Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2024-49079 |
Input Method Editor (IME)
|
Input Method Editor (IME) Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
CHEN QINGYANG with Topsec Alpha Team
|
|
| CVE-2024-49075 |
Windows Remote Desktop Services
|
Windows Remote Desktop Services Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2024-49129 |
Windows Remote Desktop Gateway (RD Gateway)
|
Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
CVSS vector: AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
k0shl with Kunlun Lab
|
|
| CVE-2024-49096 |
Microsoft Message Queuing (MSMQ)
|
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
Azure Yang with Kunlun Lab
|
|
| CVE-2024-49117 |
Windows Hyper-V
|
Windows Hyper-V Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
|
|
| CVE-2024-49084 |
Windows Kernel
|
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
Anonymous
|
|
| CVE-2024-49124 |
Lightweight Directory Access Protocol (LDAP) Client
|
Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
Wei in Kunlun Lab with Cyber KunLun
|
|
| CVE-2024-49105 |
Remote Desktop Client
|
Remote Desktop Client Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
Naceri with MSRC Vulnerabilities & Mitigations
|
|
| CVE-2024-43594 |
Microsoft System Center
|
Microsoft System Center Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
R4nger & Zhiniang Peng
|
|
| CVE-2024-49082 |
Windows File Explorer
|
Windows File Explorer Information Disclosure Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
st4nly0n working with Trend Micro Zero Day Initiative
|
|
| CVE-2024-49087 |
Windows Mobile Broadband Driver
|
Windows Mobile Broadband Driver Information Disclosure Vulnerability
CVSS vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
Zhihua Wen with CyberKunLun
|
|
| CVE-2024-49073 |
Windows Mobile Broadband Driver
|
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
CVSS vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
Zhihua Wen with CyberKunLun
|
|
| CVE-2024-49103 |
Windows Wireless Wide Area Network Service (WwanSvc)
|
Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability
CVSS vector: AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
Zhihua Wen with CyberKunLun
|
|
| CVE-2024-49077 |
Windows Mobile Broadband Driver
|
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
CVSS vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
Zhihua Wen with CyberKunLun
|
|
| CVE-2024-49089 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
Anonymous
|
|
| CVE-2024-49085 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
Anonymous
|
|
| CVE-2024-49078 |
Windows Mobile Broadband Driver
|
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
CVSS vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
Zhihua Wen with CyberKunLun
|
|
| CVE-2024-49112 |
Windows Lightweight Directory Access Protocol (LDAP)
|
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
|
|
| CVE-2024-49088 |
Windows Common Log File System Driver
|
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
dkdfcd
|
|
| CVE-2024-49111 |
Wireless Wide Area Network Service (WwanSvc)
|
Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
CVSS vector: AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
Zhihua Wen with CyberKunLun
|
|
| CVE-2024-49109 |
Wireless Wide Area Network Service (WwanSvc)
|
Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
CVSS vector: AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
Zhihua Wen with CyberKunLun
|
|
| CVE-2024-49101 |
Wireless Wide Area Network Service (WwanSvc)
|
Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
CVSS vector: AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
Zhihua Wen with CyberKunLun
|
|
| CVE-2024-49099 |
Windows Wireless Wide Area Network Service (WwanSvc)
|
Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability
CVSS vector: AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
Zhihua Wen with CyberKunLun
|
|
| CVE-2024-49098 |
Windows Wireless Wide Area Network Service (WwanSvc)
|
Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability
CVSS vector: AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
Zhihua Wen with CyberKunLun
|
|
| CVE-2024-49110 |
Windows Mobile Broadband Driver
|
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
CVSS vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
Adel from MSRC V&M
|
|
| CVE-2024-49092 |
Windows Mobile Broadband Driver
|
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
CVSS vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
Zhihua Wen with CyberKunLun
|
|
| CVE-2024-49083 |
