{"cves":[{"cve_id":"CVE-2023-36606","summary":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.49765,"ranking_epss":0.97819,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36606","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36606"],"published_time":"2023-10-10T18:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36697","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00144,"ranking_epss":0.34693,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36697","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36697"],"published_time":"2023-10-10T18:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36581","summary":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00387,"ranking_epss":0.59884,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36581","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36581"],"published_time":"2023-10-10T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36582","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00653,"ranking_epss":0.70939,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36582","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36582"],"published_time":"2023-10-10T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36583","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00611,"ranking_epss":0.69843,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36583","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36583"],"published_time":"2023-10-10T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36589","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00423,"ranking_epss":0.62188,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36589","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36589"],"published_time":"2023-10-10T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36590","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.0031,"ranking_epss":0.54197,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36590","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36590"],"published_time":"2023-10-10T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36591","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00423,"ranking_epss":0.62188,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36591","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36591"],"published_time":"2023-10-10T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36592","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00423,"ranking_epss":0.62188,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36592","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36592"],"published_time":"2023-10-10T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36593","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0065,"ranking_epss":0.70867,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36593","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36593"],"published_time":"2023-10-10T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-44216","summary":"PVRIC (PowerVR Image Compression) on Imagination 2018 and later GPU devices offers software-transparent compression that enables cross-origin pixel-stealing attacks against feTurbulence and feBlend in the SVG Filter specification, aka a GPU.zip issue. For example, attackers can sometimes accurately determine text contained on a web page from one origin if they control a resource from a different origin.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00494,"ranking_epss":0.65789,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://arstechnica.com/security/2023/09/gpus-from-all-major-suppliers-are-vulnerable-to-new-pixel-stealing-attack/","https://blog.imaginationtech.com/introducing-pvric4-taking-image-compression-to-the-next-level/","https://blog.imaginationtech.com/reducing-bandwidth-pvric/","https://github.com/UT-Security/gpu-zip","https://news.ycombinator.com/item?id=37663159","https://www.bleepingcomputer.com/news/security/modern-gpus-vulnerable-to-new-gpuzip-side-channel-attack/","https://www.hertzbleed.com/gpu.zip/","https://www.hertzbleed.com/gpu.zip/GPU-zip.pdf","https://www.w3.org/TR/filter-effects-1/","https://arstechnica.com/security/2023/09/gpus-from-all-major-suppliers-are-vulnerable-to-new-pixel-stealing-attack/","https://blog.imaginationtech.com/introducing-pvric4-taking-image-compression-to-the-next-level/","https://blog.imaginationtech.com/reducing-bandwidth-pvric/","https://github.com/UT-Security/gpu-zip","https://news.ycombinator.com/item?id=37663159","https://www.bleepingcomputer.com/news/security/modern-gpus-vulnerable-to-new-gpuzip-side-channel-attack/","https://www.hertzbleed.com/gpu.zip/","https://www.hertzbleed.com/gpu.zip/GPU-zip.pdf","https://www.w3.org/TR/filter-effects-1/"],"published_time":"2023-09-27T15:19:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-20564","summary":"\n\n\n\n\n\n\nInsufficient validation in the IOCTL (Input Output Control) input buffer in AMD Ryzen™ Master may permit a privileged attacker to perform memory reads/writes potentially leading to a loss of confidentiality or arbitrary kernel execution.\n\n\n\n\n\n\n\n\n\n\n\n","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00032,"ranking_epss":0.09034,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7004","https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7004"],"published_time":"2023-08-15T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-20560","summary":"\n\n\n\n\n\n\n\n\nInsufficient validation of the IOCTL (Input Output Control) input buffer in AMD Ryzen™ Master may allow a privileged attacker to provide a null value potentially resulting in a Windows crash leading to denial of service.\n\n\n\n\n\n\n\n\n\n\n","cvss":4.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00024,"ranking_epss":0.06294,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7004","https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7004"],"published_time":"2023-08-15T22:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36913","summary":"Microsoft Message Queuing Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00373,"ranking_epss":0.59077,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36913","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36913"],"published_time":"2023-08-08T18:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36912","summary":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.04109,"ranking_epss":0.88618,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36912","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36912"],"published_time":"2023-08-08T18:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36911","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.02937,"ranking_epss":0.8645,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36911","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36911"],"published_time":"2023-08-08T18:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36900","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.24034,"ranking_epss":0.96057,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36900","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36900"],"published_time":"2023-08-08T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36903","summary":"Windows System Assessment Tool Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00773,"ranking_epss":0.73616,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36903","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36903"],"published_time":"2023-08-08T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36905","summary":"Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.03185,"ranking_epss":0.86993,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36905","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36905"],"published_time":"2023-08-08T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36906","summary":"Windows Cryptographic Services Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.03421,"ranking_epss":0.87468,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36906","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36906"],"published_time":"2023-08-08T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36907","summary":"Windows Cryptographic Services Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.03421,"ranking_epss":0.87468,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36907","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36907"],"published_time":"2023-08-08T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36908","summary":"Windows Hyper-V Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00186,"ranking_epss":0.40468,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36908","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36908"],"published_time":"2023-08-08T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36909","summary":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00466,"ranking_epss":0.64441,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36909","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36909"],"published_time":"2023-08-08T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36910","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.02937,"ranking_epss":0.8645,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36910","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36910"],"published_time":"2023-08-08T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-27382","summary":"Incorrect default permissions in the Audio Service for some Intel(R) NUC P14E Laptop Element software for Windows 10 before version 1.0.0.156 may allow an authenticated user to potentially enable escalation of privilege via local access.","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00072,"ranking_epss":0.21833,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00802.html","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00802.html"],"published_time":"2023-05-10T14:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21712","summary":"Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00749,"ranking_epss":0.73163,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21712","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21712"],"published_time":"2023-04-27T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29411","summary":"\nA CWE-306: Missing Authentication for Critical Function vulnerability exists that could allow\nchanges to administrative credentials, leading to potential remote code execution without\nrequiring prior authentication on the Java RMI interface. \n\n\n\n","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.0826,"ranking_epss":0.92244,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-101-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-101-04.pdf","https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-101-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-101-04.pdf"],"published_time":"2023-04-18T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29412","summary":"CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command\nInjection') vulnerability exists that could cause remote code execution when manipulating\ninternal methods through Java RMI interface.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.06158,"ranking_epss":0.90848,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-101-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-101-04.pdf","https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-101-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-101-04.pdf"],"published_time":"2023-04-18T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29413","summary":"\nA CWE-306: Missing Authentication for Critical Function vulnerability exists that could cause\nDenial-of-Service when accessed by an unauthenticated user on the Schneider UPS Monitor\nservice. \n\n \n\n\n\n","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00388,"ranking_epss":0.59913,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-101-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-101-04.pdf","https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-101-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-101-04.pdf"],"published_time":"2023-04-18T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-24858","summary":"Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.10015,"ranking_epss":0.93074,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24858","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24858"],"published_time":"2023-03-14T17:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-24859","summary":"Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.22191,"ranking_epss":0.95816,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24859","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24859"],"published_time":"2023-03-14T17:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-23420","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00296,"ranking_epss":0.52934,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23420","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23420"],"published_time":"2023-03-14T17:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-23421","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00975,"ranking_epss":0.76735,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23421","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23421"],"published_time":"2023-03-14T17:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-23422","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01098,"ranking_epss":0.78051,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23422","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23422"],"published_time":"2023-03-14T17:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-23423","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01098,"ranking_epss":0.78051,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23423","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23423"],"published_time":"2023-03-14T17:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-24856","summary":"Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.1816,"ranking_epss":0.95201,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24856","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24856"],"published_time":"2023-03-14T17:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-24857","summary":"Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.13109,"ranking_epss":0.94136,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24857","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24857"],"published_time":"2023-03-14T17:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21812","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02111,"ranking_epss":0.84132,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21812","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21812"],"published_time":"2023-02-14T20:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21813","summary":"Windows Secure Channel Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.13724,"ranking_epss":0.94288,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21813","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21813"],"published_time":"2023-02-14T20:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21816","summary":"Windows Active Directory Domain Services API Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.20722,"ranking_epss":0.95609,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21816","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21816"],"published_time":"2023-02-14T20:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21817","summary":"Windows Kerberos Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01171,"ranking_epss":0.787,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21817","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21817"],"published_time":"2023-02-14T20:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21818","summary":"Windows Secure Channel Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.28577,"ranking_epss":0.96546,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21818","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21818"],"published_time":"2023-02-14T20:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21820","summary":"Windows Distributed File System (DFS) Remote Code Execution Vulnerability","cvss":7.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.4,"cvss_v4":null,"epss":0.0616,"ranking_epss":0.90849,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21820","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21820"],"published_time":"2023-02-14T20:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21822","summary":"Windows Graphics Component Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01081,"ranking_epss":0.77885,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21822","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21822"],"published_time":"2023-02-14T20:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21801","summary":"Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00522,"ranking_epss":0.66931,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21801","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21801"],"published_time":"2023-02-14T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21802","summary":"Windows Media Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01951,"ranking_epss":0.83498,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21802","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21802"],"published_time":"2023-02-14T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21803","summary":"Windows iSCSI Discovery Service Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.13929,"ranking_epss":0.94338,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21803","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21803"],"published_time":"2023-02-14T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21804","summary":"Windows Graphics Component Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00461,"ranking_epss":0.64186,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21804","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21804"],"published_time":"2023-02-14T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21805","summary":"Windows MSHTML Platform Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00385,"ranking_epss":0.59756,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21805","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21805"],"published_time":"2023-02-14T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21811","summary":"Windows iSCSI Service Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.17047,"ranking_epss":0.95001,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21811","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21811"],"published_time":"2023-02-14T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21693","summary":"Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability","cvss":5.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.7,"cvss_v4":null,"epss":0.04122,"ranking_epss":0.88641,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21693","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21693"],"published_time":"2023-02-14T20:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21694","summary":"Windows Fax Service Remote Code Execution Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00909,"ranking_epss":0.75822,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21694","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21694"],"published_time":"2023-02-14T20:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21695","summary":"Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.04781,"ranking_epss":0.89482,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21695","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21695"],"published_time":"2023-02-14T20:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21697","summary":"Windows Internet Storage Name Service (iSNS) Server Information Disclosure Vulnerability","cvss":6.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.2,"cvss_v4":null,"epss":0.01393,"ranking_epss":0.80401,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21697","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21697"],"published_time":"2023-02-14T20:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21699","summary":"Windows Internet Storage Name Service (iSNS) Server Information Disclosure Vulnerability","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.04543,"ranking_epss":0.89196,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21699","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21699"],"published_time":"2023-02-14T20:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21700","summary":"Windows iSCSI Discovery Service Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.26636,"ranking_epss":0.9635,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21700","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21700"],"published_time":"2023-02-14T20:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21701","summary":"Microsoft Protected Extensible Authentication Protocol (PEAP) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.06948,"ranking_epss":0.9145,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21701","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21701"],"published_time":"2023-02-14T20:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21702","summary":"Windows iSCSI Service Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.13824,"ranking_epss":0.94308,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21702","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21702"],"published_time":"2023-02-14T20:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42972","summary":"A CWE-732: Incorrect Permission Assignment for Critical Resource vulnerability exists that could cause local privilege escalation when a local attacker modifies the webroot directory. Affected Products: APC Easy UPS Online Monitoring Software (Windows 7, 10, 11 & Windows Server 2016, 2019, 2022 - Versions prior to V2.5-GA), APC Easy UPS Online Monitoring Software (Windows 11, Windows Server 2019, 2022 - Versions prior to V2.5-GA-01-22261), Schneider Electric Easy UPS Online Monitoring Software (Windows 7, 10, 11 & Windows Server 2016, 2019, 2022 - Versions prior to V2.5-GS), Schneider Electric Easy UPS Online Monitoring Software (Windows 11, Windows Server 2019, 2022 - Versions prior to V2.5-GS-01-22261)","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00116,"ranking_epss":0.30259,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://download.schneider-electric.com/files?p_Doc_SEVD-2022-347-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-347-01_Easy_UPS_Online_Monitoring_Software_Security_Notification.pdf","https://download.schneider-electric.com/files?p_Doc_SEVD-2022-347-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-347-01_Easy_UPS_Online_Monitoring_Software_Security_Notification.pdf"],"published_time":"2023-02-01T04:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42973","summary":"A CWE-798: Use of Hard-coded Credentials vulnerability exists that could cause local privilege escalation when local attacker connects to the database. Affected Products: APC Easy UPS Online Monitoring Software (Windows 7, 10, 11 & Windows Server 2016, 2019, 2022 - Versions prior to V2.5-GA), APC Easy UPS Online Monitoring Software (Windows 11, Windows Server 2019, 2022 - Versions prior to V2.5-GA-01-22261), Schneider Electric Easy UPS Online Monitoring Software (Windows 7, 10, 11 & Windows Server 2016, 2019, 2022 - Versions prior to V2.5-GS), Schneider Electric Easy UPS Online Monitoring Software (Windows 11, Windows Server 2019, 2022 - Versions prior to V2.5-GS-01-22261)","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00116,"ranking_epss":0.30259,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://download.schneider-electric.com/files?p_Doc_SEVD-2022-347-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-347-01_Easy_UPS_Online_Monitoring_Software_Security_Notification.pdf","https://download.schneider-electric.com/files?p_Doc_SEVD-2022-347-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-347-01_Easy_UPS_Online_Monitoring_Software_Security_Notification.pdf"],"published_time":"2023-02-01T04:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42970","summary":"A CWE-306: Missing Authentication for Critical Function The software does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. Affected Products: APC Easy UPS Online Monitoring Software (Windows 7, 10, 11 & Windows Server 2016, 2019, 2022 - Versions prior to V2.5-GA), APC Easy UPS Online Monitoring Software (Windows 11, Windows Server 2019, 2022 - Versions prior to V2.5-GA-01-22261), Schneider Electric Easy UPS Online Monitoring Software (Windows 7, 10, 11 & Windows Server 2016, 2019, 2022 - Versions prior to V2.5-GS), Schneider Electric Easy UPS Online Monitoring Software (Windows 11, Windows Server 2019, 2022 - Versions prior to V2.5-GS-01-22261)","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.0053,"ranking_epss":0.67266,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://download.schneider-electric.com/files?p_Doc_SEVD-2022-347-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-347-01_Easy_UPS_Online_Monitoring_Software_Security_Notification.pdf","https://download.schneider-electric.com/files?p_Doc_SEVD-2022-347-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-347-01_Easy_UPS_Online_Monitoring_Software_Security_Notification.pdf"],"published_time":"2023-02-01T04:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-42971","summary":"A CWE-434: Unrestricted Upload of File with Dangerous Type vulnerability exists that could cause remote code execution when the attacker uploads a malicious JSP file. Affected Products: APC Easy UPS Online Monitoring Software (Windows 7, 10, 11 & Windows Server 2016, 2019, 2022 - Versions prior to V2.5-GA), APC Easy UPS Online Monitoring Software (Windows 11, Windows Server 2019, 2022 - Versions prior to V2.5-GA-01-22261), Schneider Electric Easy UPS Online Monitoring Software (Windows 7, 10, 11 & Windows Server 2016, 2019, 2022 - Versions prior to V2.5-GS), Schneider Electric Easy UPS Online Monitoring Software (Windows 11, Windows Server 2019, 2022 - Versions prior to V2.5-GS-01-22261)","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.03346,"ranking_epss":0.87332,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://download.schneider-electric.com/files?p_Doc_SEVD-2022-347-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-347-01_Easy_UPS_Online_Monitoring_Software_Security_Notification.pdf","https://download.schneider-electric.com/files?p_Doc_SEVD-2022-347-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-347-01_Easy_UPS_Online_Monitoring_Software_Security_Notification.pdf"],"published_time":"2023-02-01T04:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21765","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02036,"ranking_epss":0.83851,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21765","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21765"],"published_time":"2023-01-10T22:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21766","summary":"Windows Overlay Filter Information Disclosure Vulnerability","cvss":4.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.7,"cvss_v4":null,"epss":0.0644,"ranking_epss":0.91087,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21766","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21766"],"published_time":"2023-01-10T22:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21767","summary":"Windows Overlay Filter Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0083,"ranking_epss":0.74574,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21767","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21767"],"published_time":"2023-01-10T22:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21771","summary":"Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.0039,"ranking_epss":0.60118,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21771","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21771"],"published_time":"2023-01-10T22:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21776","summary":"Windows Kernel Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.01874,"ranking_epss":0.83158,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21776","http://packetstormsecurity.com/files/172300/Windows-Kernel-CmpDoReDoCreateKey-CmpDoReOpenTransKey-Out-Of-Bounds-Read.html","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21776"],"published_time":"2023-01-10T22:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21746","summary":"Windows NTLM Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.53737,"ranking_epss":0.98005,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21746","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21746"],"published_time":"2023-01-10T22:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21752","summary":"Windows Backup Service Elevation of Privilege Vulnerability","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.51956,"ranking_epss":0.97921,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21752","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21752"],"published_time":"2023-01-10T22:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21753","summary":"Event Tracing for Windows Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.0303,"ranking_epss":0.86672,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21753","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21753"],"published_time":"2023-01-10T22:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21757","summary":"Windows Layer 2 Tunneling Protocol (L2TP) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.23953,"ranking_epss":0.96043,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21757","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21757"],"published_time":"2023-01-10T22:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21758","summary":"Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.4968,"ranking_epss":0.97815,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21758","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21758"],"published_time":"2023-01-10T22:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21759","summary":"Windows Smart Card Resource Management Server Security Feature Bypass Vulnerability","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.0292,"ranking_epss":0.86413,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21759","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21759"],"published_time":"2023-01-10T22:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21760","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.0085,"ranking_epss":0.74919,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21760","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21760"],"published_time":"2023-01-10T22:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21558","summary":"Windows Error Reporting Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00622,"ranking_epss":0.70146,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21558","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21558"],"published_time":"2023-01-10T22:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-44697","summary":"Windows Graphics Component Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01215,"ranking_epss":0.79047,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44697","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44697"],"published_time":"2022-12-13T19:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-44702","summary":"Windows Terminal Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.09756,"ranking_epss":0.92961,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44702","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-44702"],"published_time":"2022-12-13T19:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-44707","summary":"Windows Kernel Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.10228,"ranking_epss":0.93164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44707","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44707"],"published_time":"2022-12-13T19:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-44674","summary":"Windows Bluetooth Driver Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00547,"ranking_epss":0.67923,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44674","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44674"],"published_time":"2022-12-13T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-44675","summary":"Windows Bluetooth Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.04058,"ranking_epss":0.88536,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44675","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44675"],"published_time":"2022-12-13T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-44676","summary":"Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00565,"ranking_epss":0.68489,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44676","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44676"],"published_time":"2022-12-13T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-44677","summary":"Windows Projected File System Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0118,"ranking_epss":0.78772,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44677","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44677"],"published_time":"2022-12-13T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-44678","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01186,"ranking_epss":0.78819,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44678","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44678"],"published_time":"2022-12-13T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-44679","summary":"Windows Graphics Component Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00761,"ranking_epss":0.73393,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44679","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44679"],"published_time":"2022-12-13T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-44680","summary":"Windows Graphics Component Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0118,"ranking_epss":0.78772,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44680","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44680"],"published_time":"2022-12-13T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-44681","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01215,"ranking_epss":0.79047,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44681","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44681"],"published_time":"2022-12-13T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-44682","summary":"Windows Hyper-V Denial of Service Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00669,"ranking_epss":0.71362,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44682","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44682"],"published_time":"2022-12-13T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-44683","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02795,"ranking_epss":0.86121,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44683","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44683"],"published_time":"2022-12-13T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-44687","summary":"Raw Image Extension Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01668,"ranking_epss":0.82137,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44687","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44687"],"published_time":"2022-12-13T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-44689","summary":"Windows Subsystem for Linux (WSL2) Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01929,"ranking_epss":0.83422,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44689","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-44689"],"published_time":"2022-12-13T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41077","summary":"Windows Fax Compose Form Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00895,"ranking_epss":0.75638,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41077","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41077"],"published_time":"2022-12-13T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41089","summary":".NET Framework Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.04521,"ranking_epss":0.89171,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41089","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41089"],"published_time":"2022-12-13T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41121","summary":"Windows Graphics Component Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00534,"ranking_epss":0.67449,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41121","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41121"],"published_time":"2022-12-13T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-44666","summary":"Windows Contacts Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.57145,"ranking_epss":0.98154,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44666","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44666"],"published_time":"2022-12-13T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-44667","summary":"Windows Media Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01685,"ranking_epss":0.82244,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44667","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44667"],"published_time":"2022-12-13T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-44668","summary":"Windows Media Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00603,"ranking_epss":0.69579,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44668","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44668"],"published_time":"2022-12-13T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-44669","summary":"Windows Error Reporting Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00349,"ranking_epss":0.57466,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44669","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44669"],"published_time":"2022-12-13T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-44670","summary":"Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.0075,"ranking_epss":0.73189,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44670","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44670"],"published_time":"2022-12-13T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-44671","summary":"Windows Graphics Component Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01277,"ranking_epss":0.79583,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44671","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44671"],"published_time":"2022-12-13T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-44673","summary":"Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.02988,"ranking_epss":0.86564,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44673","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44673"],"published_time":"2022-12-13T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41074","summary":"Windows Graphics Component Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.04765,"ranking_epss":0.89468,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41074","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41074"],"published_time":"2022-12-13T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41076","summary":"PowerShell Remote Code Execution Vulnerability","cvss":8.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.5,"cvss_v4":null,"epss":0.34016,"ranking_epss":0.9698,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41076","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41076"],"published_time":"2022-12-13T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-33973","summary":"Improper access control in the Intel(R) WAPI Security software for Windows 10/11 before version 22.2150.0.1 may allow an authenticated user to potentially enable information disclosure via local access.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00058,"ranking_epss":0.17996,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00720.html","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00720.html"],"published_time":"2022-11-11T16:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41109","summary":"Windows Win32k Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01159,"ranking_epss":0.78603,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41109","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41109"],"published_time":"2022-11-09T22:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41113","summary":"Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.03302,"ranking_epss":0.87253,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41113","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41113"],"published_time":"2022-11-09T22:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41114","summary":"Windows Bind Filter Driver Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00591,"ranking_epss":0.6927,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41114","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41114"],"published_time":"2022-11-09T22:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41118","summary":"Windows Scripting Languages Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00626,"ranking_epss":0.70256,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41118","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41118"],"published_time":"2022-11-09T22:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41100","summary":"Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00256,"ranking_epss":0.4907,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41100","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41100"],"published_time":"2022-11-09T22:15:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41101","summary":"Windows Overlay Filter Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01014,"ranking_epss":0.7719,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41101","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41101"],"published_time":"2022-11-09T22:15:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41102","summary":"Windows Overlay Filter Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01014,"ranking_epss":0.7719,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41102","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41102"],"published_time":"2022-11-09T22:15:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41092","summary":"Windows Win32k Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01197,"ranking_epss":0.78912,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41092","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41092"],"published_time":"2022-11-09T22:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41093","summary":"Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00241,"ranking_epss":0.4743,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41093","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41093"],"published_time":"2022-11-09T22:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41095","summary":"Windows Digital Media Receiver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00895,"ranking_epss":0.75638,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41095","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41095"],"published_time":"2022-11-09T22:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41096","summary":"Microsoft DWM Core Library Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0098,"ranking_epss":0.76808,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41096","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41096"],"published_time":"2022-11-09T22:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41097","summary":"Network Policy Server (NPS) RADIUS Protocol Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.23122,"ranking_epss":0.95944,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41097","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41097"],"published_time":"2022-11-09T22:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41098","summary":"Windows GDI+ Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.01561,"ranking_epss":0.81518,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41098","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41098"],"published_time":"2022-11-09T22:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41099","summary":"BitLocker Security Feature Bypass Vulnerability","cvss":4.