Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2022-35792 |
Storage Spaces Direct
|
Storage Spaces Direct Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No | - | |
| CVE-2022-35765 |
Storage Spaces Direct
|
Storage Spaces Direct Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No | - | |
| CVE-2022-35764 |
Storage Spaces Direct
|
Storage Spaces Direct Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No | - | |
| CVE-2022-35763 |
Storage Spaces Direct
|
Storage Spaces Direct Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No | - | |
| CVE-2022-35762 |
Storage Spaces Direct
|
Storage Spaces Direct Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No | - | |
| CVE-2022-35804 |
SMB Client and Server
|
SMB Client and Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No | - | |
| CVE-2022-35743 |
Microsoft Windows Support Diagnostic Tool (MSDT)
|
Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2022-08-09 | No |
Reported By
|
|
| CVE-2022-34713 |
Microsoft Windows Support Diagnostic Tool (MSDT)
|
Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
|
2022-08-09 | Yes |
Reported By
|
|
| CVE-2022-35760 |
Microsoft ATA Port Driver
|
Microsoft ATA Port Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
George Hughey with MSRC Vulnerabilities and Mitigations
|
|
| CVE-2022-35748 |
HTTP.sys
|
HTTP.sys Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
|
|
| CVE-2022-34691 |
Active Directory Domain Services
|
Active Directory Domain Services Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-08-09 | No |
Reported By
k0shl with Kunlun Lab
Zoltan Harmath of Microsoft Oliver Lyak (@ly4k_) working with Trend Micro Zero Day Initiative |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2022-36946 |
nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a
|
nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because in the case of an nf_queue verdict with a one-byte nfta_payload attribute an skb_pull can encounter a negative skb->len.
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2022-08-05 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2022-33744 |
Arm guests can cause Dom0 DoS via PV devices When mapping pages of guests on Arm dom0 is using an rbtree to keep track of the foreign mappings. Updating of that rbtree is not always done completely with the related lock held resulting in a small race window which can be used by unprivileged guests via PV devices to cause inconsistencies of the rbtree. These inconsistencies can lead to
|
Arm guests can cause Dom0 DoS via PV devices When mapping pages of guests on Arm dom0 is using an rbtree to keep track of the foreign mappings. Updating of that rbtree is not always done completely with the related lock held resulting in a small race window which can be used by unprivileged guests via PV devices to cause inconsistencies of the rbtree. These inconsistencies can lead to Denial of Service (DoS) of dom0 e.g. by causing crashes or the inability to perform further mappings of other guests' memory pages.
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
|
2022-07-19 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2022-33644 |
Xbox Live Save Service
|
Xbox Live Save Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
Jarvis_1oop
|
|
| CVE-2022-22045 |
Windows.Devices.Picker.dll
|
Windows.Devices.Picker.dll Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-07-12 | No | - | |
| CVE-2022-30222 |
Windows Shell
|
Windows Shell Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
Krzysztof Andrusiak
|
|
| CVE-2022-30208 |
Windows Security Account Manager (SAM)
|
Windows Security Account Manager (SAM) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
bee13oy with Cyber Kunlun Lab
|
|
| CVE-2022-30226 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
|
|
| CVE-2022-30206 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
|
|
| CVE-2022-22041 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2022-07-12 | No |
Reported By
JeongOh Kyea with THEORI
|
|
| CVE-2022-22022 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
|
|
| CVE-2022-22039 |
Windows Network File System
|
Windows Network File System Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-22029 |
Windows Network File System
|
Windows Network File System Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-22028 |
Windows Network File System
|
Windows Network File System Information Disclosure Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-30225 |
Windows Media Player Network Sharing Service
|
Windows Media Player Network Sharing Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
JIWO Technology Co., Ltd
|
|
| CVE-2022-30211 |
Windows Layer 2 Tunneling Protocol (L2TP)
|
Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
Alex Nichols with Nettitude
|
|
| CVE-2022-21845 |
Windows Kernel
|
Windows Kernel Information Disclosure Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-07-12 | No | - | |
| CVE-2022-22025 |
Windows Internet Information Services Cachuri Module
|
Windows Internet Information Services Cachuri Module Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
|
|
| CVE-2022-30209 |
Windows IIS Server
|
Windows IIS Server Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
|
|
| CVE-2022-30223 |
Windows Hyper-V
|
Windows Hyper-V Information Disclosure Vulnerability
CVSS vector: AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
luoquan
|
|
| CVE-2022-22042 |
Windows Hyper-V
|
Windows Hyper-V Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
Luoquan
|
|
| CVE-2022-30205 |
Windows Group Policy
|
Windows Group Policy Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
Matthieu Buffet
|
|
| CVE-2022-30221 |
Windows Graphics Component
|
Windows Graphics Component Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
Colas Le Guernic, Jeremy Rubert, and Anonymous with Thalium
|
|
| CVE-2022-22034 |
Windows Graphics Component
|
Windows Graphics Component Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2022-07-12 | No |
Reported By
Marcin Wiazowski working with Trend Micro Zero Day Initiative
|
|
| CVE-2022-30213 |
Windows GDI+
|
Windows GDI+ Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
willJ of vulnerability research institute
|
|
| CVE-2022-22050 |
Windows Fax Service
|
Windows Fax Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
|
|
| CVE-2022-22027 |
Windows Fax Service
|
Windows Fax Service Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
TJ with FuzzWorks
|
|
| CVE-2022-22024 |
Windows Fax Service
|
Windows Fax Service Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
Xuefeng Li with Sangfor
|
|
| CVE-2022-22043 |
Windows Fast FAT File System Driver
|
Windows Fast FAT File System Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-07-12 | No | ||
| CVE-2022-30214 |
Windows DNS Server
|
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
George Hughey with MSRC Vulnerabilities and Mitigations
|
|
| CVE-2022-22031 |
Windows Credential Guard Domain-joined Public Key
|
Windows Credential Guard Domain-joined Public Key Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
James Forshaw with Google Project Zero
|
|
| CVE-2022-30212 |
Windows Connected Devices Platform Service
|
Windows Connected Devices Platform Service Information Disclosure Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
JIWO Technology Co., Ltd
|
|
| CVE-2022-30220 |
Windows Common Log File System Driver
|
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-07-12 | No | ||
| CVE-2022-22049 |
Windows Client Server Run-time Subsystem (CSRSS)
|
Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
Sergei Glazunov with Google Project Zero
|
|
| CVE-2022-22047 |
Windows Client Server Run-time Subsystem (CSRSS)
|
Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-07-12 | Yes |
Reported By
Microsoft Threat Intelligence Center (MSTIC)
Microsoft Security Response Center (MSRC)
|
|
| CVE-2022-22026 |
Windows Client Server Run-time Subsystem (CSRSS)
|
Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
Sergei Glazunov with Google Project Zero
|
|
| CVE-2022-22711 |
Windows BitLocker
|
Windows BitLocker Information Disclosure Vulnerability
CVSS vector: AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
|
2022-07-12 | No | - | |
| CVE-2022-30224 |
Windows Advanced Local Procedure Call (ALPC)
|
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
Jarvis_1oop
|
|
| CVE-2022-30202 |
Windows Advanced Local Procedure Call (ALPC)
|
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
Jarvis_1oop
|
|
| CVE-2022-22037 |
Windows Advanced Local Procedure Call (ALPC)
|
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-07-12 | No |
Reported By
Jarvis_1oop
|