Windows Mobile Broadband Driver
|
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
CVSS vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
Zhihua Wen with CyberKunLun
|
|
| CVE-2024-49113 |
Windows Lightweight Directory Access Protocol (LDAP)
|
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
|
|
| CVE-2024-49094 |
Wireless Wide Area Network Service (WwanSvc)
|
Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
CVSS vector: AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
Zhihua Wen with CyberKunLun
|
|
| CVE-2024-49081 |
Wireless Wide Area Network Service (WwanSvc)
|
Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
CVSS vector: AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
Zhihua Wen with CyberKunLun
|
|
| CVE-2024-49072 |
Windows Task Scheduler
|
Windows Task Scheduler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
Florian Schweins
|
|
| CVE-2024-49125 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
Nirmala Nawale with Microsoft
Anonymous |
|
| CVE-2024-49104 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
Anonymous
|
|
| CVE-2024-49102 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
Anonymous
|
|
| CVE-2024-49086 |
Windows Routing and Remote Access Service (RRAS)
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
Anonymous
|
|
| CVE-2024-49080 |
Windows IP Routing Management Snapin
|
Windows IP Routing Management Snapin Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | No |
Reported By
Anonymous
|
|
| CVE-2024-49138 |
Windows Common Log File System Driver
|
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-12-10 | Yes |
Reported By
Advanced Research Team with CrowdStrike
|
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2024-23775 |
Integer Overflow vulnerability in Mbed TLS 2.x before 2.28.7 and 3.x before 3.5.2 allows attackers to cause a
|
Integer Overflow vulnerability in Mbed TLS 2.x before 2.28.7 and 3.x before 3.5.2 allows attackers to cause a denial of service (DoS) via mbedtls_x509_set_extension().
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2024-11-28 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2024-21538 |
Versions of the package cross-spawn before 7.0.5 are vulnerable to Regular Expression
|
Versions of the package cross-spawn before 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization.
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2024-11-23 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2024-9676 |
Podman: buildah: cri-o: symlink traversal vulnerability in the containers/storage library can cause
|
Podman: buildah: cri-o: symlink traversal vulnerability in the containers/storage library can cause denial of service (dos)
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
2024-11-14 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2024-43646 |
Windows Secure Kernel Mode
|
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-11-12 | No |
Reported By
Maxime Villard, of M.O.R.S.E.
|
|
| CVE-2024-43631 |
Windows Secure Kernel Mode
|
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-11-12 | No |
Reported By
Maxime Villard, of M.O.R.S.E.
|
|
| CVE-2024-43624 |
Windows Hyper-V Shared Virtual Disk
|
Windows Hyper-V Shared Virtual Disk Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-11-12 | No |
Reported By
|
|
| CVE-2024-43629 |
Windows DWM Core Library
|
Windows DWM Core Library Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-11-12 | No |
Reported By
Sergey Tarasov with Positive Technologies immortalp0ny
|
|
| CVE-2024-43636 |
Win32k
|
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-11-12 | No |
Reported By
Joe Bialek (Microsoft Offensive Research & Security Engineering)
|
|
| CVE-2024-38203 |
Windows Package Library Manager
|
Windows Package Library Manager Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
2024-11-12 | No |
Reported By
Anonymous
|
|
| CVE-2024-49051 |
Microsoft PC Manager
|
Microsoft PC Manager Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-11-12 | No |
Reported By
|
|
| CVE-2024-43633 |
Windows Hyper-V
|
Windows Hyper-V Denial of Service Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2024-11-12 | No |
Reported By
|
|
| CVE-2024-38264 |
Microsoft Virtual Hard Disk (VHDX)
|
Microsoft Virtual Hard Disk (VHDX) Denial of Service Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
|
2024-11-12 | No | - | |
| CVE-2024-49043 |
Microsoft.SqlServer.XEvent.Configuration.dll
|
Microsoft.SqlServer.XEvent.Configuration.dll Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2024-11-12 | No |
Reported By
CHEN QINGYANG with Topsec Alpha Team
|