Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2021-28313 |
Diagnostics Hub Standard Collector Service
|
Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-04-13 | No |
Reported By
|
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2021-29650 |
An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a
|
An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value aka CID-175e476b8cdf.
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
2021-04-06 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2021-27077 |
Windows Win32k
|
Windows Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2021-03-09 | No |
Reported By
Marcin Wiazowski working with Trend Micro Zero Day Initiative
|
|
| CVE-2021-26900 |
Windows Win32k
|
Windows Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
JeongOh Kyea (@kkokkokye) of THEORI working with Trend Micro Zero Day Initiative
|
|
| CVE-2021-26875 |
Windows Win32k
|
Windows Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
Mark Rogers of PowerMapper Software
|
|
| CVE-2021-26863 |
Windows Win32k
|
Windows Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
Mateusz Jurczyk of Google Project Zero
|
|
| CVE-2021-26885 |
Windows WalletService
|
Windows WalletService Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
|
|
| CVE-2021-26871 |
Windows WalletService
|
Windows WalletService Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
|
|
| CVE-2021-26864 |
Windows Virtual Registry Provider
|
Windows Virtual Registry Provider Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
James Forshaw of Google Project Zero
|
|
| CVE-2021-26873 |
Windows User Profile Service
|
Windows User Profile Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
Abdelhamid Naceri (halov) working with Trend Micro Zero Day Initiative
|
|
| CVE-2021-1729 |
Windows Update Stack Setup
|
Windows Update Stack Setup Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
Abdelhamid Naceri (halov) working with Trend Micro Zero Day Initiative
|
|
| CVE-2021-26889 |
Windows Update Stack
|
Windows Update Stack Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
Abdelhamid Naceri (halov) working with Trend Micro Zero Day Initiative
|
|
| CVE-2021-26866 |
Windows Update Service
|
Windows Update Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
Abdelhamid Naceri (halov) working with Trend Micro Zero Day Initiative
|
|
| CVE-2021-26899 |
Windows UPnP Device Host
|
Windows UPnP Device Host Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-26870 |
Windows Projected File System
|
Windows Projected File System Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
|
|
| CVE-2021-26878 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
This vulnerability was discovered by Bryan de Houwer and Thibault van Geluwe de Berlaere.
x |
|
| CVE-2021-1640 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
Blaz Satler and Ziga Sumenjak of 0patch
JeongOh Kyea (@kkokkokye) of THEORI working with Trend Micro Zero Day Initiative |
|
| CVE-2021-26874 |
Windows Overlay Filter
|
Windows Overlay Filter Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
James Forshaw of Google Project Zero
|
|
| CVE-2021-26879 |
Windows Network Address Translation (NAT)
|
Windows Network Address Translation (NAT) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
Huichen Lin and Dong Seong Kim of School of Information Technology and Electrical Engineering - The University of Queensland
|
|
| CVE-2021-26884 |
Windows Media Photo Codec
|
Windows Media Photo Codec Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
Worawit Wangwarunyoo of Datafarm
|
|
| CVE-2021-26862 |
Windows Installer
|
Windows Installer Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
Abdelhamid Naceri (halov) working with Trend Micro Zero Day Initiative
|
|
| CVE-2021-26867 |
Windows Hyper-V
|
Windows Hyper-V Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
|
|
| CVE-2021-26868 |
Windows Graphics Component
|
Windows Graphics Component Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
liuxiaoliang and pjf
|
|
| CVE-2021-26861 |
Windows Graphics Component
|
Windows Graphics Component Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
Zhihua Yao, lm0963, and CSZQ of DBAPPSecurity Zion Lab
|
|
| CVE-2021-26901 |
Windows Event Tracing
|
Windows Event Tracing Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-26898 |
Windows Event Tracing
|
Windows Event Tracing Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-26872 |
Windows Event Tracing
|
Windows Event Tracing Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-24107 |
Windows Event Tracing
|
Windows Event Tracing Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
Yarden Shafir @yarden_shafir
|
|
| CVE-2021-24090 |
Windows Error Reporting
|
Windows Error Reporting Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
Gal De Leon (@galdeleon) of Palo Alto Networks
|
|
| CVE-2021-27063 |
Windows DNS Server
|
Windows DNS Server Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No | - | |
| CVE-2021-26897 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No | - | |
| CVE-2021-26896 |
Windows DNS Server
|
Windows DNS Server Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No | - | |
| CVE-2021-26895 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
Nicolas Joly of Microsoft Corporation
|
|
| CVE-2021-26894 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
Nicolas Joly of Microsoft Corporation
|
|
| CVE-2021-26893 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
Nicolas Joly of Microsoft Corporation
|
|
| CVE-2021-26877 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
Microsoft Platform Security & Vulnerability Research
|
|
| CVE-2021-26891 |
Windows Container Execution Agent
|
Windows Container Execution Agent Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
James Forshaw of Google Project Zero
|
|
| CVE-2021-26865 |
Windows Container Execution Agent
|
Windows Container Execution Agent Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
James Forshaw of Google Project Zero
|
|
| CVE-2021-26860 |
Windows App-V Overlay Filter
|
Windows App-V Overlay Filter Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
James Forshaw of Google Project Zero
|
|
| CVE-2021-26869 |
Windows ActiveX Installer Service
|
Windows ActiveX Installer Service Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
|
|
| CVE-2021-27070 |
Windows 10 Update Assistant
|
Windows 10 Update Assistant Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
Abdelhamid Naceri (halov) working with Trend Micro Zero Day Initiative
|
|
| CVE-2021-26886 |
User Profile Service
|
User Profile Service Denial of Service Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
Abdelhamid Naceri working with Trend Micro Zero Day Initiative
|
|
| CVE-2021-26880 |
Storage Spaces Controller
|
Storage Spaces Controller Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
nghiadt12 (@nghiadt1098) from Viettel Cyber Security
anonymous JeongOh Kyea (@kkokkokye) of THEORI |
|
| CVE-2021-26882 |
Remote Access API
|
Remote Access API Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
|
|
| CVE-2021-26876 |
OpenType Font Parsing
|
OpenType Font Parsing Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
Arlie Davis - Windows / Azure Safe Systems Programming Languages Team
Keqi Hu |
|
| CVE-2021-26881 |
Microsoft Windows Media Foundation
|
Microsoft Windows Media Foundation Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
HAO LI of VenusTech ADLab
|
|
| CVE-2021-26887 |
Microsoft Windows Folder Redirection
|
Microsoft Windows Folder Redirection Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
somaro
|
|
| CVE-2021-26859 |
Microsoft Power BI
|
Microsoft Power BI Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
Maxime ESCOURBIAC of Michelin CERT
|
|
| CVE-2021-27085 |
Internet Explorer
|
Internet Explorer Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:P/RL:O/RC:C
|
2021-03-09 | Yes |
Reported By
Chi-Yu You and Dhanesh Kizhakkinan of FireEye Inc.
|
|
| CVE-2021-27062 |
HEVC Video Extensions
|
HEVC Video Extensions Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-03-09 | No |
Reported By
Le Huu Quang Linh (@linhlhq) from Vietnam National Cyber Security Center (NCSC Vietnam)
|