Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2021-1650 |
Windows Runtime C++ Template Library
|
Windows Runtime C++ Template Library Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
Zhiniang Peng(@edwardzpeng) & Xuefeng Li (@lxf02942370) of Sangfor Lights Lab
Fangming Gu (@afang5472) & Zhiniang Peng(@edwardzpeng) of Sangfor Lights Lab |
|
| CVE-2021-1702 |
Windows Remote Procedure Call Runtime
|
Windows Remote Procedure Call Runtime Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-1672 |
Windows Projected File System FS Filter Driver
|
Windows Projected File System FS Filter Driver Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
k0shl
|
|
| CVE-2021-1670 |
Windows Projected File System FS Filter Driver
|
Windows Projected File System FS Filter Driver Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
k0shl
|
|
| CVE-2021-1663 |
Windows Projected File System FS Filter Driver
|
Windows Projected File System FS Filter Driver Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
k0shl
|
|
| CVE-2021-1695 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
JeongOh Kyea of THEORI working with Trend Micro Zero Day Initiative
|
|
| CVE-2021-1676 |
Windows NT Lan Manager Datagram Receiver Driver
|
Windows NT Lan Manager Datagram Receiver Driver Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-01-12 | No | ||
| CVE-2021-1689 |
Windows Multipoint Management
|
Windows Multipoint Management Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
|
|
| CVE-2021-1706 |
Windows LUAFV
|
Windows LUAFV Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
James Forshaw of Google Project Zero
|
|
| CVE-2021-1682 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
rj0w
Min Li |
|
| CVE-2021-1661 |
Windows Installer
|
Windows Installer Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
|
|
| CVE-2021-1697 |
Windows InstallService
|
Windows InstallService Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
JeongOh Kyea of THEORI working with Trend Micro Zero Day Initiative
|
|
| CVE-2021-1704 |
Windows Hyper-V
|
Windows Hyper-V Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
@EranShimony CyberaArk
|
|
| CVE-2021-1692 |
Windows Hyper-V
|
Windows Hyper-V Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
Wei
|
|
| CVE-2021-1691 |
Windows Hyper-V
|
Windows Hyper-V Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
Wei
|
|
| CVE-2021-1696 |
Windows Graphics Component
|
Windows Graphics Component Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
yangkang(@dnpushme)
|
|
| CVE-2021-1708 |
Windows GDI+
|
Windows GDI+ Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
yangkang(@dnpushme)
|
|
| CVE-2021-1657 |
Windows Fax Compose Form
|
Windows Fax Compose Form Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
Tran Van Khang – khangkito (VinCSS)
|
|
| CVE-2021-1662 |
Windows Event Tracing
|
Windows Event Tracing Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
madongze(@YanZiShuang) of DBAPPSecurity Co., Ltd
|
|
| CVE-2021-1703 |
Windows Event Logging Service
|
Windows Event Logging Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
Ronen Haber (Palo Alto Networks)
|
|
| CVE-2021-1645 |
Windows Docker
|
Windows Docker Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
|
|
| CVE-2021-1637 |
Windows DNS Query
|
Windows DNS Query Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
pgboy of 360vulcan(https://weibo.com/pgboy1988)
|
|
| CVE-2021-1679 |
Windows CryptoAPI
|
Windows CryptoAPI Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No | - | |
| CVE-2021-1693 |
Windows CSC Service
|
Windows CSC Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
Anonymous finder
|
|
| CVE-2021-1688 |
Windows CSC Service
|
Windows CSC Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
|
|
| CVE-2021-1659 |
Windows CSC Service
|
Windows CSC Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
|
|
| CVE-2021-1655 |
Windows CSC Service
|
Windows CSC Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No | - | |
| CVE-2021-1654 |
Windows CSC Service
|
Windows CSC Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No | - | |
| CVE-2021-1653 |
Windows CSC Service
|
Windows CSC Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No | - | |
| CVE-2021-1652 |
Windows CSC Service
|
Windows CSC Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No | - | |
| CVE-2021-1685 |
Windows AppX Deployment Extensions
|
Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
JeongOh Kyea of THEORI working with Trend Micro Zero Day Initiative
|
|
| CVE-2021-1642 |
Windows AppX Deployment Extensions
|
Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
Sai Wynn Myat (@404death) of Yoma Bank Limited
Abdelhamid Naceri (halov) working with Trend Micro Zero Day Initiative |
|
| CVE-2021-1699 |
Windows (modem.sys)
|
Windows (modem.sys) Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
Walied Assar
https://twitter.com/waleedassar
|
|
| CVE-2021-1656 |
TPM Device Driver
|
TPM Device Driver Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
Walied Assar
https://twitter.com/waleedassar
|
|
| CVE-2021-1701 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-1700 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-1673 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-1671 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-1667 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-1666 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-1664 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-1660 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-1658 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
Yuki Chen
|
|
| CVE-2021-1648 |
Microsoft splwow64
|
Microsoft splwow64 Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2021-01-12 | No |
Reported By
k0shl
Elliot Cao (@iamelli0t) working with Trend Micro Zero Day Initiative” with “Lucas Leong (@_wmliang_) of Trend Micro's Zero Day Initiative Maddie Stone of Google Project Zero |
|
| CVE-2021-1710 |
Microsoft Windows Media Foundation
|
Microsoft Windows Media Foundation Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
yangkang(@dnpushme)
|
|
| CVE-2021-1636 |
Microsoft SQL
|
Microsoft SQL Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No | - | |
| CVE-2021-1668 |
Microsoft DTV-DVD Video Decoder
|
Microsoft DTV-DVD Video Decoder Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
yangkang (@dnpushme)
|
|
| CVE-2021-1644 |
HEVC Video Extensions
|
HEVC Video Extensions Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
Le Huu Quang Linh (@linhlhq) from Vietnam National Cyber Security Center (NCSC Vietnam)
|
|
| CVE-2021-1643 |
HEVC Video Extensions
|
HEVC Video Extensions Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2021-01-12 | No |
Reported By
Le Huu Quang Linh (@linhlhq) from Vietnam National Cyber Security Center (NCSC Vietnam)
Dhanesh Kizhakkinan of FireEye Inc |
|
| CVE-2021-1665 |
GDI+
|
GDI+ Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2021-01-12 | No |
Reported By
yangkang(@dnpushme)
Hardik Shah of McAfee |