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.6,"cvss_v4":null,"epss":0.02265,"ranking_epss":0.84653,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41099","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41099"],"published_time":"2022-11-09T22:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41086","summary":"Windows Group Policy Elevation of Privilege Vulnerability","cvss":6.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.4,"cvss_v4":null,"epss":0.00269,"ranking_epss":0.50426,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41086","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41086"],"published_time":"2022-11-09T22:15:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41088","summary":"Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00715,"ranking_epss":0.72398,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41088","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41088"],"published_time":"2022-11-09T22:15:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41090","summary":"Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.01483,"ranking_epss":0.81043,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41090","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41090"],"published_time":"2022-11-09T22:15:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41054","summary":"Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01014,"ranking_epss":0.7719,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41054","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41054"],"published_time":"2022-11-09T22:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41055","summary":"Windows Human Interface Device Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.04842,"ranking_epss":0.89545,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41055","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41055"],"published_time":"2022-11-09T22:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41056","summary":"Network Policy Server (NPS) RADIUS Protocol Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.22047,"ranking_epss":0.95797,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41056","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41056"],"published_time":"2022-11-09T22:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41057","summary":"Windows HTTP.sys Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01136,"ranking_epss":0.78405,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41057","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41057"],"published_time":"2022-11-09T22:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41058","summary":"Windows Network Address Translation (NAT) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.23963,"ranking_epss":0.96045,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41058","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41058"],"published_time":"2022-11-09T22:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41064","summary":".NET Framework Information Disclosure Vulnerability","cvss":5.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.8,"cvss_v4":null,"epss":0.00189,"ranking_epss":0.40783,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41064","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41064"],"published_time":"2022-11-09T22:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41039","summary":"Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.01001,"ranking_epss":0.77035,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41039","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41039"],"published_time":"2022-11-09T22:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41045","summary":"Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00259,"ranking_epss":0.49323,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41045","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41045"],"published_time":"2022-11-09T22:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41047","summary":"Microsoft ODBC Driver Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.1784,"ranking_epss":0.95147,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41047","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41047"],"published_time":"2022-11-09T22:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41048","summary":"Microsoft ODBC Driver Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.1784,"ranking_epss":0.95147,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41048","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41048"],"published_time":"2022-11-09T22:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41050","summary":"Windows Extensible File Allocation Table Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01014,"ranking_epss":0.7719,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41050","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41050"],"published_time":"2022-11-09T22:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41052","summary":"Windows Graphics Component Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02244,"ranking_epss":0.84588,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41052","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41052"],"published_time":"2022-11-09T22:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41053","summary":"Windows Kerberos Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.23963,"ranking_epss":0.96045,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41053","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41053"],"published_time":"2022-11-09T22:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37992","summary":"Windows Group Policy Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00895,"ranking_epss":0.75638,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37992","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37992"],"published_time":"2022-11-09T22:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38015","summary":"Windows Hyper-V Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00679,"ranking_epss":0.71603,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38015","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38015"],"published_time":"2022-11-09T22:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-41081","summary":"Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.08417,"ranking_epss":0.92346,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41081","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41081"],"published_time":"2022-10-11T19:15:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38051","summary":"Windows Graphics Component Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02424,"ranking_epss":0.85162,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38051","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38051"],"published_time":"2022-10-11T19:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38045","summary":"Windows Server Service Elevation of Privilege Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.15462,"ranking_epss":0.94668,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38045","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38045"],"published_time":"2022-10-11T19:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38046","summary":"Web Account Manager Information Disclosure Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.1816,"ranking_epss":0.95201,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38046","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38046"],"published_time":"2022-10-11T19:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38047","summary":"Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.01265,"ranking_epss":0.79478,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38047","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38047"],"published_time":"2022-10-11T19:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38050","summary":"Win32k Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.03175,"ranking_epss":0.86973,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38050","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38050"],"published_time":"2022-10-11T19:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38042","summary":"Active Directory Domain Services Elevation of Privilege Vulnerability","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.05778,"ranking_epss":0.90502,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38042","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38042"],"published_time":"2022-10-11T19:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38043","summary":"Windows Security Support Provider Interface Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.0181,"ranking_epss":0.82867,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38043","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38043"],"published_time":"2022-10-11T19:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38044","summary":"Windows CD-ROM File System Driver Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.11031,"ranking_epss":0.93458,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38044","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38044"],"published_time":"2022-10-11T19:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38040","summary":"Microsoft ODBC Driver Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.17266,"ranking_epss":0.95049,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38040","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38040"],"published_time":"2022-10-11T19:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38041","summary":"Windows Secure Channel Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.27321,"ranking_epss":0.96419,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38041","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38041"],"published_time":"2022-10-11T19:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38037","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.03021,"ranking_epss":0.86636,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38037","http://packetstormsecurity.com/files/169791/Windows-Kernel-Type-Confusion-Memory-Corruption.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38037"],"published_time":"2022-10-11T19:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38038","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00924,"ranking_epss":0.7604,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38038","http://packetstormsecurity.com/files/169805/Windows-Kernel-Long-Registry-Path-Memory-Corruption.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38038"],"published_time":"2022-10-11T19:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38039","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02371,"ranking_epss":0.84981,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38039","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38039"],"published_time":"2022-10-11T19:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38029","summary":"Windows ALPC Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.05875,"ranking_epss":0.90587,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38029","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38029"],"published_time":"2022-10-11T19:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38030","summary":"Windows USB Serial Driver Information Disclosure Vulnerability","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.01115,"ranking_epss":0.78212,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38030","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38030"],"published_time":"2022-10-11T19:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38031","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.17266,"ranking_epss":0.95049,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38031","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38031"],"published_time":"2022-10-11T19:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38032","summary":"Windows Portable Device Enumerator Service Security Feature Bypass Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.00692,"ranking_epss":0.71875,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38032","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38032"],"published_time":"2022-10-11T19:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38033","summary":"Windows Server Remotely Accessible Registry Keys Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.14612,"ranking_epss":0.94493,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38033","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38033"],"published_time":"2022-10-11T19:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38034","summary":"Windows Workstation Service Elevation of Privilege Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.1247,"ranking_epss":0.93938,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38034","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38034"],"published_time":"2022-10-11T19:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37997","summary":"Windows Graphics Component Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00547,"ranking_epss":0.67916,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37997","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37997"],"published_time":"2022-10-11T19:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37998","summary":"Windows Local Session Manager (LSM) Denial of Service Vulnerability","cvss":7.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.7,"cvss_v4":null,"epss":0.04691,"ranking_epss":0.89363,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37998","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37998"],"published_time":"2022-10-11T19:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37999","summary":"Windows Group Policy Preference Client Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00547,"ranking_epss":0.67916,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37999","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37999"],"published_time":"2022-10-11T19:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38000","summary":"Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.01036,"ranking_epss":0.77432,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38000","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38000"],"published_time":"2022-10-11T19:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38003","summary":"Windows Resilient File System Elevation of Privilege","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00841,"ranking_epss":0.74769,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38003","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38003"],"published_time":"2022-10-11T19:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38016","summary":"Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00509,"ranking_epss":0.66406,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38016","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38016"],"published_time":"2022-10-11T19:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38021","summary":"Connected User Experiences and Telemetry Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.0031,"ranking_epss":0.54202,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38021","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38021"],"published_time":"2022-10-11T19:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38022","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00594,"ranking_epss":0.69332,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38022","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38022"],"published_time":"2022-10-11T19:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38026","summary":"Windows DHCP Client Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00405,"ranking_epss":0.6106,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38026","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38026"],"published_time":"2022-10-11T19:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38027","summary":"Windows Storage Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00313,"ranking_epss":0.54498,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38027","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38027"],"published_time":"2022-10-11T19:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37982","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.12503,"ranking_epss":0.93953,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37982","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37982"],"published_time":"2022-10-11T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37983","summary":"Microsoft DWM Core Library Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00723,"ranking_epss":0.72576,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37983","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37983"],"published_time":"2022-10-11T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37984","summary":"Windows WLAN Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0063,"ranking_epss":0.7034,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37984","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37984"],"published_time":"2022-10-11T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37985","summary":"Windows Graphics Component Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.05274,"ranking_epss":0.90017,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37985","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37985"],"published_time":"2022-10-11T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37986","summary":"Windows Win32k Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00547,"ranking_epss":0.67916,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37986","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37986"],"published_time":"2022-10-11T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37987","summary":"Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.06632,"ranking_epss":0.91216,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37987","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37987"],"published_time":"2022-10-11T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37988","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0118,"ranking_epss":0.78775,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37988","http://packetstormsecurity.com/files/169731/Windows-Kernel-Registry-Use-After-Free.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37988"],"published_time":"2022-10-11T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37989","summary":"Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.12029,"ranking_epss":0.93808,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37989","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37989"],"published_time":"2022-10-11T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37990","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00608,"ranking_epss":0.69751,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37990","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37990"],"published_time":"2022-10-11T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37991","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0118,"ranking_epss":0.78775,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37991","http://packetstormsecurity.com/files/169807/Windows-Kernel-Long-Registry-Key-Value-Out-Of-Bounds-Read.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37991"],"published_time":"2022-10-11T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37993","summary":"Windows Group Policy Preference Client Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00547,"ranking_epss":0.67916,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37993","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37993"],"published_time":"2022-10-11T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37994","summary":"Windows Group Policy Preference Client Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00713,"ranking_epss":0.72358,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37994","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37994"],"published_time":"2022-10-11T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37995","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00723,"ranking_epss":0.72576,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37995","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37995"],"published_time":"2022-10-11T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37996","summary":"Windows Kernel Memory Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.01319,"ranking_epss":0.79895,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37996","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37996"],"published_time":"2022-10-11T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37970","summary":"Windows DWM Core Library Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02375,"ranking_epss":0.84995,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37970","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37970"],"published_time":"2022-10-11T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37973","summary":"Windows Local Session Manager (LSM) Denial of Service Vulnerability","cvss":7.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.7,"cvss_v4":null,"epss":0.04237,"ranking_epss":0.88797,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37973","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37973"],"published_time":"2022-10-11T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37974","summary":"Windows Mixed Reality Developer Tools Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.10807,"ranking_epss":0.93377,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37974","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37974"],"published_time":"2022-10-11T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37975","summary":"Windows Group Policy Elevation of Privilege Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.21134,"ranking_epss":0.9567,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37975","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37975"],"published_time":"2022-10-11T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37977","summary":"Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.16944,"ranking_epss":0.94983,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37977","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37977"],"published_time":"2022-10-11T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37978","summary":"Windows Active Directory Certificate Services Security Feature Bypass","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.10188,"ranking_epss":0.93147,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37978","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37978"],"published_time":"2022-10-11T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37979","summary":"Windows Hyper-V Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00552,"ranking_epss":0.6807,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37979","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37979"],"published_time":"2022-10-11T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37980","summary":"Windows DHCP Client Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00723,"ranking_epss":0.72576,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37980","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37980"],"published_time":"2022-10-11T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37981","summary":"Windows Event Logging Service Denial of Service Vulnerability","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.11074,"ranking_epss":0.93474,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37981","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37981"],"published_time":"2022-10-11T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22035","summary":"Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.01265,"ranking_epss":0.79478,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22035","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22035"],"published_time":"2022-10-11T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24504","summary":"Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.01265,"ranking_epss":0.79478,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24504","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24504"],"published_time":"2022-10-11T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30198","summary":"Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.01036,"ranking_epss":0.77432,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30198","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30198"],"published_time":"2022-10-11T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-33634","summary":"Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00692,"ranking_epss":0.71873,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33634","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33634"],"published_time":"2022-10-11T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-33635","summary":"Windows GDI+ Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.06886,"ranking_epss":0.91403,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33635","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33635"],"published_time":"2022-10-11T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-33645","summary":"Windows TCP/IP Driver Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.19014,"ranking_epss":0.95335,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33645","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33645"],"published_time":"2022-10-11T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34689","summary":"Windows CryptoAPI Spoofing Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.14369,"ranking_epss":0.94435,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34689","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34689"],"published_time":"2022-10-11T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35770","summary":"Windows NTLM Spoofing Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.15238,"ranking_epss":0.94628,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35770","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35770"],"published_time":"2022-10-11T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37965","summary":"Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.06924,"ranking_epss":0.91432,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37965","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37965"],"published_time":"2022-10-11T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37958","summary":"SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.10626,"ranking_epss":0.93319,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37958","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37958"],"published_time":"2022-09-13T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38004","summary":"Windows Fax Service Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02096,"ranking_epss":0.8407,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38004","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38004"],"published_time":"2022-09-13T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38005","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01459,"ranking_epss":0.80871,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38005","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38005"],"published_time":"2022-09-13T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38006","summary":"Windows Graphics Component Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.26117,"ranking_epss":0.96302,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38006","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38006"],"published_time":"2022-09-13T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-38011","summary":"Raw Image Extension Remote Code Execution Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.08023,"ranking_epss":0.9212,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38011","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38011"],"published_time":"2022-09-13T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35831","summary":"Windows Remote Access Connection Manager Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00646,"ranking_epss":0.70761,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35831","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35831"],"published_time":"2022-09-13T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35832","summary":"Windows Event Tracing Denial of Service Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00744,"ranking_epss":0.73066,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35832","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35832"],"published_time":"2022-09-13T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35833","summary":"Windows Secure Channel Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.19507,"ranking_epss":0.95411,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35833","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35833"],"published_time":"2022-09-13T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35834","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.1381,"ranking_epss":0.94305,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35834","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35834"],"published_time":"2022-09-13T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35835","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.13911,"ranking_epss":0.94333,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35835","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35835"],"published_time":"2022-09-13T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35836","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.13911,"ranking_epss":0.94333,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35836","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35836"],"published_time":"2022-09-13T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35837","summary":"Windows Graphics Component Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.16842,"ranking_epss":0.94967,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35837","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35837"],"published_time":"2022-09-13T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35840","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.13911,"ranking_epss":0.94333,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35840","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35840"],"published_time":"2022-09-13T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35841","summary":"Windows Enterprise App Management Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.26184,"ranking_epss":0.96308,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35841","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35841"],"published_time":"2022-09-13T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37954","summary":"DirectX Graphics Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.03302,"ranking_epss":0.87253,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37954","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37954"],"published_time":"2022-09-13T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37955","summary":"Windows Group Policy Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00332,"ranking_epss":0.5617,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37955","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37955"],"published_time":"2022-09-13T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37956","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00775,"ranking_epss":0.73654,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37956","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37956"],"published_time":"2022-09-13T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-37957","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.03302,"ranking_epss":0.87253,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37957","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37957"],"published_time":"2022-09-13T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34718","summary":"Windows TCP/IP Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.85781,"ranking_epss":0.99383,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34718","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34718"],"published_time":"2022-09-13T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34719","summary":"Windows Distributed File System (DFS) Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01109,"ranking_epss":0.78155,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34719","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34719"],"published_time":"2022-09-13T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34720","summary":"Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.29209,"ranking_epss":0.96602,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34720","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34720"],"published_time":"2022-09-13T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34721","summary":"Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.266,"ranking_epss":0.96347,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34721","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34721"],"published_time":"2022-09-13T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34722","summary":"Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.15561,"ranking_epss":0.94698,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34722","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34722"],"published_time":"2022-09-13T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34725","summary":"Windows ALPC Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.0119,"ranking_epss":0.7885,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34725","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34725"],"published_time":"2022-09-13T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34726","summary":"Microsoft ODBC Driver Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.13534,"ranking_epss":0.94244,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34726","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34726"],"published_time":"2022-09-13T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34727","summary":"Microsoft ODBC Driver Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.13534,"ranking_epss":0.94244,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34727","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34727"],"published_time":"2022-09-13T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34728","summary":"Windows Graphics Component Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.04166,"ranking_epss":0.887,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34728","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34728"],"published_time":"2022-09-13T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34729","summary":"Windows GDI Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.03061,"ranking_epss":0.86732,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34729","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34729"],"published_time":"2022-09-13T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34730","summary":"Microsoft ODBC Driver Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.13534,"ranking_epss":0.94244,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34730","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34730"],"published_time":"2022-09-13T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34731","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.13911,"ranking_epss":0.94333,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34731","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34731"],"published_time":"2022-09-13T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34732","summary":"Microsoft ODBC Driver Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.13534,"ranking_epss":0.94244,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34732","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34732"],"published_time":"2022-09-13T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34733","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.13911,"ranking_epss":0.94333,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34733","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34733"],"published_time":"2022-09-13T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34734","summary":"Microsoft ODBC Driver Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.13534,"ranking_epss":0.94244,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34734","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34734"],"published_time":"2022-09-13T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35803","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01618,"ranking_epss":0.81847,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35803","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35803"],"published_time":"2022-09-13T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26928","summary":"Windows Photo Import API Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00152,"ranking_epss":0.35842,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26928","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26928"],"published_time":"2022-09-13T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26929","summary":".NET Framework Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.04913,"ranking_epss":0.89625,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26929","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26929"],"published_time":"2022-09-13T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30170","summary":"Windows Credential Roaming Service Elevation of Privilege Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.02945,"ranking_epss":0.86466,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30170","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30170"],"published_time":"2022-09-13T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30196","summary":"Windows Secure Channel Denial of Service Vulnerability","cvss":8.