Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2022-41045 |
Windows Advanced Local Procedure Call (ALPC)
|
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-11-08 | No |
Reported By
|
|
| CVE-2022-41097 |
Network Policy Server (NPS) RADIUS Protocol
|
Network Policy Server (NPS) RADIUS Protocol Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-11-08 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-41056 |
Network Policy Server (NPS) RADIUS Protocol
|
Network Policy Server (NPS) RADIUS Protocol Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-11-08 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-38023 |
Netlogon RPC
|
Netlogon RPC Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-11-08 | No | - | |
| CVE-2022-41120 |
Microsoft Windows System Monitor (Sysmon)
|
Microsoft Windows System Monitor (Sysmon) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-11-08 | No |
Reported By
Filip Dragovic with Infigo IS
|
|
| CVE-2022-41048 |
Microsoft ODBC Driver
|
Microsoft ODBC Driver Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-11-08 | No |
Reported By
Haifei Li with CyberKL Kunlun Lab
|
|
| CVE-2022-41047 |
Microsoft ODBC Driver
|
Microsoft ODBC Driver Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-11-08 | No |
Reported By
Haifei Li with CyberKL Kunlun Lab
|
|
| CVE-2022-41096 |
Microsoft DWM Core Library
|
Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-11-08 | No |
Reported By
Keqi Hu
|
|
| CVE-2022-41066 |
Microsoft Business Central
|
Microsoft Business Central Information Disclosure Vulnerability
CVSS vector: AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-11-08 | No | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2022-38034 |
Windows Workstation Service
|
Windows Workstation Service Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
Stiv Kupchik with Akamai
|
|
| CVE-2022-37986 |
Windows Win32k
|
Windows Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
Marcin Wiazowski working with Trend Micro Zero Day Initiative
|
|
| CVE-2022-37984 |
Windows WLAN Service
|
Windows WLAN Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
George Hughey with MSRC Vulnerabilities and Mitigations
|
|
| CVE-2022-38030 |
Windows USB Serial Driver
|
Windows USB Serial Driver Information Disclosure Vulnerability
CVSS vector: AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
Martin Zak with Zaber Technologies Inc.
|
|
| CVE-2022-33645 |
Windows TCP/IP Driver
|
Windows TCP/IP Driver Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
luoquan
|
|
| CVE-2022-38027 |
Windows Storage
|
Windows Storage Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No | - | |
| CVE-2022-38045 |
Windows Server Service
|
Windows Server Service Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
|
|
| CVE-2022-38033 |
Windows Server Remotely Accessible Registry Keys
|
Windows Server Remotely Accessible Registry Keys Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
|
2022-10-11 | No |
Reported By
|
|
| CVE-2022-38043 |
Windows Security Support Provider Interface
|
Windows Security Support Provider Interface Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-10-11 | No | ||
| CVE-2022-38041 |
Windows Secure Channel
|
Windows Secure Channel Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
Microsoft Offensive Research & Security Engineering
|
|
| CVE-2022-38003 |
Windows Resilient File System
|
Windows Resilient File System Elevation of Privilege
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2022-38028 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
National Security Agency
|
|
| CVE-2022-41081 |
Windows Point-to-Point Tunneling Protocol
|
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
|
|
| CVE-2022-38047 |
Windows Point-to-Point Tunneling Protocol
|
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-38000 |
Windows Point-to-Point Tunneling Protocol
|
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2022-10-11 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-37965 |
Windows Point-to-Point Tunneling Protocol
|
Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No | - | |
| CVE-2022-33634 |
Windows Point-to-Point Tunneling Protocol
|
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
|
|
| CVE-2022-30198 |
Windows Point-to-Point Tunneling Protocol
|
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No | ||
| CVE-2022-24504 |
Windows Point-to-Point Tunneling Protocol
|
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No | ||
| CVE-2022-22035 |
Windows Point-to-Point Tunneling Protocol
|
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No | ||
| CVE-2022-37974 |
Windows Mixed Reality Developer Tools
|
Windows Mixed Reality Developer Tools Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
Microsoft Offensive Research & Security Engineering (MORSE)
|
|
| CVE-2022-37998 |
Windows Local Session Manager (LSM)
|
Windows Local Session Manager (LSM) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
|
|
| CVE-2022-37973 |
Windows Local Session Manager (LSM)
|
Windows Local Session Manager (LSM) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
|
|
| CVE-2022-38016 |
Windows Local Security Authority (LSA)
|
Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No | - | |
| CVE-2022-37996 |
Windows Kernel Memory
|
Windows Kernel Memory Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
Wen with Kunlun Lab
|
|
| CVE-2022-38039 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
Mateusz Jurczyk of Google Project Zero
|
|
| CVE-2022-38038 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
Mateusz Jurczyk of Google Project Zero
|
|
| CVE-2022-38037 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
Mateusz Jurczyk of Google Project Zero
|
|
| CVE-2022-38022 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
|
2022-10-11 | No | ||
| CVE-2022-37995 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
|
|
| CVE-2022-37991 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
Mateusz Jurczyk of Google Project Zero
|
|
| CVE-2022-37990 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
Mateusz Jurczyk of Google Project Zero
|
|
| CVE-2022-37988 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
Mateusz Jurczyk of Google Project Zero
|
|
| CVE-2022-37979 |
Windows Hyper-V
|
Windows Hyper-V Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No | - | |
| CVE-2022-37999 |
Windows Group Policy Preference Client
|
Windows Group Policy Preference Client Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
Giuseppe Trotta
|
|
| CVE-2022-37994 |
Windows Group Policy Preference Client
|
Windows Group Policy Preference Client Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
Andrea Pierini (@decoder_it) with Semperis
|
|
| CVE-2022-37993 |
Windows Group Policy Preference Client
|
Windows Group Policy Preference Client Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
Andrea Pierini (@decoder_it) with Semperis
|
|
| CVE-2022-37975 |
Windows Group Policy
|
Windows Group Policy Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
Andrea Pierini (@decoder_it) with Semperis
|
|
| CVE-2022-38051 |
Windows Graphics Component
|
Windows Graphics Component Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2022-10-11 | No |
Reported By
|
|
| CVE-2022-37997 |
Windows Graphics Component
|
Windows Graphics Component Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
Simon Zuckerbraun of Trend Micro Zero Day Initiative
|
|
| CVE-2022-37985 |
Windows Graphics Component
|
Windows Graphics Component Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-10-11 | No |
Reported By
Bing Sun and Jin Liu
|