 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-28344 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-28343 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-28342 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-28341 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-28340 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-28339 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-28338 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-28337 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Yuki Chen of Vulcan Team
|
|
| CVE-2021-28336 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-28335 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-28334 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-28333 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-28332 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-28331 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-28330 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-28329 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-28327 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No | - | |
| CVE-2021-28468 |
Raw Image Extension
|
Raw Image Extension Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
|
|
| CVE-2021-28466 |
Raw Image Extension
|
Raw Image Extension Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Wenguang Jiao
Zhihua Yao, lm0963 and CSZQ of DBAPPSecurity Zion Lab |
|
| CVE-2021-27091 |
RPC Endpoint Mapper Service
|
RPC Endpoint Mapper Service Elevation of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2021-04-13 | No | - | |
| CVE-2021-27096 |
NTFS
|
NTFS Elevation of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
|
|
| CVE-2021-28317 |
Microsoft Windows Codecs Library
|
Microsoft Windows Codecs Library Information Disclosure Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
Josh Gunter, Microsoft Platform Security Assurance & Vulnerability Research
Zhangjie and willJ |
|
| CVE-2021-27089 |
Microsoft Internet Messaging API
|
Microsoft Internet Messaging API Remote Code Execution Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
lm0963 and hackyzh at Zion Lab of DBAppSecurity
|
|
| CVE-2021-28322 |
Diagnostics Hub Standard Collector Service
|
Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
|
|
| CVE-2021-28321 |
Diagnostics Hub Standard Collector Service
|
Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
|