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.2,"cvss_v4":null,"epss":0.08047,"ranking_epss":0.92133,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30196","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30196"],"published_time":"2022-09-13T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30200","summary":"Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02026,"ranking_epss":0.83815,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30200","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30200"],"published_time":"2022-09-13T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34301","summary":"A flaw was found in CryptoPro Secure Disk bootloaders before 2022-06-01. An attacker may use this bootloader to bypass or tamper with Secure Boot protections. In order to load and execute arbitrary code in the pre-boot stage, an attacker simply needs to replace the existing signed bootloader currently in use with this bootloader. Access to the EFI System Partition is required for booting using external media.","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00125,"ranking_epss":0.31684,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://edk2-docs.gitbook.io/understanding-the-uefi-secure-boot-chain/secure_boot_chain_in_uefi/uefi_secure_boot","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01001.html","https://www.kb.cert.org/vuls/id/309662","https://edk2-docs.gitbook.io/understanding-the-uefi-secure-boot-chain/secure_boot_chain_in_uefi/uefi_secure_boot","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01001.html","https://www.kb.cert.org/vuls/id/309662"],"published_time":"2022-08-26T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34302","summary":"A flaw was found in New Horizon Datasys bootloaders before 2022-06-01. An attacker may use this bootloader to bypass or tamper with Secure Boot protections. In order to load and execute arbitrary code in the pre-boot stage, an attacker simply needs to replace the existing signed bootloader currently in use with this bootloader. Access to the EFI System Partition is required for booting using external media.","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00143,"ranking_epss":0.34614,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://edk2-docs.gitbook.io/understanding-the-uefi-secure-boot-chain/secure_boot_chain_in_uefi/uefi_secure_boot","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01001.html","https://www.kb.cert.org/vuls/id/309662","https://edk2-docs.gitbook.io/understanding-the-uefi-secure-boot-chain/secure_boot_chain_in_uefi/uefi_secure_boot","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01001.html","https://www.kb.cert.org/vuls/id/309662"],"published_time":"2022-08-26T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34303","summary":"A flaw was found in Eurosoft bootloaders before 2022-06-01. An attacker may use this bootloader to bypass or tamper with Secure Boot protections. In order to load and execute arbitrary code in the pre-boot stage, an attacker simply needs to replace the existing signed bootloader currently in use with this bootloader. Access to the EFI System Partition is required for booting using external media.","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00112,"ranking_epss":0.29707,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://edk2-docs.gitbook.io/understanding-the-uefi-secure-boot-chain/secure_boot_chain_in_uefi/uefi_secure_boot","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01001.html","https://www.kb.cert.org/vuls/id/309662","https://edk2-docs.gitbook.io/understanding-the-uefi-secure-boot-chain/secure_boot_chain_in_uefi/uefi_secure_boot","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01001.html","https://www.kb.cert.org/vuls/id/309662"],"published_time":"2022-08-26T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35822","summary":"Windows Defender Credential Guard Security Feature Bypass Vulnerability","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00837,"ranking_epss":0.74693,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35822","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35822"],"published_time":"2022-08-15T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34711","summary":"Windows Defender Credential Guard Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00741,"ranking_epss":0.73004,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34711","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34711"],"published_time":"2022-08-15T21:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35820","summary":"Windows Bluetooth Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01071,"ranking_epss":0.77774,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35820","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35820"],"published_time":"2022-08-09T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35792","summary":"Storage Spaces Direct Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01256,"ranking_epss":0.7941,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35792","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35792"],"published_time":"2022-08-09T20:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35793","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.06177,"ranking_epss":0.90864,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35793","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35793"],"published_time":"2022-08-09T20:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35794","summary":"Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.07918,"ranking_epss":0.92057,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35794","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35794"],"published_time":"2022-08-09T20:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35795","summary":"Windows Error Reporting Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01109,"ranking_epss":0.78155,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35795","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35795"],"published_time":"2022-08-09T20:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35797","summary":"Windows Hello Security Feature Bypass Vulnerability","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.0046,"ranking_epss":0.64152,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35797","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35797"],"published_time":"2022-08-09T20:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35764","summary":"Storage Spaces Direct Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02796,"ranking_epss":0.86125,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35764","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35764"],"published_time":"2022-08-09T20:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35765","summary":"Storage Spaces Direct Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02796,"ranking_epss":0.86125,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35765","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35765"],"published_time":"2022-08-09T20:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35766","summary":"Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00888,"ranking_epss":0.75531,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35766","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35766"],"published_time":"2022-08-09T20:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35767","summary":"Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.01202,"ranking_epss":0.78954,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35767","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35767"],"published_time":"2022-08-09T20:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35768","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00838,"ranking_epss":0.74715,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35768","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35768"],"published_time":"2022-08-09T20:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35769","summary":"Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.19525,"ranking_epss":0.95417,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35769","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35769"],"published_time":"2022-08-09T20:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35771","summary":"Windows Defender Credential Guard Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02388,"ranking_epss":0.85038,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35771","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35771"],"published_time":"2022-08-09T20:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34704","summary":"Windows Defender Credential Guard Information Disclosure Vulnerability","cvss":4.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.7,"cvss_v4":null,"epss":0.03276,"ranking_epss":0.87192,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34704","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34704"],"published_time":"2022-08-09T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34705","summary":"Windows Defender Credential Guard Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00853,"ranking_epss":0.74974,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34705","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34705"],"published_time":"2022-08-09T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34706","summary":"Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02005,"ranking_epss":0.83713,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34706","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34706"],"published_time":"2022-08-09T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34707","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00451,"ranking_epss":0.63741,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34707","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34707"],"published_time":"2022-08-09T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34708","summary":"Windows Kernel Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.02392,"ranking_epss":0.85055,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34708","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34708"],"published_time":"2022-08-09T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34709","summary":"Windows Defender Credential Guard Security Feature Bypass Vulnerability","cvss":6.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.0,"cvss_v4":null,"epss":0.01312,"ranking_epss":0.79841,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34709","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34709"],"published_time":"2022-08-09T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34710","summary":"Windows Defender Credential Guard Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.04677,"ranking_epss":0.89347,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34710","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34710"],"published_time":"2022-08-09T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34712","summary":"Windows Defender Credential Guard Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.04234,"ranking_epss":0.88792,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34712","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34712"],"published_time":"2022-08-09T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34714","summary":"Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.01467,"ranking_epss":0.80933,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34714","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34714"],"published_time":"2022-08-09T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35760","summary":"Microsoft ATA Port Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01113,"ranking_epss":0.78198,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35760","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35760"],"published_time":"2022-08-09T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35761","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02727,"ranking_epss":0.8597,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35761","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35761"],"published_time":"2022-08-09T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35762","summary":"Storage Spaces Direct Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02802,"ranking_epss":0.8614,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35762","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35762"],"published_time":"2022-08-09T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35763","summary":"Storage Spaces Direct Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02796,"ranking_epss":0.86125,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35763","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35763"],"published_time":"2022-08-09T20:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-33670","summary":"Windows Partition Management Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00855,"ranking_epss":0.74994,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33670","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33670"],"published_time":"2022-08-09T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34690","summary":"Windows Fax Service Elevation of Privilege Vulnerability","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00864,"ranking_epss":0.75132,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34690","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34690"],"published_time":"2022-08-09T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34691","summary":"Active Directory Domain Services Elevation of Privilege Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02213,"ranking_epss":0.84485,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34691","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34691"],"published_time":"2022-08-09T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34696","summary":"Windows Hyper-V Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00299,"ranking_epss":0.53333,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34696","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34696"],"published_time":"2022-08-09T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34699","summary":"Windows Win32k Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0302,"ranking_epss":0.86634,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34699","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34699"],"published_time":"2022-08-09T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34701","summary":"Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.19525,"ranking_epss":0.95417,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34701","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34701"],"published_time":"2022-08-09T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34702","summary":"Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.01071,"ranking_epss":0.77771,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34702","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34702"],"published_time":"2022-08-09T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-34703","summary":"Windows Partition Management Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02268,"ranking_epss":0.84659,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34703","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34703"],"published_time":"2022-08-09T20:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30133","summary":"Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.22572,"ranking_epss":0.95863,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30133","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30133"],"published_time":"2022-08-09T20:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30144","summary":"Windows Bluetooth Service Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01087,"ranking_epss":0.77945,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30144","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30144"],"published_time":"2022-08-09T20:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30194","summary":"Windows WebBrowser Control Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.0233,"ranking_epss":0.84851,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30194","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30194"],"published_time":"2022-08-09T20:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30197","summary":"Windows Kernel Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00948,"ranking_epss":0.76387,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30197","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30197"],"published_time":"2022-08-09T20:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-33644","summary":"Xbox Live Save Service Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00307,"ranking_epss":0.53945,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33644","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33644"],"published_time":"2022-07-12T23:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30202","summary":"Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.0,"cvss_v4":null,"epss":0.0068,"ranking_epss":0.71622,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30202","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30202"],"published_time":"2022-07-12T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30203","summary":"Windows Boot Manager Security Feature Bypass Vulnerability","cvss":7.4,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.4,"cvss_v4":null,"epss":0.01468,"ranking_epss":0.80942,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30203","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30203"],"published_time":"2022-07-12T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30205","summary":"Windows Group Policy Elevation of Privilege Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":6.0,"cvss_v3":6.6,"cvss_v4":null,"epss":0.00729,"ranking_epss":0.72684,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30205","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30205"],"published_time":"2022-07-12T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30206","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.26384,"ranking_epss":0.96329,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30206","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30206"],"published_time":"2022-07-12T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30208","summary":"Windows Security Account Manager (SAM) Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.05642,"ranking_epss":0.90368,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30208","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30208"],"published_time":"2022-07-12T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30209","summary":"Windows IIS Server Elevation of Privilege Vulnerability","cvss":7.4,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":7.4,"cvss_v4":null,"epss":0.03191,"ranking_epss":0.87001,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30209","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30209"],"published_time":"2022-07-12T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30211","summary":"Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":6.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.04084,"ranking_epss":0.88579,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30211","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30211"],"published_time":"2022-07-12T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30212","summary":"Windows Connected Devices Platform Service Information Disclosure Vulnerability","cvss":4.7,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00306,"ranking_epss":0.53911,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30212","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30212"],"published_time":"2022-07-12T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30213","summary":"Windows GDI+ Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00626,"ranking_epss":0.70257,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30213","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30213"],"published_time":"2022-07-12T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30216","summary":"Windows Server Service Tampering Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.5958,"ranking_epss":0.98258,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30216","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30216"],"published_time":"2022-07-12T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30220","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00742,"ranking_epss":0.73022,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30220","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30220"],"published_time":"2022-07-12T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30221","summary":"Windows Graphics Component Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":5.1,"cvss_v3":8.8,"cvss_v4":null,"epss":0.05258,"ranking_epss":0.90004,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30221","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30221"],"published_time":"2022-07-12T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30222","summary":"Windows Shell Remote Code Execution Vulnerability","cvss":8.4,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":8.4,"cvss_v4":null,"epss":0.0035,"ranking_epss":0.57499,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30222","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30222"],"published_time":"2022-07-12T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30223","summary":"Windows Hyper-V Information Disclosure Vulnerability","cvss":5.7,"cvss_version":3.0,"cvss_v2":2.7,"cvss_v3":5.7,"cvss_v4":null,"epss":0.02733,"ranking_epss":0.85983,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30223","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30223"],"published_time":"2022-07-12T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30224","summary":"Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00489,"ranking_epss":0.65556,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30224","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30224"],"published_time":"2022-07-12T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30225","summary":"Windows Media Player Network Sharing Service Elevation of Privilege Vulnerability","cvss":7.1,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00376,"ranking_epss":0.59259,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30225","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30225"],"published_time":"2022-07-12T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30226","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.1,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":7.1,"cvss_v4":null,"epss":0.0059,"ranking_epss":0.69234,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30226","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30226"],"published_time":"2022-07-12T23:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22043","summary":"Windows Fast FAT File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00553,"ranking_epss":0.68087,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22043","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22043"],"published_time":"2022-07-12T23:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22045","summary":"Windows.Devices.Picker.dll Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0067,"ranking_epss":0.71368,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22045","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22045"],"published_time":"2022-07-12T23:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22048","summary":"BitLocker Security Feature Bypass Vulnerability","cvss":6.1,"cvss_version":3.0,"cvss_v2":6.6,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00854,"ranking_epss":0.74977,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22048","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22048"],"published_time":"2022-07-12T23:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22049","summary":"Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00708,"ranking_epss":0.72243,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22049","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22049"],"published_time":"2022-07-12T23:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22050","summary":"Windows Fax Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00772,"ranking_epss":0.73614,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22050","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22050"],"published_time":"2022-07-12T23:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22711","summary":"Windows BitLocker Information Disclosure Vulnerability","cvss":5.7,"cvss_version":3.0,"cvss_v2":3.3,"cvss_v3":5.7,"cvss_v4":null,"epss":0.00278,"ranking_epss":0.51284,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22711","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22711"],"published_time":"2022-07-12T23:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22023","summary":"Windows Portable Device Enumerator Service Security Feature Bypass Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":6.6,"cvss_v4":null,"epss":0.00278,"ranking_epss":0.51302,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22023","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22023"],"published_time":"2022-07-12T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22024","summary":"Windows Fax Service Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":5.1,"cvss_v3":7.8,"cvss_v4":null,"epss":0.018,"ranking_epss":0.82825,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22024","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22024"],"published_time":"2022-07-12T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22025","summary":"Windows Internet Information Services Cachuri Module Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.45135,"ranking_epss":0.97608,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22025","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22025"],"published_time":"2022-07-12T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22026","summary":"Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00547,"ranking_epss":0.67894,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22026","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22026"],"published_time":"2022-07-12T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22027","summary":"Windows Fax Service Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02285,"ranking_epss":0.84716,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22027","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22027"],"published_time":"2022-07-12T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22031","summary":"Windows Credential Guard Domain-joined Public Key Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00289,"ranking_epss":0.52435,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22031","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22031"],"published_time":"2022-07-12T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22034","summary":"Windows Graphics Component Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00645,"ranking_epss":0.70746,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22034","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22034"],"published_time":"2022-07-12T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22036","summary":"Performance Counters for Windows Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00402,"ranking_epss":0.60864,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22036","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22036"],"published_time":"2022-07-12T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22037","summary":"Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":8.5,"cvss_v3":7.5,"cvss_v4":null,"epss":0.08437,"ranking_epss":0.92355,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22037","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22037"],"published_time":"2022-07-12T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22038","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.1,"cvss_v4":null,"epss":0.05754,"ranking_epss":0.90476,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22038","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22038"],"published_time":"2022-07-12T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22040","summary":"Internet Information Services Dynamic Compression Module Denial of Service Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":7.3,"cvss_v4":null,"epss":0.02876,"ranking_epss":0.86302,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22040","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22040"],"published_time":"2022-07-12T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22041","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":8.5,"cvss_v3":6.8,"cvss_v4":null,"epss":0.04421,"ranking_epss":0.89045,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22041","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22041"],"published_time":"2022-07-12T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22042","summary":"Windows Hyper-V Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.20868,"ranking_epss":0.95634,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22042","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22042"],"published_time":"2022-07-12T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21845","summary":"Windows Kernel Information Disclosure Vulnerability","cvss":4.7,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00626,"ranking_epss":0.70242,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21845","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21845"],"published_time":"2022-07-12T23:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22022","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.1,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00267,"ranking_epss":0.50211,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22022","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22022"],"published_time":"2022-07-12T23:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30189","summary":"Windows Autopilot Device Management and Enrollment Client Spoofing Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.06088,"ranking_epss":0.90785,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30189","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30189"],"published_time":"2022-06-15T22:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30150","summary":"Windows Defender Remote Credential Guard Elevation of Privilege Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":6.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02347,"ranking_epss":0.84908,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30150","http://packetstormsecurity.com/files/167697/Windows-Defender-Remote-Credential-Guard-Authentication-Relay-Privilege-Escalation.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30150"],"published_time":"2022-06-15T22:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30151","summary":"Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.0038,"ranking_epss":0.59497,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30151","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30151"],"published_time":"2022-06-15T22:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30152","summary":"Windows Network Address Translation (NAT) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.25242,"ranking_epss":0.96204,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30152","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30152"],"published_time":"2022-06-15T22:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30153","summary":"Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.10873,"ranking_epss":0.93403,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30153","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30153"],"published_time":"2022-06-15T22:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30154","summary":"Microsoft File Server Shadow Copy Agent Service (RVSS) Elevation of Privilege Vulnerability","cvss":5.3,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.3,"cvss_v4":null,"epss":0.02876,"ranking_epss":0.86302,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30154","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30154"],"published_time":"2022-06-15T22:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30155","summary":"Windows Kernel Denial of Service Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":7.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.02407,"ranking_epss":0.85107,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30155","http://packetstormsecurity.com/files/167755/Windows-Kernel-nt-MiRelocateImage-Invalid-Read.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30155"],"published_time":"2022-06-15T22:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30160","summary":"Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.05423,"ranking_epss":0.90176,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30160","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30160"],"published_time":"2022-06-15T22:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30161","summary":"Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.10791,"ranking_epss":0.93372,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30161","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30161"],"published_time":"2022-06-15T22:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30162","summary":"Windows Kernel Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00455,"ranking_epss":0.63903,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30162","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30162"],"published_time":"2022-06-15T22:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30163","summary":"Windows Hyper-V Remote Code Execution Vulnerability","cvss":8.5,"cvss_version":3.0,"cvss_v2":6.0,"cvss_v3":8.5,"cvss_v4":null,"epss":0.00592,"ranking_epss":0.69273,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30163","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30163"],"published_time":"2022-06-15T22:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30164","summary":"Kerberos AppContainer Security Feature Bypass Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00925,"ranking_epss":0.76057,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30164","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30164"],"published_time":"2022-06-15T22:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30165","summary":"Windows Kerberos Elevation of Privilege Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.07407,"ranking_epss":0.91754,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30165","http://packetstormsecurity.com/files/167711/Windows-Kerberos-Redirected-Logon-Buffer-Privilege-Escalation.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30165"],"published_time":"2022-06-15T22:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30166","summary":"Local Security Authority Subsystem Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.07554,"ranking_epss":0.91845,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30166","http://packetstormsecurity.com/files/167754/Windows-LSA-Service-LsapGetClientInfo-Impersonation-Level-Check-Privilege-Escalation.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30166"],"published_time":"2022-06-15T22:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30132","summary":"Windows Container Manager Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00572,"ranking_epss":0.68724,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30132","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30132"],"published_time":"2022-06-15T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30139","summary":"Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":6.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.05035,"ranking_epss":0.89765,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30139","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30139"],"published_time":"2022-06-15T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30140","summary":"Windows iSCSI Discovery Service Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.1,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02181,"ranking_epss":0.84376,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30140","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30140"],"published_time":"2022-06-15T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30141","summary":"Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":8.1,"cvss_v4":null,"epss":0.09818,"ranking_epss":0.92982,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30141","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30141"],"published_time":"2022-06-15T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30142","summary":"Windows File History Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.6,"cvss_v3":7.5,"cvss_v4":null,"epss":0.04711,"ranking_epss":0.89387,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30142","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30142"],"published_time":"2022-06-15T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30143","summary":"Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.1,"cvss_v3":7.5,"cvss_v4":null,"epss":0.05102,"ranking_epss":0.89846,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30143","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30143"],"published_time":"2022-06-15T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30145","summary":"Windows Encrypting File System (EFS) Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":6.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.05427,"ranking_epss":0.90181,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30145","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30145"],"published_time":"2022-06-15T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30146","summary":"Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.1,"cvss_v3":7.5,"cvss_v4":null,"epss":0.05102,"ranking_epss":0.89846,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30146","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30146"],"published_time":"2022-06-15T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30147","summary":"Windows Installer Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01449,"ranking_epss":0.80804,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30147","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30147"],"published_time":"2022-06-15T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30148","summary":"Windows Desired State Configuration (DSC) Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00762,"ranking_epss":0.73418,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30148","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30148"],"published_time":"2022-06-15T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30149","summary":"Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.1,"cvss_v3":7.5,"cvss_v4":null,"epss":0.0506,"ranking_epss":0.89798,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30149","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30149"],"published_time":"2022-06-15T22:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-32230","summary":"Microsoft Windows SMBv3 suffers from a null pointer dereference in versions of Windows prior to the April, 2022 patch set. By sending a malformed FileNormalizedNameInformation SMBv3 request over a named pipe, an attacker can cause a Blue Screen of Death (BSOD) crash of the Windows kernel. For most systems, this attack requires authentication, except in the special case of Windows Domain Controllers, where unauthenticated users can always open named pipes as long as they can establish an SMB session. Typically, after the BSOD, the victim SMBv3 server will reboot.","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.8,"cvss_v3":7.5,"cvss_v4":null,"epss":0.28903,"ranking_epss":0.96573,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/zeroSteiner/metasploit-framework/blob/feat/mod/cve-2022-32230/modules/auxiliary/dos/smb/smb_filenormalizednameinformation.rb","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-32230","https://support.microsoft.com/en-us/topic/may-10-2022-kb5013942-os-builds-19042-1706-19043-1706-and-19044-1706-60b51119-85be-4a34-9e21-8954f6749504","https://www.rapid7.com/blog/post/2022/06/14/cve-2022-32230-windows-smb-denial-of-service-vulnerability-fixed/","https://github.com/zeroSteiner/metasploit-framework/blob/feat/mod/cve-2022-32230/modules/auxiliary/dos/smb/smb_filenormalizednameinformation.rb","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-32230","https://support.microsoft.com/en-us/topic/may-10-2022-kb5013942-os-builds-19042-1706-19043-1706-and-19044-1706-60b51119-85be-4a34-9e21-8954f6749504","https://www.rapid7.com/blog/post/2022/06/14/cve-2022-32230-windows-smb-denial-of-service-vulnerability-fixed/"],"published_time":"2022-06-14T22:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30138","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00823,"ranking_epss":0.74478,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30138","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30138"],"published_time":"2022-05-18T23:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-29142","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00384,"ranking_epss":0.59695,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29142","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29142"],"published_time":"2022-05-10T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-30130","summary":".NET Framework Denial of Service Vulnerability","cvss":3.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.3,"cvss_v4":null,"epss":0.04314,"ranking_epss":0.88912,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30130","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30130"],"published_time":"2022-05-10T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-29125","summary":"Windows Push Notifications Apps Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00221,"ranking_epss":0.44753,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29125","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29125"],"published_time":"2022-05-10T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-29126","summary":"Tablet Windows User Interface Application Core Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00285,"ranking_epss":0.52061,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29126","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29126"],"published_time":"2022-05-10T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-29127","summary":"BitLocker Security Feature Bypass Vulnerability","cvss":4.2,"cvss_version":3.0,"cvss_v2":1.9,"cvss_v3":4.2,"cvss_v4":null,"epss":0.00406,"ranking_epss":0.61101,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29127","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29127"],"published_time":"2022-05-10T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-29128","summary":"Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.0,"cvss_v3":8.8,"cvss_v4":null,"epss":0.14363,"ranking_epss":0.94432,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29128","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29128"],"published_time":"2022-05-10T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-29129","summary":"Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.0,"cvss_v3":8.8,"cvss_v4":null,"epss":0.14363,"ranking_epss":0.94432,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29129","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29129"],"published_time":"2022-05-10T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-29130","summary":"Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":9.8,"cvss_v4":null,"epss":0.14207,"ranking_epss":0.94404,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29130","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29130"],"published_time":"2022-05-10T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-29131","summary":"Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.0,"cvss_v3":8.8,"cvss_v4":null,"epss":0.13231,"ranking_epss":0.94166,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29131","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29131"],"published_time":"2022-05-10T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-29132","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00497,"ranking_epss":0.65876,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29132","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29132"],"published_time":"2022-05-10T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-29137","summary":"Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.15664,"ranking_epss":0.94717,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29137","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29137"],"published_time":"2022-05-10T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-29139","summary":"Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.10873,"ranking_epss":0.93403,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29139","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29139"],"published_time":"2022-05-10T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-29140","summary":"Windows Print Spooler Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.01609,"ranking_epss":0.81789,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29140","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29140"],"published_time":"2022-05-10T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-29141","summary":"Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.10827,"ranking_epss":0.93385,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29141","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29141"],"published_time":"2022-05-10T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-29103","summary":"Windows Remote Access Connection Manager Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00327,"ranking_epss":0.55728,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29103","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29103"],"published_time":"2022-05-10T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-29104","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01511,"ranking_epss":0.81243,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29104","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29104"],"published_time":"2022-05-10T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-29105","summary":"Microsoft Windows Media Foundation Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02819,"ranking_epss":0.86177,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29105","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29105"],"published_time":"2022-05-10T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-29106","summary":"Windows Hyper-V Shared Virtual Disk Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00309,"ranking_epss":0.54119,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29106","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29106"],"published_time":"2022-05-10T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-29112","summary":"Windows Graphics Component Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.13905,"ranking_epss":0.9433,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29112","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29112"],"published_time":"2022-05-10T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-29113","summary":"Windows Digital Media Receiver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00205,"ranking_epss":0.42724,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29113","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29113"],"published_time":"2022-05-10T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-29114","summary":"Windows Print Spooler Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00487,"ranking_epss":0.65482,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29114","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29114"],"published_time":"2022-05-10T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-29115","summary":"Windows Fax Service Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02819,"ranking_epss":0.86177,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29115","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29115"],"published_time":"2022-05-10T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-29121","summary":"Windows WLAN AutoConfig Service Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":3.