Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2020-17056 |
Windows Network File System
|
Windows Network File System Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2020-11-10 | No | - | |
| CVE-2020-17051 |
Windows Network File System
|
Windows Network File System Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
Soyeon Park - Microsoft Platform Security Assurance & Vulnerability Research
|
|
| CVE-2020-17047 |
Windows Network File System
|
Windows Network File System Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
|
2020-11-10 | No |
Reported By
Soyeon Park - Microsoft Platform Security Assurance & Vulnerability Research
|
|
| CVE-2020-17069 |
Windows NDIS
|
Windows NDIS Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2020-11-10 | No | ||
| CVE-2020-17030 |
Windows MSCTF Server
|
Windows MSCTF Server Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
WenQunWang of Codesafe Team of Legendsec at Qi'anxin Group
|
|
| CVE-2020-17045 |
Windows KernelStream
|
Windows KernelStream Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
nghiadt12(@nghiadt1098) from Viettel Cyber Security
|
|
| CVE-2020-17087 |
Windows Kernel Local
|
Windows Kernel Local Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
|
2020-11-10 | Yes |
Reported By
Microsoft would like to thank Qualys for co-ordinated vulnerability disclosure on identifying a regression for the Windows Server 2012 version of this security update.
Mateusz Jurczyk and Sergei Glazunov of Google Project Zero |
|
| CVE-2020-17035 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
|
|
| CVE-2020-17004 |
Windows Graphics Component
|
Windows Graphics Component Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
Jaeseung Choi, Kangsu Kim, Daejin Lee, and Sang Kil Cha of SoftSec Lab
|
|
| CVE-2020-17068 |
Windows GDI+
|
Windows GDI+ Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
yangkang (@dnpushme)
|
|
| CVE-2020-17036 |
Windows Function Discovery SSDP Provider
|
Windows Function Discovery SSDP Provider Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2020-11-10 | No | - | |
| CVE-2020-17046 |
Windows Error Reporting
|
Windows Error Reporting Denial of Service Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
|
2020-11-10 | No |
Reported By
Tao Yan (@Ga1ois) from Palo Alto Networks
|
|
| CVE-2020-17007 |
Windows Error Reporting
|
Windows Error Reporting Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
Tao Yan (@Ga1ois) from Palo Alto Networks
|
|
| CVE-2020-17071 |
Windows Delivery Optimization
|
Windows Delivery Optimization Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2020-11-10 | No | - | |
| CVE-2020-17088 |
Windows Common Log File System Driver
|
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
|
2020-11-10 | No | - | |
| CVE-2020-17024 |
Windows Client Side Rendering Print Provider
|
Windows Client Side Rendering Print Provider Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
JeongOh Kyea (kkokkokye) of THEORI
|
|
| CVE-2020-17029 |
Windows Canonical Display Driver
|
Windows Canonical Display Driver Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
|
|
| CVE-2020-17113 |
Windows Camera Codec
|
Windows Camera Codec Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
|
2020-11-10 | No |
Reported By
Wayne Low of Fortinet’s FortiGuard Lab
Ivan Fratric of Google Project Zero |
|
| CVE-2020-17012 |
Windows Bind Filter Driver
|
Windows Bind Filter Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
whoami working with Trend Micro's Zero Day Initiative
|
|
| CVE-2020-17038 |
Win32k
|
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
Guopengfei from Codesafe Team of Legendsec at Qi'anxin Group
|
|
| CVE-2020-17013 |
Win32k
|
Win32k Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
anhkgg
|
|
| CVE-2020-17010 |
Win32k
|
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
Jarvis_1oop of Pinduoduo Security Research Lab
JeongOh Kyea (@kkokkokye) of THEORI |
|
| CVE-2020-17102 |
WebP Image Extensions
|
WebP Image Extensions Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
Saif ElSherei of MSRC Vulnerabilities and Mitigations Team
|
|
| CVE-2020-16997 |
Remote Desktop Protocol Server
|
Remote Desktop Protocol Server Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
VictorV (Tang Tianwen)
|
|
| CVE-2020-17000 |
Remote Desktop Protocol Client
|
Remote Desktop Protocol Client Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
Ryelv of Tencent PC Manager
|
|
| CVE-2020-17086 |
Raw Image Extension
|
Raw Image Extension Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
Wayne Low of Fortinet’s FortiGuard Lab
|
|
| CVE-2020-17082 |
Raw Image Extension
|
Raw Image Extension Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
Wayne Low of Fortinet’s FortiGuard Lab
|
|
| CVE-2020-17079 |
Raw Image Extension
|
Raw Image Extension Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
Wayne Low of Fortinet’s FortiGuard Lab
|
|
| CVE-2020-17078 |
Raw Image Extension
|
Raw Image Extension Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
Wayne Low of Fortinet’s FortiGuard Lab
|
|
| CVE-2020-17091 |
Microsoft Teams
|
Microsoft Teams Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
|
|
| CVE-2020-17081 |
Microsoft Raw Image Extension
|
Microsoft Raw Image Extension Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
This vulnerability was discovered by Wayne Low of Fortinet’s FortiGuard Lab
|
|
| CVE-2020-17110 |
HEVC Video Extensions
|
HEVC Video Extensions Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
Dhanesh Kizhakkinan of FireEye Inc.
