Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2022-34730 |
Microsoft ODBC Driver
|
Microsoft ODBC Driver Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-09-13 | No |
Reported By
Haifei Li with CyberKL Kunlun Lab
|
|
| CVE-2022-34727 |
Microsoft ODBC Driver
|
Microsoft ODBC Driver Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-09-13 | No |
Reported By
Haifei Li with CyberKL Kunlun Lab
|
|
| CVE-2022-34726 |
Microsoft ODBC Driver
|
Microsoft ODBC Driver Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-09-13 | No |
Reported By
Haifei Li with CyberKL Kunlun Lab
|
|
| CVE-2022-35805 |
Microsoft Dynamics CRM (on-premises)
|
Microsoft Dynamics CRM (on-premises) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-09-13 | No |
Reported By
|
|
| CVE-2022-34700 |
Microsoft Dynamics CRM (on-premises)
|
Microsoft Dynamics CRM (on-premises) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-09-13 | No |
Reported By
|
|
| CVE-2022-35838 |
HTTP V3
|
HTTP V3 Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-09-13 | No |
Reported By
|
|
| CVE-2022-37954 |
DirectX Graphics Kernel
|
DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-09-13 | No |
Reported By
Anonymous working with Trend Micro Zero Day Initiative
|
|
| CVE-2022-38019 |
AV1 Video Extension
|
AV1 Video Extension Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-09-13 | No |
Reported By
|
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2022-27664 |
In net/http in Go before 1.18.6 and 1.19.x before 1.19.1 attackers can cause a
|
In net/http in Go before 1.18.6 and 1.19.x before 1.19.1 attackers can cause a denial of service because an HTTP/2 connection can hang during closing if shutdown were preempted by a fatal error.
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2022-09-09 | - | - | |
| CVE-2022-39190 |
An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A
|
An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
2022-09-09 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2022-34699 |
Windows Win32k
|
Windows Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
Bruno PUJOS (@brunopujos) from REverse Tactics working with Trend Micro Zero Day Initiative
|
|
| CVE-2022-30194 |
Windows WebBrowser Control
|
Windows WebBrowser Control Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
Eduardo Braun Prado working with Trend Micro Zero Day Initiative
|
|
| CVE-2022-35794 |
Windows Secure Socket Tunneling Protocol (SSTP)
|
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-35767 |
Windows Secure Socket Tunneling Protocol (SSTP)
|
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-35766 |
Windows Secure Socket Tunneling Protocol (SSTP)
|
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-35753 |
Windows Secure Socket Tunneling Protocol (SSTP)
|
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-35752 |
Windows Secure Socket Tunneling Protocol (SSTP)
|
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-35745 |
Windows Secure Socket Tunneling Protocol (SSTP)
|
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-34714 |
Windows Secure Socket Tunneling Protocol (SSTP)
|
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-34702 |
Windows Secure Socket Tunneling Protocol (SSTP)
|
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-34701 |
Windows Secure Socket Tunneling Protocol (SSTP)
|
Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-35793 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
Xuefeng Li with Sangfor
|
|
| CVE-2022-35755 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
Xuefeng Li with Sangfor
|
|
| CVE-2022-35769 |
Windows Point-to-Point Protocol (PPP)
|
Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-35747 |
Windows Point-to-Point Protocol (PPP)
|
Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-35744 |
Windows Point-to-Point Protocol (PPP)
|
Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-30133 |
Windows Point-to-Point Protocol (PPP)
|
Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
Azure Yang with Kunlun Lab
|
|
| CVE-2022-34703 |
Windows Partition Management Driver
|
Windows Partition Management Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
nhiadt12 from Viettel Cyber Security working with Trend Micro Zero Day Initiative
|
|
| CVE-2022-33670 |
Windows Partition Management Driver
|
Windows Partition Management Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
vinhthp1712 working with Trend Micro Zero Day Initiative
|
|
| CVE-2022-34715 |
Windows Network File System
|
Windows Network File System Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
Arimura
|
|
| CVE-2022-35759 |
Windows Local Security Authority (LSA)
|
Windows Local Security Authority (LSA) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
bee13oy with Cyber Kunlun Lab
|
|
| CVE-2022-34706 |
Windows Local Security Authority (LSA)
|
Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
bee13oy with Cyber Kunlun Lab
|
|
| CVE-2022-35758 |
Windows Kernel Memory
|
Windows Kernel Memory Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-08-09 | No | - | |
| CVE-2022-35768 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
Mateusz Jurczyk of Google Project Zero
|
|
| CVE-2022-35761 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
|
|
| CVE-2022-34708 |
Windows Kernel
|
Windows Kernel Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
Mateusz Jurczyk of Google Project Zero
|
|
| CVE-2022-34707 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
Mateusz Jurczyk of Google Project Zero
|
|
| CVE-2022-30197 |
Windows Kernel
|
Windows Kernel Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
Jarvis_1oop of vulnerability research institute
|
|
| CVE-2022-35751 |
Windows Hyper-V
|
Windows Hyper-V Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
liuquan of K360 Security
Phan Thanh Duy (@PTDuy), Le Huu Quang Linh (@linhlhq) of STAR Labs working with Trend Micro Zero Day Initiative Yongil Lee with SSD Secure Disclosure |
|
| CVE-2022-34696 |
Windows Hyper-V
|
Windows Hyper-V Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
PETER HLAVATY with Fruit your Game
|
|
| CVE-2022-34690 |
Windows Fax Service
|
Windows Fax Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
|
|
| CVE-2022-35795 |
Windows Error Reporting Service
|
Windows Error Reporting Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
Anonymous
|
|
| CVE-2022-35749 |
Windows Digital Media Receiver
|
Windows Digital Media Receiver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
Zhiniang Peng with Sangfor
|
|
| CVE-2022-35746 |
Windows Digital Media Receiver
|
Windows Digital Media Receiver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
Xuefeng Li (@lxf02942370) & Zhiniang Peng (@edwardzpeng) of Sangfor
|
|
| CVE-2022-35757 |
Windows Cloud Files Mini Filter Driver
|
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
QueryX Team with THEORI
|
|
| CVE-2022-30144 |
Windows Bluetooth Service
|
Windows Bluetooth Service Remote Code Execution Vulnerability
CVSS vector: AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No | ||
| CVE-2022-35820 |
Windows Bluetooth Driver
|
Windows Bluetooth Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
T0 working with Trend Micro Zero Day Initiative
|
|
| CVE-2022-35750 |
Win32k
|
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
Marcin Wiazowski working with Trend Micro Zero Day Initiative
|
|
| CVE-2022-35754 |
Unified Write Filter
|
Unified Write Filter Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2022-36123 |
The Linux kernel before 5.18.13 lacks a certain clear operation for the block starting symbol (.bss). This allows Xen PV guest OS users to cause a
|
The Linux kernel before 5.18.13 lacks a certain clear operation for the block starting symbol (.bss). This allows Xen PV guest OS users to cause a denial of service or gain privileges.
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
2022-08-09 | - | - |