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00427,"ranking_epss":0.62437,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29121","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29121"],"published_time":"2022-05-10T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24466","summary":"Windows Hyper-V Security Feature Bypass Vulnerability","cvss":4.1,"cvss_version":3.0,"cvss_v2":2.3,"cvss_v3":4.1,"cvss_v4":null,"epss":0.01131,"ranking_epss":0.78356,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24466","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24466"],"published_time":"2022-05-10T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26913","summary":"Windows Authentication Information Disclosure Vulnerability","cvss":7.4,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":7.4,"cvss_v4":null,"epss":0.0396,"ranking_epss":0.88378,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26913","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26913"],"published_time":"2022-05-10T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26926","summary":"Windows Address Book Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02005,"ranking_epss":0.83715,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26926","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26926"],"published_time":"2022-05-10T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26927","summary":"Windows Graphics Component Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.28121,"ranking_epss":0.96494,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26927","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26927"],"published_time":"2022-05-10T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26930","summary":"Windows Remote Access Connection Manager Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.01242,"ranking_epss":0.79281,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26930","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26930"],"published_time":"2022-05-10T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26931","summary":"Windows Kerberos Elevation of Privilege Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":6.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01621,"ranking_epss":0.81862,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26931","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26931"],"published_time":"2022-05-10T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26933","summary":"Windows NTFS Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00542,"ranking_epss":0.67732,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26933","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26933"],"published_time":"2022-05-10T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26935","summary":"Windows WLAN AutoConfig Service Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":3.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00519,"ranking_epss":0.66852,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26935","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26935"],"published_time":"2022-05-10T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26936","summary":"Windows Server Service Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.17959,"ranking_epss":0.95165,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26936","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26936"],"published_time":"2022-05-10T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21972","summary":"Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":8.1,"cvss_v4":null,"epss":0.48559,"ranking_epss":0.9776,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21972","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21972"],"published_time":"2022-05-10T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22011","summary":"Windows Graphics Component Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00387,"ranking_epss":0.59904,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22011","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22011"],"published_time":"2022-05-10T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22012","summary":"Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":9.8,"cvss_v4":null,"epss":0.09863,"ranking_epss":0.93002,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22012","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22012"],"published_time":"2022-05-10T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22013","summary":"Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.15664,"ranking_epss":0.94717,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22013","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22013"],"published_time":"2022-05-10T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22014","summary":"Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.15664,"ranking_epss":0.94717,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22014","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22014"],"published_time":"2022-05-10T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22015","summary":"Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.16112,"ranking_epss":0.94807,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22015","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22015"],"published_time":"2022-05-10T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22016","summary":"Windows PlayToManager Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00326,"ranking_epss":0.55626,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22016","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22016"],"published_time":"2022-05-10T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22019","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.05138,"ranking_epss":0.89885,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22019","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22019"],"published_time":"2022-05-10T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22713","summary":"Windows Hyper-V Denial of Service Vulnerability","cvss":5.6,"cvss_version":3.0,"cvss_v2":1.9,"cvss_v3":5.6,"cvss_v4":null,"epss":0.00207,"ranking_epss":0.4306,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22713","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22713"],"published_time":"2022-05-10T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-23270","summary":"Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":8.1,"cvss_v4":null,"epss":0.48395,"ranking_epss":0.97752,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23270","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23270"],"published_time":"2022-05-10T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-23279","summary":"Windows ALPC Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.01386,"ranking_epss":0.80355,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23279","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23279"],"published_time":"2022-05-10T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26914","summary":"Win32k Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00495,"ranking_epss":0.65819,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26914","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26914"],"published_time":"2022-04-15T19:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26915","summary":"Windows Secure Channel Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.17608,"ranking_epss":0.95107,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26915","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26915"],"published_time":"2022-04-15T19:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26916","summary":"Windows Fax Compose Form Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":5.1,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0124,"ranking_epss":0.79264,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26916","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26916"],"published_time":"2022-04-15T19:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26917","summary":"Windows Fax Compose Form Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":5.1,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0124,"ranking_epss":0.79264,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26917","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26917"],"published_time":"2022-04-15T19:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26918","summary":"Windows Fax Compose Form Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":5.1,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0124,"ranking_epss":0.79264,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26918","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26918"],"published_time":"2022-04-15T19:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26919","summary":"Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":8.1,"cvss_v4":null,"epss":0.04808,"ranking_epss":0.8951,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26919","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26919"],"published_time":"2022-04-15T19:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26920","summary":"Windows Graphics Component Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.0056,"ranking_epss":0.68303,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26920","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26920"],"published_time":"2022-04-15T19:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26826","summary":"Windows DNS Server Remote Code Execution Vulnerability","cvss":7.2,"cvss_version":3.0,"cvss_v2":9.0,"cvss_v3":7.2,"cvss_v4":null,"epss":0.11213,"ranking_epss":0.93527,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26826","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26826"],"published_time":"2022-04-15T19:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26827","summary":"Windows File Server Resource Management Service Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00151,"ranking_epss":0.35719,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26827","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26827"],"published_time":"2022-04-15T19:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26828","summary":"Windows Bluetooth Driver Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00162,"ranking_epss":0.3709,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26828","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26828"],"published_time":"2022-04-15T19:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26831","summary":"Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.21804,"ranking_epss":0.95766,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26831","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26831"],"published_time":"2022-04-15T19:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26832","summary":".NET Framework Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.22432,"ranking_epss":0.95847,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26832","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26832"],"published_time":"2022-04-15T19:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26903","summary":"Windows Graphics Component Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02019,"ranking_epss":0.8379,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26903","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26903"],"published_time":"2022-04-15T19:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26794","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00488,"ranking_epss":0.65528,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26794","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26794"],"published_time":"2022-04-15T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26795","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00495,"ranking_epss":0.65819,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26795","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26795"],"published_time":"2022-04-15T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26796","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00389,"ranking_epss":0.60025,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26796","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26796"],"published_time":"2022-04-15T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26797","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00488,"ranking_epss":0.65528,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26797","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26797"],"published_time":"2022-04-15T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26798","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0059,"ranking_epss":0.6922,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26798","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26798"],"published_time":"2022-04-15T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26801","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00382,"ranking_epss":0.59604,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26801","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26801"],"published_time":"2022-04-15T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26802","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00382,"ranking_epss":0.59604,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26802","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26802"],"published_time":"2022-04-15T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26803","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00583,"ranking_epss":0.69039,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26803","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26803"],"published_time":"2022-04-15T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26807","summary":"Windows Work Folder Service Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00153,"ranking_epss":0.36015,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26807","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26807"],"published_time":"2022-04-15T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26808","summary":"Windows File Explorer Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00112,"ranking_epss":0.29673,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26808","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26808"],"published_time":"2022-04-15T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26809","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":10.0,"cvss_v3":9.8,"cvss_v4":null,"epss":0.92562,"ranking_epss":0.99742,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26809","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26809"],"published_time":"2022-04-15T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26810","summary":"Windows File Server Resource Management Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00321,"ranking_epss":0.55161,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26810","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26810"],"published_time":"2022-04-15T19:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24547","summary":"Windows Digital Media Receiver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0182,"ranking_epss":0.82903,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24547","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24547"],"published_time":"2022-04-15T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24549","summary":"Windows AppX Package Manager Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00219,"ranking_epss":0.4456,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24549","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24549"],"published_time":"2022-04-15T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24550","summary":"Windows Telephony Server Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00432,"ranking_epss":0.6268,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24550","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24550"],"published_time":"2022-04-15T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26786","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00417,"ranking_epss":0.61816,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26786","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26786"],"published_time":"2022-04-15T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26787","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00382,"ranking_epss":0.59604,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26787","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26787"],"published_time":"2022-04-15T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26788","summary":"PowerShell Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00378,"ranking_epss":0.59373,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26788","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26788"],"published_time":"2022-04-15T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26789","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00387,"ranking_epss":0.59882,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26789","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26789"],"published_time":"2022-04-15T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26790","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00497,"ranking_epss":0.65909,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26790","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26790"],"published_time":"2022-04-15T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26791","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00387,"ranking_epss":0.59882,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26791","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26791"],"published_time":"2022-04-15T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26792","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00382,"ranking_epss":0.59604,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26792","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26792"],"published_time":"2022-04-15T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-26793","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00495,"ranking_epss":0.65819,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26793","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26793"],"published_time":"2022-04-15T19:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24500","summary":"Windows SMB Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.44661,"ranking_epss":0.97583,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24500","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24500"],"published_time":"2022-04-15T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24528","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.04978,"ranking_epss":0.89707,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24528","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24528"],"published_time":"2022-04-15T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24530","summary":"Windows Installer Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00321,"ranking_epss":0.55161,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24530","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24530"],"published_time":"2022-04-15T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24533","summary":"Remote Desktop Protocol Remote Code Execution Vulnerability","cvss":8.0,"cvss_version":3.0,"cvss_v2":8.5,"cvss_v3":8.0,"cvss_v4":null,"epss":0.08763,"ranking_epss":0.92522,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24533","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24533"],"published_time":"2022-04-15T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24534","summary":"Win32 Stream Enumeration Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.1,"cvss_v3":7.5,"cvss_v4":null,"epss":0.04733,"ranking_epss":0.89417,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24534","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24534"],"published_time":"2022-04-15T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24537","summary":"Windows Hyper-V Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00156,"ranking_epss":0.36419,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24537","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24537"],"published_time":"2022-04-15T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24540","summary":"Windows ALPC Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.0011,"ranking_epss":0.29405,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24540","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24540"],"published_time":"2022-04-15T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24541","summary":"Windows Server Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":8.8,"cvss_v4":null,"epss":0.08721,"ranking_epss":0.92505,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24541","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24541"],"published_time":"2022-04-15T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24542","summary":"Windows Win32k Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01321,"ranking_epss":0.79906,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24542","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24542"],"published_time":"2022-04-15T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24544","summary":"Windows Kerberos Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0025,"ranking_epss":0.48448,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24544","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24544"],"published_time":"2022-04-15T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24545","summary":"Windows Kerberos Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":5.1,"cvss_v3":8.1,"cvss_v4":null,"epss":0.04076,"ranking_epss":0.8856,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24545","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24545"],"published_time":"2022-04-15T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24546","summary":"Windows DWM Core Library Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00373,"ranking_epss":0.59068,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24546","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24546"],"published_time":"2022-04-15T19:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24479","summary":"Connected User Experiences and Telemetry Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00393,"ranking_epss":0.60286,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24479","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24479"],"published_time":"2022-04-15T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24481","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.43992,"ranking_epss":0.97549,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24481","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24481"],"published_time":"2022-04-15T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24482","summary":"Windows ALPC Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00162,"ranking_epss":0.3709,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24482","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24482"],"published_time":"2022-04-15T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24483","summary":"Windows Kernel Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.05889,"ranking_epss":0.906,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24483","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24483"],"published_time":"2022-04-15T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24485","summary":"Win32 File Enumeration Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.1,"cvss_v3":7.5,"cvss_v4":null,"epss":0.06152,"ranking_epss":0.90845,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24485","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24485"],"published_time":"2022-04-15T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24486","summary":"Windows Kerberos Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00373,"ranking_epss":0.59068,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24486","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24486"],"published_time":"2022-04-15T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24487","summary":"Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.07204,"ranking_epss":0.91617,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24487","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24487"],"published_time":"2022-04-15T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24488","summary":"Windows Desktop Bridge Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00291,"ranking_epss":0.52589,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24488","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24488"],"published_time":"2022-04-15T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24491","summary":"Windows Network File System Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.37582,"ranking_epss":0.97204,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24491","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24491"],"published_time":"2022-04-15T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24492","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":8.8,"cvss_v4":null,"epss":0.07634,"ranking_epss":0.91892,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24492","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24492"],"published_time":"2022-04-15T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24493","summary":"Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00662,"ranking_epss":0.71202,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24493","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24493"],"published_time":"2022-04-15T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24494","summary":"Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.16754,"ranking_epss":0.94959,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24494","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24494"],"published_time":"2022-04-15T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24495","summary":"Windows Direct Show Remote Code Execution Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":6.0,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00751,"ranking_epss":0.73214,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24495","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24495"],"published_time":"2022-04-15T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24496","summary":"Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00387,"ranking_epss":0.59882,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24496","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24496"],"published_time":"2022-04-15T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24497","summary":"Windows Network File System Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.37582,"ranking_epss":0.97204,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24497","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24497"],"published_time":"2022-04-15T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24498","summary":"Windows iSCSI Target Service Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.15947,"ranking_epss":0.94774,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24498","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24498"],"published_time":"2022-04-15T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24499","summary":"Windows Installer Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00254,"ranking_epss":0.48766,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24499","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24499"],"published_time":"2022-04-15T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21983","summary":"Win32 Stream Enumeration Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.1,"cvss_v3":7.5,"cvss_v4":null,"epss":0.04733,"ranking_epss":0.89417,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21983","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21983"],"published_time":"2022-04-15T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22008","summary":"Windows Hyper-V Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00156,"ranking_epss":0.36419,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22008","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22008"],"published_time":"2022-04-15T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22009","summary":"Windows Hyper-V Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00339,"ranking_epss":0.56728,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22009","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22009"],"published_time":"2022-04-15T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-23257","summary":"Windows Hyper-V Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00328,"ranking_epss":0.55849,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23257","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23257"],"published_time":"2022-04-15T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24474","summary":"Windows Win32k Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00337,"ranking_epss":0.56587,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24474","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24474"],"published_time":"2022-04-15T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24525","summary":"Windows Update Stack Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30183,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24525","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24525"],"published_time":"2022-03-09T17:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24503","summary":"Remote Desktop Protocol Client Information Disclosure Vulnerability","cvss":5.4,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":5.4,"cvss_v4":null,"epss":0.01976,"ranking_epss":0.83594,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24503","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24503"],"published_time":"2022-03-09T17:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24505","summary":"Windows ALPC Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00148,"ranking_epss":0.35293,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24505","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24505"],"published_time":"2022-03-09T17:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24507","summary":"Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00459,"ranking_epss":0.64055,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24507","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24507"],"published_time":"2022-03-09T17:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24508","summary":"Win32 File Enumeration Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.05177,"ranking_epss":0.89923,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24508","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24508"],"published_time":"2022-03-09T17:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24502","summary":"Windows HTML Platforms Security Feature Bypass Vulnerability","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":4.3,"cvss_v4":null,"epss":0.02844,"ranking_epss":0.86237,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24502","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24502"],"published_time":"2022-03-09T17:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24454","summary":"Windows Security Support Provider Interface Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0023,"ranking_epss":0.45839,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24454","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24454"],"published_time":"2022-03-09T17:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24455","summary":"Windows CD-ROM Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00395,"ranking_epss":0.60392,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24455","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24455"],"published_time":"2022-03-09T17:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24459","summary":"Windows Fax and Scan Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0023,"ranking_epss":0.45839,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24459","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24459"],"published_time":"2022-03-09T17:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-24460","summary":"Tablet Windows User Interface Application Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":7.6,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00888,"ranking_epss":0.75535,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24460","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24460"],"published_time":"2022-03-09T17:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-23288","summary":"Windows DWM Core Library Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00356,"ranking_epss":0.57926,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23288","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23288"],"published_time":"2022-03-09T17:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-23290","summary":"Windows Inking COM Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0023,"ranking_epss":0.45839,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23290","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23290"],"published_time":"2022-03-09T17:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-23291","summary":"Windows DWM Core Library Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00389,"ranking_epss":0.60039,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23291","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23291"],"published_time":"2022-03-09T17:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-23293","summary":"Windows Fast FAT File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00266,"ranking_epss":0.50092,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23293","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23293"],"published_time":"2022-03-09T17:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-23294","summary":"Windows Event Tracing Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.07756,"ranking_epss":0.91962,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23294","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23294"],"published_time":"2022-03-09T17:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-23296","summary":"Windows Installer Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00542,"ranking_epss":0.67754,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23296","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23296"],"published_time":"2022-03-09T17:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-23297","summary":"Windows NT Lan Manager Datagram Receiver Driver Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00495,"ranking_epss":0.65807,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23297","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23297"],"published_time":"2022-03-09T17:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-23298","summary":"Windows NT OS Kernel Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.0,"cvss_v4":null,"epss":0.0036,"ranking_epss":0.5821,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23298","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23298"],"published_time":"2022-03-09T17:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-23299","summary":"Windows PDEV Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00555,"ranking_epss":0.6816,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23299","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23299"],"published_time":"2022-03-09T17:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-23278","summary":"Microsoft Defender for Endpoint Spoofing Vulnerability","cvss":5.9,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.9,"cvss_v4":null,"epss":0.02714,"ranking_epss":0.8594,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23278","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23278"],"published_time":"2022-03-09T17:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-23281","summary":"Windows Common Log File System Driver Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00533,"ranking_epss":0.67426,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23281","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23281"],"published_time":"2022-03-09T17:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-23283","summary":"Windows ALPC Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00141,"ranking_epss":0.34382,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23283","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23283"],"published_time":"2022-03-09T17:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-23284","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.2,"cvss_version":3.0,"cvss_v2":9.0,"cvss_v3":7.2,"cvss_v4":null,"epss":0.09515,"ranking_epss":0.9285,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23284","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23284"],"published_time":"2022-03-09T17:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-23285","summary":"Remote Desktop Client Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.16826,"ranking_epss":0.94966,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23285","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23285"],"published_time":"2022-03-09T17:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-23286","summary":"Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00479,"ranking_epss":0.65077,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23286","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23286"],"published_time":"2022-03-09T17:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-23287","summary":"Windows ALPC Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00356,"ranking_epss":0.57926,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23287","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23287"],"published_time":"2022-03-09T17:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21975","summary":"Windows Hyper-V Denial of Service Vulnerability","cvss":4.7,"cvss_version":3.0,"cvss_v2":1.9,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00136,"ranking_epss":0.33312,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21975","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21975"],"published_time":"2022-03-09T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21977","summary":"Media Foundation Information Disclosure Vulnerability","cvss":3.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.3,"cvss_v4":null,"epss":0.0102,"ranking_epss":0.77266,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21977","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21977"],"published_time":"2022-03-09T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21990","summary":"Remote Desktop Client Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.14305,"ranking_epss":0.94423,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21990","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21990"],"published_time":"2022-03-09T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22010","summary":"Media Foundation Information Disclosure Vulnerability","cvss":4.4,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":4.4,"cvss_v4":null,"epss":0.01314,"ranking_epss":0.79856,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22010","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22010"],"published_time":"2022-03-09T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-23253","summary":"Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.30215,"ranking_epss":0.96689,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23253","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23253"],"published_time":"2022-03-09T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21967","summary":"Xbox Live Auth Manager for Windows Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00366,"ranking_epss":0.58626,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21967","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21967"],"published_time":"2022-03-09T17:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33110","summary":"Improper input validation for some Intel(R) Wireless Bluetooth(R) products and Killer(TM) Bluetooth(R) products in Windows 10 and 11 before version 22.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access.","cvss":6.5,"cvss_version":3.0,"cvss_v2":3.