Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2022-29132 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
g0st1
|
|
| CVE-2022-29114 |
Windows Print Spooler
|
Windows Print Spooler Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
Oliver Lyak (@ly4k_) working with Trend Micro Zero Day Initiative
|
|
| CVE-2022-29104 |
Windows Print Spooler
|
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
Oliver Lyak (@ly4k_) working with Trend Micro Zero Day Initiative
National Security Agency |
|
| CVE-2022-23270 |
Windows Point-to-Point Tunneling Protocol
|
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
Yuki Chen with Cyber KunLun
Lewis Lee and Chunyang Han and Zhiniang Peng with Sangfor liubenjin with Codesafe Team of Legendsec at QI-ANXIN Group Alex Nichols with Nettitude |
|
| CVE-2022-21972 |
Windows Point-to-Point Tunneling Protocol
|
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
|
|
| CVE-2022-22016 |
Windows PlayToManager
|
Windows PlayToManager Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No | - | |
| CVE-2022-26937 |
Windows Network File System
|
Windows Network File System Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-26933 |
Windows NTFS
|
Windows NTFS Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
Wen with Kunlun Lab
|
|
| CVE-2022-29141 |
Windows Lightweight Directory Access Protocol (LDAP)
|
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-29139 |
Windows Lightweight Directory Access Protocol (LDAP)
|
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-29137 |
Windows Lightweight Directory Access Protocol (LDAP)
|
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-29131 |
Windows Lightweight Directory Access Protocol (LDAP)
|
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-29130 |
Windows Lightweight Directory Access Protocol (LDAP)
|
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-29129 |
Windows Lightweight Directory Access Protocol (LDAP)
|
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-29128 |
Windows Lightweight Directory Access Protocol (LDAP)
|
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-22014 |
Windows Lightweight Directory Access Protocol (LDAP)
|
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-22013 |
Windows Lightweight Directory Access Protocol (LDAP)
|
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-22012 |
Windows Lightweight Directory Access Protocol (LDAP)
|
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
Yuki Chen with Cyber KunLun
|
|
| CVE-2022-29142 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
|
|
| CVE-2022-29133 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
Anonymous
|
|
| CVE-2022-29116 |
Windows Kernel
|
Windows Kernel Information Disclosure Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
|
|
| CVE-2022-29106 |
Windows Hyper-V Shared Virtual Disk
|
Windows Hyper-V Shared Virtual Disk Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2022-22713 |
Windows Hyper-V
|
Windows Hyper-V Denial of Service Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C
|
2022-05-10 | No |
Reported By
Joe Bialek, MSRC Vulnerabilities and Mitigations Team
|
|
| CVE-2022-29112 |
Windows Graphics Component
|
Windows Graphics Component Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
|
|
| CVE-2022-26934 |
Windows Graphics Component
|
Windows Graphics Component Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
|
|
| CVE-2022-26927 |
Windows Graphics Component
|
Windows Graphics Component Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
Uncodable working with Trend Micro Zero Day Initiative
|
|
| CVE-2022-22011 |
Windows Graphics Component
|
Windows Graphics Component Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
willJ from CDSRC
|
|
| CVE-2022-29115 |
Windows Fax Service
|
Windows Fax Service Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
|
|
| CVE-2022-29102 |
Windows Failover Cluster
|
Windows Failover Cluster Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2022-29113 |
Windows Digital Media Receiver
|
Windows Digital Media Receiver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
Xuefeng Li (@lxf02942370) & Zhiniang Peng (@edwardzpeng) & Feng Dong of Sangfor
|
|
| CVE-2022-29138 |
Windows Clustered Shared Volume
|
Windows Clustered Shared Volume Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2022-29134 |
Windows Clustered Shared Volume
|
Windows Clustered Shared Volume Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2022-29123 |
Windows Clustered Shared Volume
|
Windows Clustered Shared Volume Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C
|
2022-05-10 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2022-29122 |
Windows Clustered Shared Volume
|
Windows Clustered Shared Volume Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2022-29120 |
Windows Clustered Shared Volume
|
Windows Clustered Shared Volume Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2022-29151 |
Windows Cluster Shared Volume (CSV)
|
Windows Cluster Shared Volume (CSV) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2022-29150 |
Windows Cluster Shared Volume (CSV)
|
Windows Cluster Shared Volume (CSV) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2022-29135 |
Windows Cluster Shared Volume (CSV)
|
Windows Cluster Shared Volume (CSV) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2022-26913 |
Windows Authentication
|
Windows Authentication Information Disclosure Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
Aapo Oksman with Nixu Cybersecurity
|
|
| CVE-2022-26926 |
Windows Address Book
|
Windows Address Book Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
Communications Security Establishment
|
|
| CVE-2022-23279 |
Windows ALPC
|
Windows ALPC Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
Jarvis_1oop
|
|
| CVE-2022-29126 |
Tablet Windows User Interface Application Core
|
Tablet Windows User Interface Application Core Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
Anonymous
|
|
| CVE-2022-26939 |
Storage Spaces Direct
|
Storage Spaces Direct Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2022-26938 |
Storage Spaces Direct
|
Storage Spaces Direct Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2022-26932 |
Storage Spaces Direct
|
Storage Spaces Direct Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2022-22019 |
Remote Procedure Call Runtime
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
|
|
| CVE-2022-26940 |
Remote Desktop Protocol Client
|
Remote Desktop Protocol Client Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
bee13oy with Cyber Kunlun Lab
|
|
| CVE-2022-22017 |
Remote Desktop Client
|
Remote Desktop Client Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
bee13oy with Cyber Kunlun Lab
|
|
| CVE-2022-29105 |
Microsoft Windows Media Foundation
|
Microsoft Windows Media Foundation Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
|
|
| CVE-2022-26923 |
Active Directory Domain Services
|
Active Directory Domain Services Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2022-05-10 | No |
Reported By
Oliver Lyak (@ly4k_) of Institut For Cyber Risk working with Trend Micro Zero Day Initiative
|