|
|
| CVE-2020-17109 |
HEVC Video Extensions
|
HEVC Video Extensions Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
Dhanesh Kizhakkinan of FireEye Inc
Le Huu Quang Linh (@linhlhq) from Vietnam National Cyber Security Center (NCSC Vietnam) |
|
| CVE-2020-17108 |
HEVC Video Extensions
|
HEVC Video Extensions Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
Dhanesh Kizhakkinan of FireEye Inc
|
|
| CVE-2020-17107 |
HEVC Video Extensions
|
HEVC Video Extensions Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
Dhanesh Kizhakkinan of FireEye Inc
|
|
| CVE-2020-17106 |
HEVC Video Extensions
|
HEVC Video Extensions Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
Dhanesh Kizhakkinan of FireEye Inc
|
|
| CVE-2020-17101 |
HEIF Image Extensions
|
HEIF Image Extensions Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
Dhanesh Kizhakkinan of FireEye Inc
|
|
| CVE-2020-16998 |
DirectX
|
DirectX Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
liuxiaoliang and pjf
|
|
| CVE-2020-17105 |
AV1 Video Extension
|
AV1 Video Extension Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2020-11-10 | No |
Reported By
Dhanesh Kizhakkinan of FireEye Inc.
Le Huu Quang Linh (@linhlhq) from Vietnam National Cyber Security Center (NCSC Vietnam) |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2008-3912 |
libclamav in ClamAV before 0.94 allows attackers to cause a
|
libclamav in ClamAV before 0.94 allows attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors related to an out-of-memory condition.
No CVSS vector published
|
2020-10-25 | - | - | |
| CVE-2007-2650 |
The OLE2 parser in Clam AntiVirus (ClamAV) allows remote attackers to cause a
|
The OLE2 parser in Clam AntiVirus (ClamAV) allows remote attackers to cause a denial of service (resource consumption) via an OLE2 file with (1) a large property size or (2) a loop in the FAT file block chain that triggers an infinite loop as demonstrated via a crafted DOC file.
No CVSS vector published
|
2020-10-25 | - | - | |
| CVE-2008-3913 |
Multiple memory leaks in freshclam/manager.c in ClamAV before 0.94 might allow attackers to cause a
|
Multiple memory leaks in freshclam/manager.c in ClamAV before 0.94 might allow attackers to cause a denial of service (memory consumption) via unspecified vectors related to "error handling logic".
No CVSS vector published
|
2020-10-25 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2020-17022 |
Microsoft Windows Codecs Library
|
Microsoft Windows Codecs Library Remote Code Execution Vulnerability
No CVSS vector published
|
2020-10-15 | No |
Reported By
|
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2020-16980 |
Windows iSCSI Target Service
|
Windows iSCSI Target Service Elevation of Privilege Vulnerability
No CVSS vector published
|
2020-10-13 | No |
Reported By
Xuefeng Li (@lxf02942370) & Zhiniang Peng (@edwardzpeng
|
|
| CVE-2020-16921 |
Windows Text Services Framework
|
Windows Text Services Framework Information Disclosure Vulnerability
No CVSS vector published
|
2020-10-13 | No |
Reported By
WenQunWang of Codesafe Team of Legendsec at Qi'anxin Group
|
|
| CVE-2020-16899 |
Windows TCP/IP
|
Windows TCP/IP Denial of Service Vulnerability
No CVSS vector published
|
2020-10-13 | No |
Reported By
Microsoft Platform Security Assurance & Vulnerability Research
|
|
| CVE-2020-16898 |
Windows TCP/IP
|
Windows TCP/IP Remote Code Execution Vulnerability
No CVSS vector published
|
2020-10-13 | No |
Reported By
Microsoft Platform Security Assurance & Vulnerability Research
|
|
| CVE-2020-16885 |
Windows Storage VSP Driver
|
Windows Storage VSP Driver Elevation of Privilege Vulnerability
No CVSS vector published
|
2020-10-13 | No | - | |
| CVE-2020-0764 |
Windows Storage Services
|
Windows Storage Services Elevation of Privilege Vulnerability
No CVSS vector published
|
2020-10-13 | No |
Reported By
Søren Fritzbøger (@fritzboger)
|
|
| CVE-2020-16908 |
Windows Setup
|
Windows Setup Elevation of Privilege Vulnerability
No CVSS vector published
|
2020-10-13 | No | - |