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00304,"ranking_epss":0.53746,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00581.html","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00581.html"],"published_time":"2022-02-09T23:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33113","summary":"Improper input validation for some Intel(R) PROSet/Wireless WiFi in multiple operating systems and Killer(TM) WiFi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.","cvss":8.1,"cvss_version":3.0,"cvss_v2":4.8,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00309,"ranking_epss":0.54098,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00582.html","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00582.html"],"published_time":"2022-02-09T23:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33114","summary":"Improper input validation for some Intel(R) PROSet/Wireless WiFi in multiple operating systems and Killer(TM) WiFi in Windows 10 and 11 may allow an authenticated user to potentially enable denial of service via adjacent access.","cvss":5.7,"cvss_version":3.0,"cvss_v2":2.7,"cvss_v3":5.7,"cvss_v4":null,"epss":0.00174,"ranking_epss":0.38859,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00582.html","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00582.html"],"published_time":"2022-02-09T23:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22710","summary":"Windows Common Log File System Driver Denial of Service Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00383,"ranking_epss":0.59654,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22710","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22710"],"published_time":"2022-02-09T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22712","summary":"Windows Hyper-V Denial of Service Vulnerability","cvss":5.6,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":5.6,"cvss_v4":null,"epss":0.00212,"ranking_epss":0.43717,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22712","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22712"],"published_time":"2022-02-09T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22715","summary":"Named Pipe File System Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.09985,"ranking_epss":0.93061,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22715","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22715"],"published_time":"2022-02-09T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22717","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00426,"ranking_epss":0.62336,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22717","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22717"],"published_time":"2022-02-09T17:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21989","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01602,"ranking_epss":0.81743,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21989","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21989"],"published_time":"2022-02-09T17:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21992","summary":"Windows Mobile Device Management Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01107,"ranking_epss":0.78144,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21992","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21992"],"published_time":"2022-02-09T17:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21993","summary":"Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.8,"cvss_v3":7.5,"cvss_v4":null,"epss":0.23968,"ranking_epss":0.96045,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21993","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21993"],"published_time":"2022-02-09T17:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21994","summary":"Windows DWM Core Library Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00523,"ranking_epss":0.66952,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21994","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21994"],"published_time":"2022-02-09T17:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21995","summary":"Windows Hyper-V Remote Code Execution Vulnerability","cvss":7.9,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.9,"cvss_v4":null,"epss":0.00841,"ranking_epss":0.74769,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21995","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21995"],"published_time":"2022-02-09T17:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21997","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.1,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00295,"ranking_epss":0.52888,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21997","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21997"],"published_time":"2022-02-09T17:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21998","summary":"Windows Common Log File System Driver Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00406,"ranking_epss":0.61127,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21998","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21998"],"published_time":"2022-02-09T17:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22000","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00523,"ranking_epss":0.66952,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22000","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22000"],"published_time":"2022-02-09T17:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22001","summary":"Windows Remote Access Connection Manager Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00389,"ranking_epss":0.60039,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22001","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22001"],"published_time":"2022-02-09T17:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-22002","summary":"Windows User Account Profile Picture Denial of Service Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00273,"ranking_epss":0.50771,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22002","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22002"],"published_time":"2022-02-09T17:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21974","summary":"Roaming Security Rights Management Services Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":7.8,"cvss_v4":null,"epss":0.08813,"ranking_epss":0.92543,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21974","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21974"],"published_time":"2022-02-09T17:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21981","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00453,"ranking_epss":0.63798,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21981","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21981"],"published_time":"2022-02-09T17:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21984","summary":"Windows DNS Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.0,"cvss_v3":8.8,"cvss_v4":null,"epss":0.07463,"ranking_epss":0.91785,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21984","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21984"],"published_time":"2022-02-09T17:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21985","summary":"Windows Remote Access Connection Manager Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00296,"ranking_epss":0.53005,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21985","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21985"],"published_time":"2022-02-09T17:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21958","summary":"Windows Resilient File System (ReFS) Remote Code Execution Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":6.8,"cvss_v4":null,"epss":0.01417,"ranking_epss":0.80596,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21958","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21958"],"published_time":"2022-01-11T21:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21959","summary":"Windows Resilient File System (ReFS) Remote Code Execution Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":6.8,"cvss_v4":null,"epss":0.01417,"ranking_epss":0.80596,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21959","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21959"],"published_time":"2022-01-11T21:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21960","summary":"Windows Resilient File System (ReFS) Remote Code Execution Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":6.8,"cvss_v4":null,"epss":0.01417,"ranking_epss":0.80596,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21960","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21960"],"published_time":"2022-01-11T21:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21961","summary":"Windows Resilient File System (ReFS) Remote Code Execution Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":6.8,"cvss_v4":null,"epss":0.01417,"ranking_epss":0.80596,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21961","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21961"],"published_time":"2022-01-11T21:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21962","summary":"Windows Resilient File System (ReFS) Remote Code Execution Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":6.8,"cvss_v4":null,"epss":0.01417,"ranking_epss":0.80596,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21962","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21962"],"published_time":"2022-01-11T21:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21963","summary":"Windows Resilient File System (ReFS) Remote Code Execution Vulnerability","cvss":6.4,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":6.4,"cvss_v4":null,"epss":0.01714,"ranking_epss":0.82388,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21963","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21963"],"published_time":"2022-01-11T21:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21964","summary":"Remote Desktop Licensing Diagnoser Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.02279,"ranking_epss":0.84695,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21964","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21964"],"published_time":"2022-01-11T21:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21911","summary":".NET Framework Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.20804,"ranking_epss":0.95618,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21911","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21911"],"published_time":"2022-01-11T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21912","summary":"DirectX Graphics Kernel Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02611,"ranking_epss":0.8567,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21912","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21912"],"published_time":"2022-01-11T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21913","summary":"Local Security Authority (Domain Policy) Remote Protocol Security Feature Bypass","cvss":5.3,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":5.3,"cvss_v4":null,"epss":0.01265,"ranking_epss":0.79481,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21913","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21913"],"published_time":"2022-01-11T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21914","summary":"Windows Remote Access Connection Manager Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01663,"ranking_epss":0.82113,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21914","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21914"],"published_time":"2022-01-11T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21915","summary":"Windows GDI+ Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.13035,"ranking_epss":0.94111,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21915","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21915"],"published_time":"2022-01-11T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21916","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01429,"ranking_epss":0.80673,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21916","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21916"],"published_time":"2022-01-11T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21918","summary":"DirectX Graphics Kernel File Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":6.5,"cvss_v4":null,"epss":0.01826,"ranking_epss":0.82931,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21918","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21918"],"published_time":"2022-01-11T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21920","summary":"Windows Kerberos Elevation of Privilege Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.0,"cvss_v3":8.8,"cvss_v4":null,"epss":0.08741,"ranking_epss":0.92514,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21920","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21920"],"published_time":"2022-01-11T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21921","summary":"Windows Defender Credential Guard Security Feature Bypass Vulnerability","cvss":4.4,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":4.4,"cvss_v4":null,"epss":0.01677,"ranking_epss":0.82199,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21921","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21921"],"published_time":"2022-01-11T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21922","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.0,"cvss_v3":8.8,"cvss_v4":null,"epss":0.07999,"ranking_epss":0.92104,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21922","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21922"],"published_time":"2022-01-11T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21924","summary":"Workstation Service Remote Protocol Security Feature Bypass Vulnerability","cvss":5.3,"cvss_version":3.0,"cvss_v2":5.4,"cvss_v3":5.3,"cvss_v4":null,"epss":0.02068,"ranking_epss":0.83958,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21924","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21924"],"published_time":"2022-01-11T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21928","summary":"Windows Resilient File System (ReFS) Remote Code Execution Vulnerability","cvss":6.3,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":6.3,"cvss_v4":null,"epss":0.01507,"ranking_epss":0.81215,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21928","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21928"],"published_time":"2022-01-11T21:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21892","summary":"Windows Resilient File System (ReFS) Remote Code Execution Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00313,"ranking_epss":0.54483,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21892","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21892"],"published_time":"2022-01-11T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21893","summary":"Remote Desktop Protocol Remote Code Execution Vulnerability","cvss":8.0,"cvss_version":3.0,"cvss_v2":8.5,"cvss_v3":8.0,"cvss_v4":null,"epss":0.13026,"ranking_epss":0.94109,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21893","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21893"],"published_time":"2022-01-11T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21894","summary":"Secure Boot Security Feature Bypass Vulnerability","cvss":4.4,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":4.4,"cvss_v4":null,"epss":0.5017,"ranking_epss":0.9784,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21894","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21894"],"published_time":"2022-01-11T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21895","summary":"Windows User Profile Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00725,"ranking_epss":0.72622,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21895","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21895","https://www.zerodayinitiative.com/advisories/ZDI-22-050/"],"published_time":"2022-01-11T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21896","summary":"Windows DWM Core Library Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00433,"ranking_epss":0.62781,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21896","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21896"],"published_time":"2022-01-11T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21897","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00371,"ranking_epss":0.58978,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21897","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21897"],"published_time":"2022-01-11T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21898","summary":"DirectX Graphics Kernel Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":10.0,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01082,"ranking_epss":0.77894,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21898","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21898"],"published_time":"2022-01-11T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21899","summary":"Windows Extensible Firmware Interface Security Feature Bypass Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00278,"ranking_epss":0.51248,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21899","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21899","https://www.zerodayinitiative.com/advisories/ZDI-22-052/"],"published_time":"2022-01-11T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21900","summary":"Windows Hyper-V Security Feature Bypass Vulnerability","cvss":4.6,"cvss_version":3.0,"cvss_v2":3.8,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00346,"ranking_epss":0.57239,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21900","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21900"],"published_time":"2022-01-11T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21901","summary":"Windows Hyper-V Elevation of Privilege Vulnerability","cvss":9.0,"cvss_version":3.0,"cvss_v2":7.7,"cvss_v3":9.0,"cvss_v4":null,"epss":0.00459,"ranking_epss":0.64076,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21901","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21901"],"published_time":"2022-01-11T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21902","summary":"Windows DWM Core Library Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00692,"ranking_epss":0.71872,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21902","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21902"],"published_time":"2022-01-11T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21903","summary":"Windows GDI Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00303,"ranking_epss":0.53647,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21903","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21903"],"published_time":"2022-01-11T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21904","summary":"Windows GDI Information Disclosure Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.18581,"ranking_epss":0.9527,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21904","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21904"],"published_time":"2022-01-11T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21905","summary":"Windows Hyper-V Security Feature Bypass Vulnerability","cvss":4.6,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00421,"ranking_epss":0.62033,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21905","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21905"],"published_time":"2022-01-11T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21906","summary":"Windows Defender Application Control Security Feature Bypass Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00874,"ranking_epss":0.75302,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21906","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21906"],"published_time":"2022-01-11T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21907","summary":"HTTP Protocol Stack Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":10.0,"cvss_v3":9.8,"cvss_v4":null,"epss":0.91887,"ranking_epss":0.99694,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21907","http://packetstormsecurity.com/files/166730/Microsoft-HTTP-Protocol-Stack-Denial-Of-Service.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21907"],"published_time":"2022-01-11T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21908","summary":"Windows Installer Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00359,"ranking_epss":0.58107,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21908","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21908"],"published_time":"2022-01-11T21:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21873","summary":"Tile Data Repository Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00394,"ranking_epss":0.60348,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21873","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21873"],"published_time":"2022-01-11T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21874","summary":"Windows Security Center API Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":10.0,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0249,"ranking_epss":0.85337,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21874","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21874"],"published_time":"2022-01-11T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21875","summary":"Windows Storage Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00394,"ranking_epss":0.60348,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21875","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21875"],"published_time":"2022-01-11T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21876","summary":"Win32k Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00697,"ranking_epss":0.71972,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21876","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21876","https://www.zerodayinitiative.com/advisories/ZDI-22-051/"],"published_time":"2022-01-11T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21877","summary":"Storage Spaces Controller Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.14993,"ranking_epss":0.94581,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21877","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21877","https://www.zerodayinitiative.com/advisories/ZDI-22-048/"],"published_time":"2022-01-11T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21878","summary":"Windows Geolocation Service Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":7.8,"cvss_v4":null,"epss":0.03222,"ranking_epss":0.87072,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21878","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21878"],"published_time":"2022-01-11T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21879","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00699,"ranking_epss":0.72021,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21879","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21879"],"published_time":"2022-01-11T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21880","summary":"Windows GDI+ Information Disclosure Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.8,"cvss_v3":7.5,"cvss_v4":null,"epss":0.19536,"ranking_epss":0.95418,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21880","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21880"],"published_time":"2022-01-11T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21881","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.0,"cvss_v4":null,"epss":0.06658,"ranking_epss":0.91239,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21881","http://packetstormsecurity.com/files/168097/Race-Against-The-Sandbox.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21881"],"published_time":"2022-01-11T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21883","summary":"Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.1,"cvss_v3":7.5,"cvss_v4":null,"epss":0.07283,"ranking_epss":0.91678,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21883","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21883"],"published_time":"2022-01-11T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21885","summary":"Windows Remote Access Connection Manager Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00289,"ranking_epss":0.52388,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21885","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21885"],"published_time":"2022-01-11T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21888","summary":"Windows Modern Execution Server Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02854,"ranking_epss":0.86257,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21888","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21888"],"published_time":"2022-01-11T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21889","summary":"Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":7.5,"cvss_v4":null,"epss":0.15188,"ranking_epss":0.94618,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21889","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21889"],"published_time":"2022-01-11T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21890","summary":"Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":7.5,"cvss_v4":null,"epss":0.15188,"ranking_epss":0.94618,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21890","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21890"],"published_time":"2022-01-11T21:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21852","summary":"Windows DWM Core Library Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00384,"ranking_epss":0.59711,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21852","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21852"],"published_time":"2022-01-11T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21857","summary":"Active Directory Domain Services Elevation of Privilege Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.0,"cvss_v3":8.8,"cvss_v4":null,"epss":0.04225,"ranking_epss":0.88781,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21857","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21857"],"published_time":"2022-01-11T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21858","summary":"Windows Bind Filter Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00414,"ranking_epss":0.61579,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21858","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21858"],"published_time":"2022-01-11T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21859","summary":"Windows Accounts Control Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00285,"ranking_epss":0.52063,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21859","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21859"],"published_time":"2022-01-11T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21860","summary":"Windows AppContracts API Server Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00402,"ranking_epss":0.60847,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21860","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21860"],"published_time":"2022-01-11T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21861","summary":"Task Flow Data Engine Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00313,"ranking_epss":0.54476,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21861","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21861"],"published_time":"2022-01-11T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21862","summary":"Windows Application Model Core API Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00285,"ranking_epss":0.52063,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21862","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21862"],"published_time":"2022-01-11T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21863","summary":"Windows StateRepository API Server file Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00514,"ranking_epss":0.66616,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21863","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21863"],"published_time":"2022-01-11T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21864","summary":"Windows UI Immersive Server API Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00533,"ranking_epss":0.67421,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21864","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21864"],"published_time":"2022-01-11T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21865","summary":"Connected Devices Platform Service Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00402,"ranking_epss":0.60847,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21865","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21865"],"published_time":"2022-01-11T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21866","summary":"Windows System Launcher Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00408,"ranking_epss":0.61251,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21866","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21866"],"published_time":"2022-01-11T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21867","summary":"Windows Push Notifications Apps Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00514,"ranking_epss":0.66616,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21867","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21867"],"published_time":"2022-01-11T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21868","summary":"Windows Devices Human Interface Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00408,"ranking_epss":0.61259,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21868","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21868"],"published_time":"2022-01-11T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21869","summary":"Clipboard User Service Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00453,"ranking_epss":0.63811,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21869","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21869"],"published_time":"2022-01-11T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21870","summary":"Tablet Windows User Interface Application Core Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00394,"ranking_epss":0.60348,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21870","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21870"],"published_time":"2022-01-11T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21872","summary":"Windows Event Tracing Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00394,"ranking_epss":0.60348,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21872","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21872"],"published_time":"2022-01-11T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21833","summary":"Virtual Machine IDE Drive Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00369,"ranking_epss":0.58832,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21833","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21833"],"published_time":"2022-01-11T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21834","summary":"Windows User-mode Driver Framework Reflector Driver Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00218,"ranking_epss":0.4452,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21834","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21834"],"published_time":"2022-01-11T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21835","summary":"Microsoft Cryptographic Services Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00289,"ranking_epss":0.52388,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21835","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21835"],"published_time":"2022-01-11T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21836","summary":"Windows Certificate Spoofing Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00407,"ranking_epss":0.6117,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21836","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21836"],"published_time":"2022-01-11T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21838","summary":"Windows Cleanup Manager Elevation of Privilege Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00373,"ranking_epss":0.59038,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21838","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21838","https://www.zerodayinitiative.com/advisories/ZDI-22-049/"],"published_time":"2022-01-11T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21839","summary":"Windows Event Tracing Discretionary Access Control List Denial of Service Vulnerability","cvss":6.1,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00208,"ranking_epss":0.43198,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21839","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21839"],"published_time":"2022-01-11T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21843","summary":"Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":7.5,"cvss_v4":null,"epss":0.13249,"ranking_epss":0.94172,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21843","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21843"],"published_time":"2022-01-11T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21847","summary":"Windows Hyper-V Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00292,"ranking_epss":0.52634,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21847","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21847"],"published_time":"2022-01-11T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21848","summary":"Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.1,"cvss_v3":7.5,"cvss_v4":null,"epss":0.0982,"ranking_epss":0.92984,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21848","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21848"],"published_time":"2022-01-11T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21849","summary":"Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":9.8,"cvss_v4":null,"epss":0.24801,"ranking_epss":0.96164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21849","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21849"],"published_time":"2022-01-11T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21850","summary":"Remote Desktop Client Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":8.8,"cvss_v4":null,"epss":0.09979,"ranking_epss":0.93057,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21850","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21850"],"published_time":"2022-01-11T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-21851","summary":"Remote Desktop Client Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":8.8,"cvss_v4":null,"epss":0.09979,"ranking_epss":0.93057,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21851","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21851"],"published_time":"2022-01-11T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43883","summary":"Windows Installer Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.09119,"ranking_epss":0.92684,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43883","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43883"],"published_time":"2021-12-15T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43893","summary":"Windows Encrypting File System (EFS) Elevation of Privilege Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":6.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.06763,"ranking_epss":0.91323,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/165560/Microsoft-Windows-EFSRPC-Arbitrary-File-Upload-Privilege-Escalation.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43893","http://packetstormsecurity.com/files/165560/Microsoft-Windows-EFSRPC-Arbitrary-File-Upload-Privilege-Escalation.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43893"],"published_time":"2021-12-15T15:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43233","summary":"Remote Desktop Client Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.1,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01984,"ranking_epss":0.83625,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43233","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43233"],"published_time":"2021-12-15T15:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43234","summary":"Windows Fax Service Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00817,"ranking_epss":0.7438,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43234","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43234"],"published_time":"2021-12-15T15:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43235","summary":"Storage Spaces Controller Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00442,"ranking_epss":0.63342,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43235","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43235"],"published_time":"2021-12-15T15:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43236","summary":"Microsoft Message Queuing Information Disclosure Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.14127,"ranking_epss":0.94385,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43236","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43236"],"published_time":"2021-12-15T15:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43237","summary":"Windows Setup Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00719,"ranking_epss":0.72509,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43237","https://www.zerodayinitiative.com/advisories/ZDI-22-018/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43237","https://www.zerodayinitiative.com/advisories/ZDI-22-018/"],"published_time":"2021-12-15T15:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43238","summary":"Windows Remote Access Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0042,"ranking_epss":0.61966,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43238","https://www.zerodayinitiative.com/advisories/ZDI-22-019/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43238","https://www.zerodayinitiative.com/advisories/ZDI-22-019/"],"published_time":"2021-12-15T15:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43239","summary":"Windows Recovery Environment Agent Elevation of Privilege Vulnerability","cvss":7.1,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00214,"ranking_epss":0.43947,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43239","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43239"],"published_time":"2021-12-15T15:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43240","summary":"NTFS Set Short Name Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00502,"ranking_epss":0.66087,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43240","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43240"],"published_time":"2021-12-15T15:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43244","summary":"Windows Kernel Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00443,"ranking_epss":0.63346,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43244","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43244"],"published_time":"2021-12-15T15:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43246","summary":"Windows Hyper-V Denial of Service Vulnerability","cvss":5.6,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.6,"cvss_v4":null,"epss":0.00216,"ranking_epss":0.44286,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43246","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43246"],"published_time":"2021-12-15T15:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43247","summary":"Windows TCP/IP Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00702,"ranking_epss":0.72088,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43247","https://www.zerodayinitiative.com/advisories/ZDI-21-1554/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43247","https://www.zerodayinitiative.com/advisories/ZDI-21-1554/"],"published_time":"2021-12-15T15:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43248","summary":"Windows Digital Media Receiver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00262,"ranking_epss":0.4963,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43248","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43248"],"published_time":"2021-12-15T15:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43207","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00319,"ranking_epss":0.54946,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43207","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43207"],"published_time":"2021-12-15T15:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43215","summary":"iSNS Server Memory Corruption Vulnerability Can Lead to Remote Code Execution","cvss":9.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":9.8,"cvss_v4":null,"epss":0.03413,"ranking_epss":0.87457,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43215","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43215"],"published_time":"2021-12-15T15:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43216","summary":"Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":6.5,"cvss_v4":null,"epss":0.18233,"ranking_epss":0.95212,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43216","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43216"],"published_time":"2021-12-15T15:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43217","summary":"Windows Encrypting File System (EFS) Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":8.1,"cvss_v4":null,"epss":0.23665,"ranking_epss":0.96009,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43217","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43217"],"published_time":"2021-12-15T15:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43219","summary":"DirectX Graphics Kernel File Denial of Service Vulnerability","cvss":7.4,"cvss_version":3.0,"cvss_v2":7.8,"cvss_v3":7.4,"cvss_v4":null,"epss":0.01976,"ranking_epss":0.83592,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43219","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43219"],"published_time":"2021-12-15T15:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43222","summary":"Microsoft Message Queuing Information Disclosure Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.14127,"ranking_epss":0.94385,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43222","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43222"],"published_time":"2021-12-15T15:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43223","summary":"Windows Remote Access Connection Manager Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00262,"ranking_epss":0.4963,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43223","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43223"],"published_time":"2021-12-15T15:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43224","summary":"Windows Common Log File System Driver Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.12746,"ranking_epss":0.94022,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43224","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43224"],"published_time":"2021-12-15T15:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43227","summary":"Storage Spaces Controller Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00542,"ranking_epss":0.67749,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43227","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43227"],"published_time":"2021-12-15T15:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43228","summary":"SymCrypt Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.8,"cvss_v3":7.5,"cvss_v4":null,"epss":0.11792,"ranking_epss":0.93734,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43228","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43228"],"published_time":"2021-12-15T15:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43229","summary":"Windows NTFS Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.11892,"ranking_epss":0.93768,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43229","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43229"],"published_time":"2021-12-15T15:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43230","summary":"Windows NTFS Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00734,"ranking_epss":0.72802,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43230","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43230"],"published_time":"2021-12-15T15:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43231","summary":"Windows NTFS Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00514,"ranking_epss":0.66622,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43231","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43231"],"published_time":"2021-12-15T15:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-43232","summary":"Windows Event Tracing Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02803,"ranking_epss":0.86142,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43232","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43232"],"published_time":"2021-12-15T15:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-41333","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00653,"ranking_epss":0.70954,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41333","https://www.zerodayinitiative.com/advisories/ZDI-21-1552/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41333","https://www.zerodayinitiative.com/advisories/ZDI-21-1552/"],"published_time":"2021-12-15T15:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-38505","summary":"Microsoft introduced a new feature in Windows 10 known as Cloud Clipboard which, if enabled, will record data copied to the clipboard to the cloud, and make it available on other computers in certain scenarios. Applications that wish to prevent copied data from being recorded in Cloud History must use specific clipboard formats; and Firefox before versions 94 and ESR 91.3 did not implement them. This could have caused sensitive data to be recorded to a user's Microsoft account. *This bug only affects Firefox for Windows 10+ with Cloud Clipboard enabled. Other operating systems are unaffected.*. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00354,"ranking_epss":0.57784,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.mozilla.org/show_bug.cgi?id=1730194","https://www.mozilla.org/security/advisories/mfsa2021-48/","https://www.mozilla.org/security/advisories/mfsa2021-49/","https://www.mozilla.org/security/advisories/mfsa2021-50/","https://bugzilla.mozilla.org/show_bug.cgi?id=1730194","https://www.mozilla.org/security/advisories/mfsa2021-48/","https://www.mozilla.org/security/advisories/mfsa2021-49/","https://www.mozilla.org/security/advisories/mfsa2021-50/"],"published_time":"2021-12-08T22:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-0120","summary":"Improper initialization in the installer for some Intel(R) Graphics DCH Drivers for Windows 10 before version 27.20.100.9316 may allow an authenticated user to potentially enable denial of service via local access.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00179,"ranking_epss":0.39491,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00566.html","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00566.html"],"published_time":"2021-11-17T20:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33063","summary":"Uncontrolled search path in the Intel(R) RealSense(TM) D400 Series UWP driver for Windows 10 before version 6.1.160.22 may allow an authenticated user to potentially enable escalation of privilege via local access.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00071,"ranking_epss":0.21759,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00557.html","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00557.html"],"published_time":"2021-11-17T20:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-0121","summary":"Improper access control in the installer for some Intel(R) Iris(R) Xe MAX Dedicated Graphics Drivers for Windows 10 before version 27.20.100.9466 may allow authenticated user to potentially enable escalation of privilege via local access.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00148,"ranking_epss":0.35256,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00566.html","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00566.html"],"published_time":"2021-11-17T19:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12893","summary":"Stack Buffer Overflow in AMD Graphics Driver for Windows 10 in Escape 0x15002a may lead to escalation of privilege or denial of service.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00175,"ranking_epss":0.39068,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000","https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"],"published_time":"2021-11-15T20:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12894","summary":"Arbitrary Write in AMD Graphics Driver for Windows 10 in Escape 0x40010d may lead to arbitrary write to kernel memory or denial of service.","cvss":7.1,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00122,"ranking_epss":0.3136,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000","https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"],"published_time":"2021-11-15T20:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12901","summary":"Arbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00094,"ranking_epss":0.26171,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000","https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"],"published_time":"2021-11-15T20:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12903","summary":"Out of Bounds Write and Read in AMD Graphics Driver for Windows 10 in Escape 0x6002d03 may lead to escalation of privilege or denial of service.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00129,"ranking_epss":0.32269,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000","https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"],"published_time":"2021-11-15T20:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12905","summary":"Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00129,"ranking_epss":0.32324,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000","https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"],"published_time":"2021-11-15T20:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12960","summary":"AMD Graphics Driver for Windows 10, amdfender.sys may improperly handle input validation on InputBuffer which may result in a denial of service (DoS).","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00122,"ranking_epss":0.3136,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000","https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"],"published_time":"2021-11-15T20:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12892","summary":"An untrusted search path in AMD Radeon settings Installer may lead to a privilege escalation or unauthorized code execution.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.4,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00146,"ranking_epss":0.34985,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000","https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"],"published_time":"2021-11-15T19:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12898","summary":"Stack Buffer Overflow in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00175,"ranking_epss":0.39068,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000","https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"],"published_time":"2021-11-15T19:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12895","summary":"Pool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00175,"ranking_epss":0.39068,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000","https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"],"published_time":"2021-11-15T16:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12897","summary":"Kernel Pool Address disclosure in AMD Graphics Driver for Windows 10 may lead to KASLR bypass.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00094,"ranking_epss":0.26171,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000","https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"],"published_time":"2021-11-15T16:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12899","summary":"Arbitrary Read in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or denial of service.","cvss":7.1,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00047,"ranking_epss":0.14526,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000","https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"],"published_time":"2021-11-15T16:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12900","summary":"An arbitrary write vulnerability in the AMD Radeon Graphics Driver for Windows 10 potentially allows unprivileged users to gain Escalation of Privileges and cause Denial of Service.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00129,"ranking_epss":0.32269,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000","https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"],"published_time":"2021-11-15T16:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12902","summary":"Arbitrary Decrement Privilege Escalation in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00129,"ranking_epss":0.32269,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000","https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"],"published_time":"2021-11-15T16:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12904","summary":"Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00116,"ranking_epss":0.30282,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000","https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"],"published_time":"2021-11-15T16:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12929","summary":"Improper parameters validation in some trusted applications of the PSP contained in the AMD Graphics Driver may allow a local attacker to bypass security restrictions and achieve arbitrary code execution .","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00047,"ranking_epss":0.1443,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000","https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"],"published_time":"2021-11-15T16:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12963","summary":"An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows may allow unprivileged users to compromise the system.","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00127,"ranking_epss":0.32002,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000","https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"],"published_time":"2021-11-15T16:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-3519","summary":"A vulnerability was reported in some Lenovo Desktop models that could allow unauthorized access to the boot menu, when the \"BIOS Password At Boot Device List\" BIOS setting is Yes.","cvss":6.4,"cvss_version":3.0,"cvss_v2":6.9,"cvss_v3":6.4,"cvss_v4":null,"epss":0.00034,"ranking_epss":0.10002,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://support.lenovo.com/us/en/product_security/LEN-67440","https://support.lenovo.com/us/en/product_security/LEN-67440"],"published_time":"2021-11-12T22:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-3718","summary":"A denial of service vulnerability was reported in some ThinkPad models that could cause a system to crash when the Enhanced Biometrics setting is enabled in BIOS.","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.7,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00035,"ranking_epss":0.10303,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://support.lenovo.com/us/en/product_security/LEN-72619","https://support.lenovo.com/us/en/product_security/LEN-72619"],"published_time":"2021-11-12T22:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-42288","summary":"Windows Hello Security Feature Bypass Vulnerability","cvss":5.7,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":5.7,"cvss_v4":null,"epss":0.00578,"ranking_epss":0.68882,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42288","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42288"],"published_time":"2021-11-10T01:19:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-42283","summary":"NTFS Elevation of Privilege Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00234,"ranking_epss":0.463,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42283","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42283"],"published_time":"2021-11-10T01:19:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-42284","summary":"Windows Hyper-V Denial of Service Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":7.1,"cvss_v3":6.8,"cvss_v4":null,"epss":0.05824,"ranking_epss":0.90546,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42284","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42284"],"published_time":"2021-11-10T01:19:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-42285","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00256,"ranking_epss":0.49012,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42285","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42285"],"published_time":"2021-11-10T01:19:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-42286","summary":"Windows Core Shell SI Host Extension Framework for Composable Shell Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00249,"ranking_epss":0.48199,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42286","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42286"],"published_time":"2021-11-10T01:19:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-42277","summary":"Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00263,"ranking_epss":0.4977,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42277","https://www.zerodayinitiative.com/advisories/ZDI-21-1306/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42277","https://www.zerodayinitiative.com/advisories/ZDI-21-1306/"],"published_time":"2021-11-10T01:19:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-42279","summary":"Chakra Scripting Engine Memory Corruption Vulnerability","cvss":4.2,"cvss_version":3.0,"cvss_v2":5.1,"cvss_v3":4.2,"cvss_v4":null,"epss":0.02954,"ranking_epss":0.86488,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42279","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42279"],"published_time":"2021-11-10T01:19:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-42280","summary":"Windows Feedback Hub Elevation of Privilege Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00157,"ranking_epss":0.36483,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42280","https://www.zerodayinitiative.com/advisories/ZDI-21-1307/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42280","https://www.zerodayinitiative.com/advisories/ZDI-21-1307/"],"published_time":"2021-11-10T01:19:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-42274","summary":"Windows Hyper-V Discrete Device Assignment (DDA) Denial of Service Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00135,"ranking_epss":0.33193,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42274","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42274"],"published_time":"2021-11-10T01:19:43","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-42275","summary":"Microsoft COM for Windows Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.03811,"ranking_epss":0.88117,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42275","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42275"],"published_time":"2021-11-10T01:19:43","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-42276","summary":"Microsoft Windows Media Foundation Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.08614,"ranking_epss":0.92443,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42276","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42276"],"published_time":"2021-11-10T01:19:43","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-41377","summary":"Windows Fast FAT File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00318,"ranking_epss":0.54864,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41377","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41377"],"published_time":"2021-11-10T01:19:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-41378","summary":"Windows NTFS Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00755,"ranking_epss":0.733,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41378","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41378"],"published_time":"2021-11-10T01:19:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-41370","summary":"NTFS Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00234,"ranking_epss":0.463,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41370","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41370"],"published_time":"2021-11-10T01:19:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-41371","summary":"Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability","cvss":4.4,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00584,"ranking_epss":0.69057,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41371","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41371"],"published_time":"2021-11-10T01:19:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-41356","summary":"Windows Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.04291,"ranking_epss":0.88875,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41356","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41356"],"published_time":"2021-11-10T01:19:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-41366","summary":"Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00171,"ranking_epss":0.38321,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41366","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41366"],"published_time":"2021-11-10T01:19:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-41367","summary":"NTFS Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00356,"ranking_epss":0.57946,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41367","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41367"],"published_time":"2021-11-10T01:19:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-41351","summary":"Microsoft Edge (Chrome based) Spoofing on IE Mode","cvss":4.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":4.3,"cvss_v4":null,"epss":0.12295,"ranking_epss":0.93889,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41351","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41351"],"published_time":"2021-11-10T01:19:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-38665","summary":"Remote Desktop Protocol Client Information Disclosure Vulnerability","cvss":7.4,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":7.4,"cvss_v4":null,"epss":0.06223,"ranking_epss":0.90907,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38665","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38665"],"published_time":"2021-11-10T01:18:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-38666","summary":"Remote Desktop Client Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.31882,"ranking_epss":0.96819,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38666","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38666"],"published_time":"2021-11-10T01:18:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-38631","summary":"Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability","cvss":4.4,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00579,"ranking_epss":0.68906,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38631","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38631"],"published_time":"2021-11-10T01:18:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-36957","summary":"Windows Desktop Bridge Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00318,"ranking_epss":0.54866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36957","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36957"],"published_time":"2021-11-10T01:17:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26443","summary":"Microsoft Virtual Machine Bus (VMBus) Remote Code Execution Vulnerability","cvss":9.0,"cvss_version":3.0,"cvss_v2":7.7,"cvss_v3":9.0,"cvss_v4":null,"epss":0.0055,"ranking_epss":0.67995,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26443","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26443"],"published_time":"2021-11-10T01:16:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-41340","summary":"Windows Graphics Component Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.05174,"ranking_epss":0.89921,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41340","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41340"],"published_time":"2021-10-13T01:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-41342","summary":"Windows MSHTML Platform Remote Code Execution Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":6.8,"cvss_v4":null,"epss":0.02445,"ranking_epss":0.8521,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41342","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41342"],"published_time":"2021-10-13T01:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-41343","summary":"Windows Fast FAT File System Driver Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00427,"ranking_epss":0.62346,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41343","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41343"],"published_time":"2021-10-13T01:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-41345","summary":"Storage Spaces Controller Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00436,"ranking_epss":0.63042,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41345","https://www.zerodayinitiative.com/advisories/ZDI-21-1154/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41345","https://www.zerodayinitiative.com/advisories/ZDI-21-1154/"],"published_time":"2021-10-13T01:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-41346","summary":"Console Window Host Security Feature Bypass Vulnerability","cvss":5.3,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00259,"ranking_epss":0.49279,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41346","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41346"],"published_time":"2021-10-13T01:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-41347","summary":"Windows AppX Deployment Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00203,"ranking_epss":0.42398,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41347","https://www.zerodayinitiative.com/advisories/ZDI-21-1161/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41347","https://www.zerodayinitiative.com/advisories/ZDI-21-1161/"],"published_time":"2021-10-13T01:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-40488","summary":"Storage Spaces Controller Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00342,"ranking_epss":0.56932,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40488","https://www.zerodayinitiative.com/advisories/ZDI-21-1153/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40488","https://www.zerodayinitiative.com/advisories/ZDI-21-1153/"],"published_time":"2021-10-13T01:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-40489","summary":"Storage Spaces Controller Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00297,"ranking_epss":0.5309,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40489","https://www.zerodayinitiative.com/advisories/ZDI-21-1156/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40489","https://www.zerodayinitiative.com/advisories/ZDI-21-1156/"],"published_time":"2021-10-13T01:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-41330","summary":"Microsoft Windows Media Foundation Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.05015,"ranking_epss":0.89741,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41330","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41330"],"published_time":"2021-10-13T01:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-41331","summary":"Windows Media Audio Decoder Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.05174,"ranking_epss":0.89921,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41331","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41331"],"published_time":"2021-10-13T01:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-41332","summary":"Windows Print Spooler Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.213,"ranking_epss":0.95698,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41332","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41332"],"published_time":"2021-10-13T01:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-41334","summary":"Windows Desktop Bridge Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00197,"ranking_epss":0.41682,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41334","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41334"],"published_time":"2021-10-13T01:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-41335","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00322,"ranking_epss":0.55318,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41335","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41335"],"published_time":"2021-10-13T01:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-41338","summary":"Windows AppContainer Firewall Rules Security Feature Bypass Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.01201,"ranking_epss":0.78944,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41338","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41338"],"published_time":"2021-10-13T01:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-41339","summary":"Microsoft DWM Core Library Elevation of Privilege Vulnerability","cvss":4.7,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":4.7,"cvss_v4":null,"epss":0.0021,"ranking_epss":0.43595,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41339","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41339"],"published_time":"2021-10-13T01:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-40475","summary":"Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00403,"ranking_epss":0.60913,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40475","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40475"],"published_time":"2021-10-13T01:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-40476","summary":"Windows AppContainer Elevation Of Privilege Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00441,"ranking_epss":0.6327,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/164942/Microsoft-Windows-WSAQuerySocketSecurity-AppContainer-Privilege-Escalation.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40476","http://packetstormsecurity.com/files/164942/Microsoft-Windows-WSAQuerySocketSecurity-AppContainer-Privilege-Escalation.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40476"],"published_time":"2021-10-13T01:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-40477","summary":"Windows Event Tracing Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00289,"ranking_epss":0.52439,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40477","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40477"],"published_time":"2021-10-13T01:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-40478","summary":"Storage Spaces Controller Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00342,"ranking_epss":0.56932,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40478","https://www.zerodayinitiative.com/advisories/ZDI-21-1155/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40478","https://www.zerodayinitiative.com/advisories/ZDI-21-1155/"],"published_time":"2021-10-13T01:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-40461","summary":"Windows Hyper-V Remote Code Execution Vulnerability","cvss":8.0,"cvss_version":3.0,"cvss_v2":5.2,"cvss_v3":8.0,"cvss_v4":null,"epss":0.00558,"ranking_epss":0.68249,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40461","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40461"],"published_time":"2021-10-13T01:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-40462","summary":"Windows Media Foundation Dolby Digital Atmos Decoders Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.04098,"ranking_epss":0.88604,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40462","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40462"],"published_time":"2021-10-13T01:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-40463","summary":"Windows Network Address Translation (NAT) Denial of Service Vulnerability","cvss":7.7,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":7.7,"cvss_v4":null,"epss":0.09125,"ranking_epss":0.92687,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40463","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40463"],"published_time":"2021-10-13T01:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-40464","summary":"Windows Nearby Sharing Elevation of Privilege Vulnerability","cvss":8.0,"cvss_version":3.0,"cvss_v2":5.2,"cvss_v3":8.0,"cvss_v4":null,"epss":0.00578,"ranking_epss":0.68885,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40464","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40464"],"published_time":"2021-10-13T01:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-40465","summary":"Windows Text Shaping Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.03657,"ranking_epss":0.87892,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40465","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40465"],"published_time":"2021-10-13T01:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-40466","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00312,"ranking_epss":0.54433,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40466","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40466"],"published_time":"2021-10-13T01:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-40467","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00414,"ranking_epss":0.61592,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40467","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40467"],"published_time":"2021-10-13T01:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-40468","summary":"Windows Bind Filter Driver Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00488,"ranking_epss":0.65523,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40468","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40468"],"published_time":"2021-10-13T01:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-40470","summary":"DirectX Graphics Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00332,"ranking_epss":0.56148,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40470","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40470"],"published_time":"2021-10-13T01:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26441","summary":"Storage Spaces Controller Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00231,"ranking_epss":0.45976,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26441","https://www.zerodayinitiative.com/advisories/ZDI-21-1157/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26441","https://www.zerodayinitiative.com/advisories/ZDI-21-1157/"],"published_time":"2021-10-13T01:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26442","summary":"Windows HTTP.sys Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00253,"ranking_epss":0.48632,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26442","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26442"],"published_time":"2021-10-13T01:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-36953","summary":"Windows TCP/IP Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.12101,"ranking_epss":0.93825,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36953","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36953"],"published_time":"2021-10-13T01:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-36970","summary":"Windows Print Spooler Spoofing Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":8.8,"cvss_v4":null,"epss":0.14902,"ranking_epss":0.94559,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36970","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36970"],"published_time":"2021-10-13T01:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-38662","summary":"Windows Fast FAT File System Driver Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00578,"ranking_epss":0.68876,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38662","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38662"],"published_time":"2021-10-13T01:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-38663","summary":"Windows exFAT File System Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00422,"ranking_epss":0.6211,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38663","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38663"],"published_time":"2021-10-13T01:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-40443","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00312,"ranking_epss":0.54433,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40443","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40443"],"published_time":"2021-10-13T01:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-40454","summary":"Rich Text Edit Control Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00113,"ranking_epss":0.29879,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40454","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40454"],"published_time":"2021-10-13T01:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-40455","summary":"Windows Installer Spoofing Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00593,"ranking_epss":0.69311,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40455","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40455"],"published_time":"2021-10-13T01:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-40460","summary":"Windows Remote Procedure Call Runtime Security Feature Bypass Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.01755,"ranking_epss":0.82618,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40460","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40460"],"published_time":"2021-10-13T01:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-38671","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00464,"ranking_epss":0.64365,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38671","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38671"],"published_time":"2021-09-15T12:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-40447","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00286,"ranking_epss":0.52106,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40447","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40447"],"published_time":"2021-09-15T12:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-38667","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00464,"ranking_epss":0.64365,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38667","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38667"],"published_time":"2021-09-15T12:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-36975","summary":"Win32k Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00208,"ranking_epss":0.43276,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36975","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36975"],"published_time":"2021-09-15T12:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-38624","summary":"Windows Key Storage Provider Security Feature Bypass Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00392,"ranking_epss":0.6024,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38624","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38624"],"published_time":"2021-09-15T12:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-38628","summary":"Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00318,"ranking_epss":0.54864,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38628","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38628"],"published_time":"2021-09-15T12:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-38629","summary":"Windows Ancillary Function Driver for WinSock Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.22203,"ranking_epss":0.95818,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38629","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38629"],"published_time":"2021-09-15T12:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-38630","summary":"Windows Event Tracing Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00234,"ranking_epss":0.463,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38630","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38630"],"published_time":"2021-09-15T12:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-38632","summary":"BitLocker Security Feature Bypass Vulnerability","cvss":5.7,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.7,"cvss_v4":null,"epss":0.00428,"ranking_epss":0.62496,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38632","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38632"],"published_time":"2021-09-15T12:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-38633","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00459,"ranking_epss":0.64087,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38633","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38633"],"published_time":"2021-09-15T12:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-38634","summary":"Microsoft Windows Update Client Elevation of Privilege Vulnerability","cvss":7.1,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00241,"ranking_epss":0.47468,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38634","https://www.zerodayinitiative.com/advisories/ZDI-21-1075/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38634","https://www.zerodayinitiative.com/advisories/ZDI-21-1075/"],"published_time":"2021-09-15T12:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-38635","summary":"Windows Redirected Drive Buffering SubSystem Driver Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00605,"ranking_epss":0.69644,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38635","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38635"],"published_time":"2021-09-15T12:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-38636","summary":"Windows Redirected Drive Buffering SubSystem Driver Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00605,"ranking_epss":0.69644,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38636","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38636"],"published_time":"2021-09-15T12:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-38637","summary":"Windows Storage Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00313,"ranking_epss":0.54481,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38637","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38637"],"published_time":"2021-09-15T12:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-38638","summary":"Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00356,"ranking_epss":0.57946,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38638","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38638"],"published_time":"2021-09-15T12:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-38639","summary":"Win32k Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00759,"ranking_epss":0.73365,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38639","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38639"],"published_time":"2021-09-15T12:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-36954","summary":"Windows Bind Filter Driver Elevation of Privilege Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00183,"ranking_epss":0.40071,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36954","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36954"],"published_time":"2021-09-15T12:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-36959","summary":"Windows Authenticode Spoofing Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.5,"cvss_v4":null,"epss":0.02523,"ranking_epss":0.85451,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36959","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36959"],"published_time":"2021-09-15T12:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-36960","summary":"Windows SMB Information Disclosure Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.16964,"ranking_epss":0.94986,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36960","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36960"],"published_time":"2021-09-15T12:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-36961","summary":"Windows Installer Denial of Service Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00227,"ranking_epss":0.45567,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36961","https://www.zerodayinitiative.com/advisories/ZDI-21-1078/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36961","https://www.zerodayinitiative.com/advisories/ZDI-21-1078/"],"published_time":"2021-09-15T12:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-36962","summary":"Windows Installer Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00391,"ranking_epss":0.60202,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36962","https://www.zerodayinitiative.com/advisories/ZDI-21-1103/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36962","https://www.zerodayinitiative.com/advisories/ZDI-21-1103/"],"published_time":"2021-09-15T12:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-36963","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0043,"ranking_epss":0.62608,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36963","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36963"],"published_time":"2021-09-15T12:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-36964","summary":"Windows Event Tracing Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00234,"ranking_epss":0.463,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36964","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36964"],"published_time":"2021-09-15T12:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-36965","summary":"Windows WLAN AutoConfig Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02964,"ranking_epss":0.86511,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36965","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36965"],"published_time":"2021-09-15T12:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-36966","summary":"Windows Subsystem for Linux Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00183,"ranking_epss":0.40071,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36966","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36966"],"published_time":"2021-09-15T12:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-36967","summary":"Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability","cvss":8.0,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":8.0,"cvss_v4":null,"epss":0.01467,"ranking_epss":0.80937,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36967","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36967"],"published_time":"2021-09-15T12:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-36969","summary":"Windows Redirected Drive Buffering SubSystem Driver Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00427,"ranking_epss":0.62346,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36969","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36969"],"published_time":"2021-09-15T12:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-36972","summary":"Windows SMB Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00347,"ranking_epss":0.57348,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36972","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36972"],"published_time":"2021-09-15T12:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-36973","summary":"Windows Redirected Drive Buffering System Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00249,"ranking_epss":0.48199,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36973","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36973"],"published_time":"2021-09-15T12:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-36974","summary":"Windows SMB Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0016,"ranking_epss":0.3685,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36974","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36974"],"published_time":"2021-09-15T12:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26435","summary":"Windows Scripting Engine Memory Corruption Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.1,"cvss_v4":null,"epss":0.07765,"ranking_epss":0.91968,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26435","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26435"],"published_time":"2021-09-15T12:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-30605","summary":"Inappropriate implementation in the ChromeOS Readiness Tool installer on Windows prior to 1.0.2.0 loosens DCOM access rights on two objects allowing an attacker to potentially bypass discretionary access controls.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00013,"ranking_epss":0.02259,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bit.ly/37CS6G9","https://crbug.com/1240952","https://bit.ly/37CS6G9","https://crbug.com/1240952"],"published_time":"2021-09-08T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-36947","summary":"Windows Print Spooler Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.09387,"ranking_epss":0.92794,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36947","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36947"],"published_time":"2021-08-12T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34480","summary":"Scripting Engine Memory Corruption Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":6.8,"cvss_v4":null,"epss":0.03053,"ranking_epss":0.86719,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/164121/Internet-Explorer-JIT-Optimization-Memory-Corruption.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34480","http://packetstormsecurity.com/files/164121/Internet-Explorer-JIT-Optimization-Memory-Corruption.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34480"],"published_time":"2021-08-12T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34483","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00445,"ranking_epss":0.63452,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34483","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34483"],"published_time":"2021-08-12T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34487","summary":"Windows Event Tracing Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00192,"ranking_epss":0.41129,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34487","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34487"],"published_time":"2021-08-12T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34530","summary":"Windows Graphics Component Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.05577,"ranking_epss":0.90312,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34530","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34530"],"published_time":"2021-08-12T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34533","summary":"Windows Graphics Component Font Parsing Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01106,"ranking_epss":0.78132,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34533","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34533"],"published_time":"2021-08-12T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34534","summary":"Windows MSHTML Platform Remote Code Execution Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":5.1,"cvss_v3":6.8,"cvss_v4":null,"epss":0.023,"ranking_epss":0.84761,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34534","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34534"],"published_time":"2021-08-12T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34535","summary":"Remote Desktop Client Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.04763,"ranking_epss":0.89467,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34535","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34535"],"published_time":"2021-08-12T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34536","summary":"Storage Spaces Controller Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00422,"ranking_epss":0.62137,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34536","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34536"],"published_time":"2021-08-12T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34537","summary":"Windows Bluetooth Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":5.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00243,"ranking_epss":0.47634,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34537","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34537"],"published_time":"2021-08-12T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-36926","summary":"Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.14576,"ranking_epss":0.94486,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36926","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36926"],"published_time":"2021-08-12T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-36932","summary":"Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.19424,"ranking_epss":0.95396,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36932","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36932"],"published_time":"2021-08-12T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-36933","summary":"Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.14576,"ranking_epss":0.94486,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36933","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36933"],"published_time":"2021-08-12T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-36936","summary":"Windows Print Spooler Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.07327,"ranking_epss":0.91707,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36936","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36936"],"published_time":"2021-08-12T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-36937","summary":"Windows Media MPEG-4 Video Decoder Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01106,"ranking_epss":0.78132,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36937","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36937"],"published_time":"2021-08-12T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-36938","summary":"Windows Cryptographic Primitives Library Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00285,"ranking_epss":0.51939,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36938","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36938"],"published_time":"2021-08-12T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26424","summary":"Windows TCP/IP Remote Code Execution Vulnerability","cvss":9.9,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":9.9,"cvss_v4":null,"epss":0.1053,"ranking_epss":0.93285,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26424","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26424"],"published_time":"2021-08-12T18:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26425","summary":"Windows Event Tracing Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00206,"ranking_epss":0.42921,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26425","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26425"],"published_time":"2021-08-12T18:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26426","summary":"Windows User Account Profile Picture Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00572,"ranking_epss":0.68703,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26426","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26426"],"published_time":"2021-08-12T18:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26431","summary":"Windows Recovery Environment Agent Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00385,"ranking_epss":0.59756,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26431","https://www.zerodayinitiative.com/advisories/ZDI-21-1053/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26431","https://www.zerodayinitiative.com/advisories/ZDI-21-1053/"],"published_time":"2021-08-12T18:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26432","summary":"Windows Services for NFS ONCRPC XDR Driver Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.8,"cvss_v4":null,"epss":0.10285,"ranking_epss":0.93187,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26432","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26432"],"published_time":"2021-08-12T18:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26433","summary":"Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.17064,"ranking_epss":0.95006,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26433","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26433"],"published_time":"2021-08-12T18:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34462","summary":"Windows AppX Deployment Extensions Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00666,"ranking_epss":0.71285,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34462","https://www.zerodayinitiative.com/advisories/ZDI-21-823/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34462","https://www.zerodayinitiative.com/advisories/ZDI-21-823/"],"published_time":"2021-07-16T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34466","summary":"Windows Hello Security Feature Bypass Vulnerability","cvss":5.7,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":5.7,"cvss_v4":null,"epss":0.00456,"ranking_epss":0.63943,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34466","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34466"],"published_time":"2021-07-16T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34481","summary":"<p>A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p>\n<p><strong>UPDATE</strong> August 10, 2021: Microsoft has completed the investigation and has released security updates to address this vulnerability. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. This security update changes the Point and Print default behavior; please see <a href=\"https://support.microsoft.com/help/5005652\">KB5005652</a>.</p>","cvss":8.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.21996,"ranking_epss":0.95789,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34481","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34481"],"published_time":"2021-07-16T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34438","summary":"Windows Font Driver Host Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02904,"ranking_epss":0.86381,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34438","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34438"],"published_time":"2021-07-16T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34439","summary":"Microsoft Windows Media Foundation Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":7.8,"cvss_v4":null,"epss":0.05227,"ranking_epss":0.89972,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34439","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34439"],"published_time":"2021-07-16T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34440","summary":"GDI+ Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00423,"ranking_epss":0.62151,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34440","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34440"],"published_time":"2021-07-16T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34441","summary":"Microsoft Windows Media Foundation Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.03975,"ranking_epss":0.88404,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34441","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34441"],"published_time":"2021-07-16T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34445","summary":"Windows Remote Access Connection Manager Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00284,"ranking_epss":0.51811,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34445","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34445"],"published_time":"2021-07-16T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34446","summary":"Windows HTML Platforms Security Feature Bypass Vulnerability","cvss":8.0,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.0,"cvss_v4":null,"epss":0.029,"ranking_epss":0.86372,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34446","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34446"],"published_time":"2021-07-16T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34447","summary":"Windows MSHTML Platform Remote Code Execution Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":6.8,"cvss_v4":null,"epss":0.05707,"ranking_epss":0.90436,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34447","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34447"],"published_time":"2021-07-16T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34449","summary":"Win32k Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00305,"ranking_epss":0.53804,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34449","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34449"],"published_time":"2021-07-16T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34450","summary":"Windows Hyper-V Remote Code Execution Vulnerability","cvss":8.5,"cvss_version":3.0,"cvss_v2":9.0,"cvss_v3":8.5,"cvss_v4":null,"epss":0.02357,"ranking_epss":0.8494,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34450","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34450"],"published_time":"2021-07-16T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34454","summary":"Windows Remote Access Connection Manager Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00442,"ranking_epss":0.63331,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34454","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34454"],"published_time":"2021-07-16T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34455","summary":"Windows File History Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00169,"ranking_epss":0.3808,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34455","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34455"],"published_time":"2021-07-16T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34456","summary":"Windows Remote Access Connection Manager Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00352,"ranking_epss":0.57656,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34456","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34456"],"published_time":"2021-07-16T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34457","summary":"Windows Remote Access Connection Manager Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00533,"ranking_epss":0.67424,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34457","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34457"],"published_time":"2021-07-16T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34459","summary":"Windows AppContainer Elevation Of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00314,"ranking_epss":0.54563,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34459","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34459"],"published_time":"2021-07-16T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34460","summary":"Storage Spaces Controller Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00326,"ranking_epss":0.55665,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34460","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34460"],"published_time":"2021-07-16T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34461","summary":"Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00326,"ranking_epss":0.55665,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34461","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34461"],"published_time":"2021-07-16T21:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34512","summary":"Storage Spaces Controller Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00996,"ranking_epss":0.76989,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34512","https://www.zerodayinitiative.com/advisories/ZDI-21-820/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34512","https://www.zerodayinitiative.com/advisories/ZDI-21-820/"],"published_time":"2021-07-14T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34513","summary":"Storage Spaces Controller Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01642,"ranking_epss":0.81984,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34513","https://www.zerodayinitiative.com/advisories/ZDI-21-875/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34513","https://www.zerodayinitiative.com/advisories/ZDI-21-875/"],"published_time":"2021-07-14T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34514","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00407,"ranking_epss":0.61174,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34514","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34514"],"published_time":"2021-07-14T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34516","summary":"Win32k Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01939,"ranking_epss":0.83458,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34516","https://www.zerodayinitiative.com/advisories/ZDI-21-1004/","https://www.zerodayinitiative.com/advisories/ZDI-21-1005/","https://www.zerodayinitiative.com/advisories/ZDI-21-1006/","https://www.zerodayinitiative.com/advisories/ZDI-21-1007/","https://www.zerodayinitiative.com/advisories/ZDI-21-1008/","https://www.zerodayinitiative.com/advisories/ZDI-21-1009/","https://www.zerodayinitiative.com/advisories/ZDI-21-1010/","https://www.zerodayinitiative.com/advisories/ZDI-21-1011/","https://www.zerodayinitiative.com/advisories/ZDI-21-1012/","https://www.zerodayinitiative.com/advisories/ZDI-21-1013/","https://www.zerodayinitiative.com/advisories/ZDI-21-1014/","https://www.zerodayinitiative.com/advisories/ZDI-21-1015/","https://www.zerodayinitiative.com/advisories/ZDI-21-1016/","https://www.zerodayinitiative.com/advisories/ZDI-21-1017/","https://www.zerodayinitiative.com/advisories/ZDI-21-1018/","https://www.zerodayinitiative.com/advisories/ZDI-21-1019/","https://www.zerodayinitiative.com/advisories/ZDI-21-1020/","https://www.zerodayinitiative.com/advisories/ZDI-21-1021/","https://www.zerodayinitiative.com/advisories/ZDI-21-1022/","https://www.zerodayinitiative.com/advisories/ZDI-21-895/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34516","https://www.zerodayinitiative.com/advisories/ZDI-21-1004/","https://www.zerodayinitiative.com/advisories/ZDI-21-1005/","https://www.zerodayinitiative.com/advisories/ZDI-21-1006/","https://www.zerodayinitiative.com/advisories/ZDI-21-1007/","https://www.zerodayinitiative.com/advisories/ZDI-21-1008/","https://www.zerodayinitiative.com/advisories/ZDI-21-1009/","https://www.zerodayinitiative.com/advisories/ZDI-21-1010/","https://www.zerodayinitiative.com/advisories/ZDI-21-1011/","https://www.zerodayinitiative.com/advisories/ZDI-21-1012/","https://www.zerodayinitiative.com/advisories/ZDI-21-1013/","https://www.zerodayinitiative.com/advisories/ZDI-21-1014/","https://www.zerodayinitiative.com/advisories/ZDI-21-1015/","https://www.zerodayinitiative.com/advisories/ZDI-21-1016/","https://www.zerodayinitiative.com/advisories/ZDI-21-1017/","https://www.zerodayinitiative.com/advisories/ZDI-21-1018/","https://www.zerodayinitiative.com/advisories/ZDI-21-1019/","https://www.zerodayinitiative.com/advisories/ZDI-21-1020/","https://www.zerodayinitiative.com/advisories/ZDI-21-1021/","https://www.zerodayinitiative.com/advisories/ZDI-21-1022/","https://www.zerodayinitiative.com/advisories/ZDI-21-895/"],"published_time":"2021-07-14T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34521","summary":"Raw Image Extension Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.03079,"ranking_epss":0.86787,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34521","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34521"],"published_time":"2021-07-14T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33788","summary":"Windows LSA Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.09257,"ranking_epss":0.92739,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33788","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33788"],"published_time":"2021-07-14T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34476","summary":"Bowser.sys Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.10808,"ranking_epss":0.93378,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34476","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34476"],"published_time":"2021-07-14T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34488","summary":"Windows Console Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00132,"ranking_epss":0.32807,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34488","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34488"],"published_time":"2021-07-14T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34489","summary":"DirectWrite Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02295,"ranking_epss":0.84744,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34489","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34489"],"published_time":"2021-07-14T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34490","summary":"Windows TCP/IP Driver Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.06839,"ranking_epss":0.91372,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34490","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34490"],"published_time":"2021-07-14T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34491","summary":"Win32k Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.9,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00408,"ranking_epss":0.61244,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34491","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34491"],"published_time":"2021-07-14T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34492","summary":"Windows Certificate Spoofing Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":5.8,"cvss_v3":8.1,"cvss_v4":null,"epss":0.05041,"ranking_epss":0.89774,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34492","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34492"],"published_time":"2021-07-14T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34493","summary":"Windows Partition Management Driver Elevation of Privilege Vulnerability","cvss":6.7,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":6.7,"cvss_v4":null,"epss":0.0018,"ranking_epss":0.39632,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34493","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34493"],"published_time":"2021-07-14T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34496","summary":"Windows GDI Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.02392,"ranking_epss":0.85052,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34496","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34496"],"published_time":"2021-07-14T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34497","summary":"Windows MSHTML Platform Remote Code Execution Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":6.8,"cvss_v4":null,"epss":0.05974,"ranking_epss":0.90678,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34497","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34497"],"published_time":"2021-07-14T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34498","summary":"Windows GDI Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00237,"ranking_epss":0.46808,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34498","https://www.zerodayinitiative.com/advisories/ZDI-21-825/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34498","https://www.zerodayinitiative.com/advisories/ZDI-21-825/"],"published_time":"2021-07-14T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34500","summary":"Windows Kernel Memory Information Disclosure Vulnerability","cvss":6.3,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.3,"cvss_v4":null,"epss":0.03582,"ranking_epss":0.87758,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34500","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34500"],"published_time":"2021-07-14T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34503","summary":"Microsoft Windows Media Foundation Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.03079,"ranking_epss":0.86787,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34503","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34503"],"published_time":"2021-07-14T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34504","summary":"Windows Address Book Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.05258,"ranking_epss":0.90004,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34504","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34504"],"published_time":"2021-07-14T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34507","summary":"Windows Remote Assistance Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.21984,"ranking_epss":0.95787,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34507","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34507"],"published_time":"2021-07-14T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34508","summary":"Windows Kernel Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.08345,"ranking_epss":0.92305,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34508","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34508"],"published_time":"2021-07-14T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34509","summary":"Storage Spaces Controller Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00415,"ranking_epss":0.61712,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34509","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34509"],"published_time":"2021-07-14T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34510","summary":"Storage Spaces Controller Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00405,"ranking_epss":0.61037,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34510","https://www.zerodayinitiative.com/advisories/ZDI-21-975/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34510","https://www.zerodayinitiative.com/advisories/ZDI-21-975/"],"published_time":"2021-07-14T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-34511","summary":"Windows Installer Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00327,"ranking_epss":0.55736,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34511","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34511"],"published_time":"2021-07-14T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33755","summary":"Windows Hyper-V Denial of Service Vulnerability","cvss":6.3,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":6.3,"cvss_v4":null,"epss":0.0248,"ranking_epss":0.85313,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33755","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33755"],"published_time":"2021-07-14T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33756","summary":"Windows DNS Snap-in Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.04563,"ranking_epss":0.89215,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33756","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33756"],"published_time":"2021-07-14T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33757","summary":"Windows Security Account Manager Remote Protocol Security Feature Bypass Vulnerability","cvss":5.3,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":5.3,"cvss_v4":null,"epss":0.05409,"ranking_epss":0.90157,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33757","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33757"],"published_time":"2021-07-14T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33758","summary":"Windows Hyper-V Denial of Service Vulnerability","cvss":7.7,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":7.7,"cvss_v4":null,"epss":0.03271,"ranking_epss":0.87184,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33758","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33758"],"published_time":"2021-07-14T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33759","summary":"Windows Desktop Bridge Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00284,"ranking_epss":0.51811,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33759","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33759"],"published_time":"2021-07-14T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33760","summary":"Media Foundation Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00546,"ranking_epss":0.67871,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33760","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33760"],"published_time":"2021-07-14T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33761","summary":"Windows Remote Access Connection Manager Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00284,"ranking_epss":0.51811,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33761","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33761"],"published_time":"2021-07-14T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33763","summary":"Windows Remote Access Connection Manager Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00362,"ranking_epss":0.58348,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33763","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33763"],"published_time":"2021-07-14T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33765","summary":"Windows Installer Spoofing Vulnerability","cvss":6.2,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":6.2,"cvss_v4":null,"epss":0.00457,"ranking_epss":0.63966,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33765","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33765"],"published_time":"2021-07-14T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33772","summary":"Windows TCP/IP Driver Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.06839,"ranking_epss":0.91372,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33772","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33772"],"published_time":"2021-07-14T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33773","summary":"Windows Remote Access Connection Manager Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00251,"ranking_epss":0.48484,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33773","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33773"],"published_time":"2021-07-14T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33774","summary":"Windows Event Tracing Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.0,"cvss_v4":null,"epss":0.0024,"ranking_epss":0.47103,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33774","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33774"],"published_time":"2021-07-14T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33781","summary":"Azure AD Security Feature Bypass Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":5.5,"cvss_v3":8.1,"cvss_v4":null,"epss":0.02679,"ranking_epss":0.85862,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33781","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33781"],"published_time":"2021-07-14T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33782","summary":"Windows Authenticode Spoofing Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":5.5,"cvss_v4":null,"epss":0.06434,"ranking_epss":0.91084,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33782","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33782"],"published_time":"2021-07-14T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33783","summary":"Windows SMB Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.20381,"ranking_epss":0.95551,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33783","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33783"],"published_time":"2021-07-14T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33784","summary":"Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00284,"ranking_epss":0.51811,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33784","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33784"],"published_time":"2021-07-14T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33785","summary":"Windows AF_UNIX Socket Provider Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.05845,"ranking_epss":0.90562,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33785","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33785"],"published_time":"2021-07-14T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31183","summary":"Windows TCP/IP Driver Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.22628,"ranking_epss":0.9587,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31183","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31183"],"published_time":"2021-07-14T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31961","summary":"Windows InstallService Elevation of Privilege Vulnerability","cvss":6.1,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00323,"ranking_epss":0.55403,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31961","https://www.zerodayinitiative.com/advisories/ZDI-21-818/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31961","https://www.zerodayinitiative.com/advisories/ZDI-21-818/"],"published_time":"2021-07-14T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33740","summary":"Windows Media Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":7.8,"cvss_v4":null,"epss":0.03886,"ranking_epss":0.88265,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33740","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33740"],"published_time":"2021-07-14T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33743","summary":"Windows Projected File System Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0022,"ranking_epss":0.44713,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33743","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33743"],"published_time":"2021-07-14T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33744","summary":"Windows Secure Kernel Mode Security Feature Bypass Vulnerability","cvss":5.3,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00223,"ranking_epss":0.44953,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33744","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33744"],"published_time":"2021-07-14T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33749","summary":"Windows DNS Snap-in Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.12763,"ranking_epss":0.94026,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33749","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33749"],"published_time":"2021-07-14T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33750","summary":"Windows DNS Snap-in Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.05373,"ranking_epss":0.90114,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33750","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33750"],"published_time":"2021-07-14T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33751","summary":"Storage Spaces Controller Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00625,"ranking_epss":0.70227,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33751","https://www.zerodayinitiative.com/advisories/ZDI-21-824/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33751","https://www.zerodayinitiative.com/advisories/ZDI-21-824/"],"published_time":"2021-07-14T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-33752","summary":"Windows DNS Snap-in Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.05373,"ranking_epss":0.90114,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33752","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33752"],"published_time":"2021-07-14T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-17759","summary":"An issue was found in the Evernote client for Windows 10, 7, and 2008 in the protocol handler. This enables attackers for arbitrary command execution if the user clicks on a specially crafted URL. AKA: WINNOTE-19941.","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00439,"ranking_epss":0.63194,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://evernote.com/intl/zh-cn/security/updates/","https://evernote.com/intl/zh-cn/security/updates/"],"published_time":"2021-06-24T20:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12980","summary":"An out of bounds write and read vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00127,"ranking_epss":0.32039,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000","https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"],"published_time":"2021-06-11T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12981","summary":"An insufficient input validation in the AMD Graphics Driver for Windows 10 may allow unprivileged users to unload the driver, potentially causing memory corruptions in high privileged processes, which can lead to escalation of privileges or denial of service.","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0015,"ranking_epss":0.35511,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000","https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"],"published_time":"2021-06-11T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12982","summary":"An invalid object pointer free vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00127,"ranking_epss":0.32039,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000","https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"],"published_time":"2021-06-11T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12983","summary":"An out of bounds write vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privileges or denial of service.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00127,"ranking_epss":0.32039,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000","https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"],"published_time":"2021-06-11T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12985","summary":"An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00127,"ranking_epss":0.32039,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000","https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"],"published_time":"2021-06-11T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12986","summary":"An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may cause arbitrary code execution in the kernel, leading to escalation of privilege or denial of service.","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00239,"ranking_epss":0.47032,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000","https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"],"published_time":"2021-06-11T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-12987","summary":"A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass.","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00091,"ranking_epss":0.25687,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000","https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"],"published_time":"2021-06-11T22:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31968","summary":"Windows Remote Desktop Services Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.27537,"ranking_epss":0.96439,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31968","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31968"],"published_time":"2021-06-08T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31969","summary":"Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00851,"ranking_epss":0.74931,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31969","https://www.zerodayinitiative.com/advisories/ZDI-21-797/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31969","https://www.zerodayinitiative.com/advisories/ZDI-21-797/"],"published_time":"2021-06-08T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31970","summary":"Windows TCP/IP Driver Security Feature Bypass Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00801,"ranking_epss":0.74121,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/163256/Microsoft-Windows-Filtering-Platform-Token-Access-Check-Privilege-Escalation.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31970","http://packetstormsecurity.com/files/163256/Microsoft-Windows-Filtering-Platform-Token-Access-Check-Privilege-Escalation.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31970"],"published_time":"2021-06-08T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31971","summary":"Windows HTML Platforms Security Feature Bypass Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":6.8,"cvss_v4":null,"epss":0.05707,"ranking_epss":0.90436,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31971","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31971"],"published_time":"2021-06-08T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31972","summary":"Event Tracing for Windows Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00424,"ranking_epss":0.62245,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31972","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31972"],"published_time":"2021-06-08T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31973","summary":"Windows GPSVC Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00483,"ranking_epss":0.65226,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31973","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31973"],"published_time":"2021-06-08T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31974","summary":"Server for NFS Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.14302,"ranking_epss":0.94422,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31974","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31974"],"published_time":"2021-06-08T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31975","summary":"Server for NFS Information Disclosure Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.8,"cvss_v3":7.5,"cvss_v4":null,"epss":0.14121,"ranking_epss":0.94383,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31975","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31975"],"published_time":"2021-06-08T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31976","summary":"Server for NFS Information Disclosure Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.8,"cvss_v3":7.5,"cvss_v4":null,"epss":0.17342,"ranking_epss":0.95067,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31976","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31976"],"published_time":"2021-06-08T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31977","summary":"Windows Hyper-V Denial of Service Vulnerability","cvss":8.6,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":8.6,"cvss_v4":null,"epss":0.06076,"ranking_epss":0.90775,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31977","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31977"],"published_time":"2021-06-08T23:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26414","summary":"Windows DCOM Server Security Feature Bypass","cvss":4.8,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":4.8,"cvss_v4":null,"epss":0.0717,"ranking_epss":0.91592,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/163206/Windows-Kerberos-AppContainer-Enterprise-Authentication-Capability-Bypass.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26414","http://packetstormsecurity.com/files/163206/Windows-Kerberos-AppContainer-Enterprise-Authentication-Capability-Bypass.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26414"],"published_time":"2021-06-08T23:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31951","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.007,"ranking_epss":0.72048,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31951","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31951"],"published_time":"2021-06-08T23:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31952","summary":"Windows Kernel-Mode Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.007,"ranking_epss":0.72048,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31952","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31952"],"published_time":"2021-06-08T23:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31953","summary":"Windows Filter Manager Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00483,"ranking_epss":0.65226,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31953","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31953"],"published_time":"2021-06-08T23:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31954","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01255,"ranking_epss":0.79394,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31954","https://www.zerodayinitiative.com/advisories/ZDI-21-668/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31954","https://www.zerodayinitiative.com/advisories/ZDI-21-668/"],"published_time":"2021-06-08T23:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31958","summary":"Windows NTLM Elevation of Privilege Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02123,"ranking_epss":0.84173,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31958","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31958"],"published_time":"2021-06-08T23:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31959","summary":"Scripting Engine Memory Corruption Vulnerability","cvss":6.4,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":6.4,"cvss_v4":null,"epss":0.044,"ranking_epss":0.89019,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/163056/Internet-Explorer-jscript9.dll-Memory-Corruption.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31959","http://packetstormsecurity.com/files/163056/Internet-Explorer-jscript9.dll-Memory-Corruption.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31959"],"published_time":"2021-06-08T23:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31960","summary":"Windows Bind Filter Driver Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00402,"ranking_epss":0.60857,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31960","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31960"],"published_time":"2021-06-08T23:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31962","summary":"Kerberos AppContainer Security Feature Bypass Vulnerability","cvss":9.4,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":9.4,"cvss_v4":null,"epss":0.17791,"ranking_epss":0.95138,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/163206/Windows-Kerberos-AppContainer-Enterprise-Authentication-Capability-Bypass.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31962","http://packetstormsecurity.com/files/163206/Windows-Kerberos-AppContainer-Enterprise-Authentication-Capability-Bypass.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31962"],"published_time":"2021-06-08T23:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-21552","summary":"Dell Wyse Windows Embedded System versions WIE10 LTSC 2019 and earlier contain an improper authorization vulnerability. A local authenticated malicious user with low privileges may potentially exploit this vulnerability to bypass the restricted environment and perform unauthorized actions on the affected system.","cvss":5.2,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":5.2,"cvss_v4":null,"epss":0.00139,"ranking_epss":0.3409,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.dell.com/support/kbdoc/en-us/000186134/dsa-2021-096-dell-wyse-windows-embedded-system-security-update-for-an-improper-authorization-vulnerability","https://www.dell.com/support/kbdoc/en-us/000186134/dsa-2021-096-dell-wyse-windows-embedded-system-security-update-for-an-improper-authorization-vulnerability"],"published_time":"2021-05-21T20:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2020-24588","summary":"The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.","cvss":3.5,"cvss_version":3.0,"cvss_v2":2.9,"cvss_v3":3.5,"cvss_v4":null,"epss":0.00311,"ranking_epss":0.5438,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2021/05/11/12","https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf","https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md","https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html","https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html","https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html","https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu","https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63","https://www.fragattacks.com","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html","http://www.openwall.com/lists/oss-security/2021/05/11/12","https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf","https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md","https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html","https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html","https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html","https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu","https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63","https://www.fragattacks.com","https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html","https://cert-portal.siemens.com/productcert/html/ssa-019200.html","https://cert-portal.siemens.com/productcert/html/ssa-913875.html"],"published_time":"2021-05-11T20:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31187","summary":"Windows WalletService Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01494,"ranking_epss":0.81109,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31187","https://www.zerodayinitiative.com/advisories/ZDI-21-571/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31187","https://www.zerodayinitiative.com/advisories/ZDI-21-571/"],"published_time":"2021-05-11T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31188","summary":"Windows Graphics Component Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01143,"ranking_epss":0.78465,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31188","https://www.zerodayinitiative.com/advisories/ZDI-21-577/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31188","https://www.zerodayinitiative.com/advisories/ZDI-21-577/"],"published_time":"2021-05-11T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31190","summary":"Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00513,"ranking_epss":0.66591,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31190","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31190"],"published_time":"2021-05-11T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31191","summary":"Windows Projected File System FS Filter Driver Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00402,"ranking_epss":0.60857,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31191","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31191"],"published_time":"2021-05-11T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31192","summary":"Windows Media Foundation Core Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.13353,"ranking_epss":0.94201,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31192","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31192"],"published_time":"2021-05-11T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31193","summary":"Windows SSDP Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00282,"ranking_epss":0.51671,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31193","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31193"],"published_time":"2021-05-11T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31194","summary":"OLE Automation Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.10448,"ranking_epss":0.9325,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31194","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31194"],"published_time":"2021-05-11T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31205","summary":"Windows SMB Client Security Feature Bypass Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.15222,"ranking_epss":0.94624,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31205","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31205"],"published_time":"2021-05-11T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31208","summary":"Windows Container Manager Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00513,"ranking_epss":0.66591,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31208","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31208"],"published_time":"2021-05-11T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28476","summary":"Windows Hyper-V Remote Code Execution Vulnerability","cvss":9.9,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":9.9,"cvss_v4":null,"epss":0.63905,"ranking_epss":0.98433,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/163497/Microsoft-Hyper-V-vmswitch.sys-Proof-Of-Concept.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28476","http://packetstormsecurity.com/files/163497/Microsoft-Hyper-V-vmswitch.sys-Proof-Of-Concept.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28476"],"published_time":"2021-05-11T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28479","summary":"Windows CSC Service Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00248,"ranking_epss":0.48083,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28479","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28479"],"published_time":"2021-05-11T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31165","summary":"Windows Container Manager Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0033,"ranking_epss":0.56003,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/162555/Windows-Container-Manager-Service-CmsRpcSrv_CreateContainer-Privilege-Escalation.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31165","http://packetstormsecurity.com/files/162555/Windows-Container-Manager-Service-CmsRpcSrv_CreateContainer-Privilege-Escalation.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31165"],"published_time":"2021-05-11T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31167","summary":"Windows Container Manager Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0033,"ranking_epss":0.56003,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/162559/Windows-Container-Manager-Service-CmsRpcSrv_MapNamedPipeToContainer-Privilege-Escalation.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31167","http://packetstormsecurity.com/files/162559/Windows-Container-Manager-Service-CmsRpcSrv_MapNamedPipeToContainer-Privilege-Escalation.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31167"],"published_time":"2021-05-11T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31168","summary":"Windows Container Manager Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0033,"ranking_epss":0.56003,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/162556/Windows-Container-Manager-Service-CmsRpcSrv_MapVirtualDiskToContainer-Privilege-Escalation.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31168","http://packetstormsecurity.com/files/162556/Windows-Container-Manager-Service-CmsRpcSrv_MapVirtualDiskToContainer-Privilege-Escalation.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31168"],"published_time":"2021-05-11T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31169","summary":"Windows Container Manager Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0033,"ranking_epss":0.56003,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/162557/Windows-Container-Manager-Service-Arbitrary-Object-Directory-Creation-Privilege-Escalation.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31169","http://packetstormsecurity.com/files/162557/Windows-Container-Manager-Service-Arbitrary-Object-Directory-Creation-Privilege-Escalation.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31169"],"published_time":"2021-05-11T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31170","summary":"Windows Graphics Component Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00387,"ranking_epss":0.59869,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31170","https://www.zerodayinitiative.com/advisories/ZDI-21-578/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31170","https://www.zerodayinitiative.com/advisories/ZDI-21-578/"],"published_time":"2021-05-11T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31182","summary":"Microsoft Bluetooth Driver Spoofing Vulnerability","cvss":7.1,"cvss_version":3.0,"cvss_v2":4.8,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00464,"ranking_epss":0.64352,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31182","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31182"],"published_time":"2021-05-11T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31184","summary":"Microsoft Windows Infrared Data Association (IrDA) Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.02392,"ranking_epss":0.85052,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31184","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31184"],"published_time":"2021-05-11T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31185","summary":"Windows Desktop Bridge Denial of Service Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00135,"ranking_epss":0.33193,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31185","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31185"],"published_time":"2021-05-11T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-31186","summary":"Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability","cvss":7.4,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":7.4,"cvss_v4":null,"epss":0.06805,"ranking_epss":0.9135,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31186","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31186"],"published_time":"2021-05-11T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26419","summary":"Scripting Engine Memory Corruption Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":7.6,"cvss_v3":7.5,"cvss_v4":null,"epss":0.34148,"ranking_epss":0.96987,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/162570/Internet-Explorer-jscript9.dll-Memory-Corruption.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26419","http://packetstormsecurity.com/files/162570/Internet-Explorer-jscript9.dll-Memory-Corruption.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26419"],"published_time":"2021-05-11T19:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28455","summary":"Microsoft Jet Red Database Engine and Access Connectivity Engine Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.10557,"ranking_epss":0.93292,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28455","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28455"],"published_time":"2021-05-11T19:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28357","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.14173,"ranking_epss":0.94398,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28357","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28357"],"published_time":"2021-04-13T20:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28358","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.17338,"ranking_epss":0.95065,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28358","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28358"],"published_time":"2021-04-13T20:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28434","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.14173,"ranking_epss":0.94398,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28434","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28434"],"published_time":"2021-04-13T20:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28435","summary":"Windows Event Tracing Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00541,"ranking_epss":0.67702,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28435","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28435"],"published_time":"2021-04-13T20:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28436","summary":"Windows Speech Runtime Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00513,"ranking_epss":0.66591,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28436","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28436"],"published_time":"2021-04-13T20:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28437","summary":"Windows Installer Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00426,"ranking_epss":0.623,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28437","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28437"],"published_time":"2021-04-13T20:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28438","summary":"Windows Console Driver Denial of Service Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00853,"ranking_epss":0.74964,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28438","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28438"],"published_time":"2021-04-13T20:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28439","summary":"Windows TCP/IP Driver Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.20904,"ranking_epss":0.95637,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28439","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28439"],"published_time":"2021-04-13T20:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28440","summary":"Windows Installer Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00467,"ranking_epss":0.64469,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28440","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28440"],"published_time":"2021-04-13T20:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28441","summary":"Windows Hyper-V Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00446,"ranking_epss":0.63519,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28441","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28441"],"published_time":"2021-04-13T20:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28442","summary":"Windows TCP/IP Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.13694,"ranking_epss":0.9428,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28442","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28442"],"published_time":"2021-04-13T20:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28443","summary":"Windows Console Driver Denial of Service Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00256,"ranking_epss":0.49071,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28443","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28443"],"published_time":"2021-04-13T20:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28444","summary":"Windows Hyper-V Security Feature Bypass Vulnerability","cvss":5.7,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":5.7,"cvss_v4":null,"epss":0.09651,"ranking_epss":0.92912,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28444","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28444"],"published_time":"2021-04-13T20:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28445","summary":"Windows Network File System Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.1,"cvss_v4":null,"epss":0.20109,"ranking_epss":0.955,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28445","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28445"],"published_time":"2021-04-13T20:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28446","summary":"Windows Portmapping Information Disclosure Vulnerability","cvss":7.1,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00982,"ranking_epss":0.76828,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28446","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28446"],"published_time":"2021-04-13T20:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28447","summary":"Windows Early Launch Antimalware Driver Security Feature Bypass Vulnerability","cvss":4.4,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00348,"ranking_epss":0.57393,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bi-zone.medium.com/measured-boot-and-malware-signatures-exploring-two-vulnerabilities-found-in-the-windows-loader-5a4fcc3c4b66","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28447","https://bi-zone.medium.com/measured-boot-and-malware-signatures-exploring-two-vulnerabilities-found-in-the-windows-loader-5a4fcc3c4b66","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28447"],"published_time":"2021-04-13T20:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28339","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.14173,"ranking_epss":0.94398,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28339","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28339"],"published_time":"2021-04-13T20:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28340","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.11182,"ranking_epss":0.93518,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28340","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28340"],"published_time":"2021-04-13T20:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28341","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.17338,"ranking_epss":0.95065,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28341","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28341"],"published_time":"2021-04-13T20:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28342","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.14173,"ranking_epss":0.94398,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28342","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28342"],"published_time":"2021-04-13T20:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28343","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.14173,"ranking_epss":0.94398,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28343","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28343"],"published_time":"2021-04-13T20:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28344","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.11182,"ranking_epss":0.93518,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28344","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28344"],"published_time":"2021-04-13T20:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28345","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.14173,"ranking_epss":0.94398,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28345","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28345"],"published_time":"2021-04-13T20:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28346","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.17338,"ranking_epss":0.95065,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28346","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28346"],"published_time":"2021-04-13T20:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28347","summary":"Windows Speech Runtime Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00681,"ranking_epss":0.7164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28347","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28347"],"published_time":"2021-04-13T20:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28348","summary":"Windows GDI+ Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00541,"ranking_epss":0.67715,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28348","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28348"],"published_time":"2021-04-13T20:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28349","summary":"Windows GDI+ Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00355,"ranking_epss":0.57885,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28349","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28349"],"published_time":"2021-04-13T20:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28350","summary":"Windows GDI+ Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00351,"ranking_epss":0.5762,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28350","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28350"],"published_time":"2021-04-13T20:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28351","summary":"Windows Speech Runtime Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00681,"ranking_epss":0.7164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28351","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28351"],"published_time":"2021-04-13T20:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28352","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.17338,"ranking_epss":0.95065,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28352","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28352"],"published_time":"2021-04-13T20:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28353","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.14173,"ranking_epss":0.94398,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28353","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28353"],"published_time":"2021-04-13T20:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28354","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.14173,"ranking_epss":0.94398,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28354","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28354"],"published_time":"2021-04-13T20:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28355","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.14173,"ranking_epss":0.94398,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28355","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28355"],"published_time":"2021-04-13T20:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28356","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.11182,"ranking_epss":0.93518,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28356","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28356"],"published_time":"2021-04-13T20:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28322","summary":"Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00674,"ranking_epss":0.71445,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/162251/Microsoft-DiagHub-Privilege-Escalation.html","http://seclists.org/fulldisclosure/2021/Apr/40","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28322","http://packetstormsecurity.com/files/162251/Microsoft-DiagHub-Privilege-Escalation.html","http://seclists.org/fulldisclosure/2021/Apr/40","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28322"],"published_time":"2021-04-13T20:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28323","summary":"Windows DNS Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.16564,"ranking_epss":0.94926,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/162251/Microsoft-DiagHub-Privilege-Escalation.html","http://seclists.org/fulldisclosure/2021/Apr/40","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28323","http://packetstormsecurity.com/files/162251/Microsoft-DiagHub-Privilege-Escalation.html","http://seclists.org/fulldisclosure/2021/Apr/40","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28323"],"published_time":"2021-04-13T20:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28324","summary":"Windows SMB Information Disclosure Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.18987,"ranking_epss":0.95331,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28324","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28324"],"published_time":"2021-04-13T20:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28325","summary":"Windows SMB Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.21136,"ranking_epss":0.95671,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28325","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28325"],"published_time":"2021-04-13T20:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28326","summary":"Windows AppX Deployment Server Denial of Service Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":5.5,"cvss_v4":null,"epss":0.0106,"ranking_epss":0.77675,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28326","https://www.zerodayinitiative.com/advisories/ZDI-21-424/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28326","https://www.zerodayinitiative.com/advisories/ZDI-21-424/"],"published_time":"2021-04-13T20:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28327","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.11182,"ranking_epss":0.93518,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28327","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28327"],"published_time":"2021-04-13T20:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28328","summary":"Windows DNS Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.0,"cvss_v3":6.5,"cvss_v4":null,"epss":0.16598,"ranking_epss":0.94934,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28328","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28328"],"published_time":"2021-04-13T20:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28329","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.14173,"ranking_epss":0.94398,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28329","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28329"],"published_time":"2021-04-13T20:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28330","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.14173,"ranking_epss":0.94398,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28330","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28330"],"published_time":"2021-04-13T20:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28331","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.14173,"ranking_epss":0.94398,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28331","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28331"],"published_time":"2021-04-13T20:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28332","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.17338,"ranking_epss":0.95065,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28332","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28332"],"published_time":"2021-04-13T20:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28333","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.11182,"ranking_epss":0.93518,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28333","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28333"],"published_time":"2021-04-13T20:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28334","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.17338,"ranking_epss":0.95065,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28334","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28334"],"published_time":"2021-04-13T20:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28335","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.17338,"ranking_epss":0.95065,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28335","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28335"],"published_time":"2021-04-13T20:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28336","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.14173,"ranking_epss":0.94398,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28336","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28336"],"published_time":"2021-04-13T20:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28337","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.14173,"ranking_epss":0.94398,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28337","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28337"],"published_time":"2021-04-13T20:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28338","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":8.8,"cvss_v4":null,"epss":0.14173,"ranking_epss":0.94398,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28338","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28338"],"published_time":"2021-04-13T20:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-27094","summary":"Windows Early Launch Antimalware Driver Security Feature Bypass Vulnerability","cvss":4.4,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00407,"ranking_epss":0.61194,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bi-zone.medium.com/measured-boot-and-malware-signatures-exploring-two-vulnerabilities-found-in-the-windows-loader-5a4fcc3c4b66","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27094","https://bi-zone.medium.com/measured-boot-and-malware-signatures-exploring-two-vulnerabilities-found-in-the-windows-loader-5a4fcc3c4b66","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27094"],"published_time":"2021-04-13T20:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-27095","summary":"Windows Media Video Decoder Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.06508,"ranking_epss":0.91131,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27095","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27095"],"published_time":"2021-04-13T20:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-27096","summary":"NTFS Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00262,"ranking_epss":0.49569,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27096","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27096"],"published_time":"2021-04-13T20:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28309","summary":"Windows Kernel Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00426,"ranking_epss":0.623,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28309","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28309"],"published_time":"2021-04-13T20:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28311","summary":"Windows Application Compatibility Cache Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":6.5,"cvss_v4":null,"epss":0.07965,"ranking_epss":0.92082,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28311","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28311"],"published_time":"2021-04-13T20:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28312","summary":"Windows NTFS Denial of Service Vulnerability","cvss":3.3,"cvss_version":3.0,"cvss_v2":4.3,"cvss_v3":3.3,"cvss_v4":null,"epss":0.08276,"ranking_epss":0.92254,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28312","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28312"],"published_time":"2021-04-13T20:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28313","summary":"Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00508,"ranking_epss":0.66344,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/162251/Microsoft-DiagHub-Privilege-Escalation.html","http://seclists.org/fulldisclosure/2021/Apr/40","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28313","http://packetstormsecurity.com/files/162251/Microsoft-DiagHub-Privilege-Escalation.html","http://seclists.org/fulldisclosure/2021/Apr/40","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28313"],"published_time":"2021-04-13T20:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28314","summary":"Windows Hyper-V Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00379,"ranking_epss":0.59447,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28314","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28314"],"published_time":"2021-04-13T20:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28315","summary":"Windows Media Video Decoder Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01109,"ranking_epss":0.78164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28315","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28315"],"published_time":"2021-04-13T20:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28316","summary":"Windows WLAN AutoConfig Service Security Feature Bypass Vulnerability","cvss":4.2,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":4.2,"cvss_v4":null,"epss":0.0026,"ranking_epss":0.49391,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28316","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28316"],"published_time":"2021-04-13T20:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28317","summary":"Microsoft Windows Codecs Library Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00603,"ranking_epss":0.69591,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28317","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28317"],"published_time":"2021-04-13T20:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28318","summary":"Windows GDI+ Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00538,"ranking_epss":0.67606,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28318","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28318"],"published_time":"2021-04-13T20:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28319","summary":"Windows TCP/IP Driver Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.20423,"ranking_epss":0.95558,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28319","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28319"],"published_time":"2021-04-13T20:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28320","summary":"Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00681,"ranking_epss":0.7164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28320","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28320"],"published_time":"2021-04-13T20:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-28321","summary":"Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01085,"ranking_epss":0.77927,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/162251/Microsoft-DiagHub-Privilege-Escalation.html","http://seclists.org/fulldisclosure/2021/Apr/40","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28321","http://packetstormsecurity.com/files/162251/Microsoft-DiagHub-Privilege-Escalation.html","http://seclists.org/fulldisclosure/2021/Apr/40","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28321"],"published_time":"2021-04-13T20:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26413","summary":"Windows Installer Spoofing Vulnerability","cvss":6.2,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":6.2,"cvss_v4":null,"epss":0.00619,"ranking_epss":0.70066,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26413","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26413"],"published_time":"2021-04-13T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26415","summary":"Windows Installer Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.11468,"ranking_epss":0.9363,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26415","https://www.zerodayinitiative.com/advisories/ZDI-21-409/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26415","https://www.zerodayinitiative.com/advisories/ZDI-21-409/"],"published_time":"2021-04-13T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26416","summary":"Windows Hyper-V Denial of Service Vulnerability","cvss":7.7,"cvss_version":3.0,"cvss_v2":7.8,"cvss_v3":7.7,"cvss_v4":null,"epss":0.02179,"ranking_epss":0.84366,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26416","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26416"],"published_time":"2021-04-13T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26417","summary":"Windows Overlay Filter Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00487,"ranking_epss":0.65473,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26417","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26417"],"published_time":"2021-04-13T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-27072","summary":"Win32k Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00354,"ranking_epss":0.57814,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27072","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27072"],"published_time":"2021-04-13T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-27079","summary":"Windows Media Photo Codec Information Disclosure Vulnerability","cvss":5.7,"cvss_version":3.0,"cvss_v2":6.3,"cvss_v3":5.7,"cvss_v4":null,"epss":0.20935,"ranking_epss":0.95647,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27079","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27079"],"published_time":"2021-04-13T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-27086","summary":"Windows Services and Controller App Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00279,"ranking_epss":0.51364,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/162157/Microsoft-Windows-SCM-Remote-Access-Check-Limit-Bypass-Privilege-Escalation.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27086","http://packetstormsecurity.com/files/162157/Microsoft-Windows-SCM-Remote-Access-Check-Limit-Bypass-Privilege-Escalation.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27086"],"published_time":"2021-04-13T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-27088","summary":"Windows Event Tracing Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00216,"ranking_epss":0.44134,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27088","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27088"],"published_time":"2021-04-13T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-27089","summary":"Microsoft Internet Messaging API Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.03937,"ranking_epss":0.88349,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27089","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27089"],"published_time":"2021-04-13T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-27090","summary":"Windows Secure Kernel Mode Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01999,"ranking_epss":0.83686,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27090","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27090"],"published_time":"2021-04-13T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-27092","summary":"Azure AD Web Sign-in Security Feature Bypass Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":7.5,"cvss_v3":6.8,"cvss_v4":null,"epss":0.09917,"ranking_epss":0.93026,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27092","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27092"],"published_time":"2021-04-13T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-27093","summary":"Windows Kernel Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00596,"ranking_epss":0.69401,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27093","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27093"],"published_time":"2021-04-13T20:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-27077","summary":"Windows Win32k Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02947,"ranking_epss":0.8647,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27077","https://www.zerodayinitiative.com/advisories/ZDI-21-287/","https://www.zerodayinitiative.com/advisories/ZDI-21-403/","https://www.zerodayinitiative.com/advisories/ZDI-21-482/","https://www.zerodayinitiative.com/advisories/ZDI-21-494/","https://www.zerodayinitiative.com/advisories/ZDI-21-495/","https://www.zerodayinitiative.com/advisories/ZDI-21-496/","https://www.zerodayinitiative.com/advisories/ZDI-21-497/","https://www.zerodayinitiative.com/advisories/ZDI-21-498/","https://www.zerodayinitiative.com/advisories/ZDI-21-499/","https://www.zerodayinitiative.com/advisories/ZDI-21-500/","https://www.zerodayinitiative.com/advisories/ZDI-21-501/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27077","https://www.zerodayinitiative.com/advisories/ZDI-21-287/","https://www.zerodayinitiative.com/advisories/ZDI-21-403/","https://www.zerodayinitiative.com/advisories/ZDI-21-482/","https://www.zerodayinitiative.com/advisories/ZDI-21-494/","https://www.zerodayinitiative.com/advisories/ZDI-21-495/","https://www.zerodayinitiative.com/advisories/ZDI-21-496/","https://www.zerodayinitiative.com/advisories/ZDI-21-497/","https://www.zerodayinitiative.com/advisories/ZDI-21-498/","https://www.zerodayinitiative.com/advisories/ZDI-21-499/","https://www.zerodayinitiative.com/advisories/ZDI-21-500/","https://www.zerodayinitiative.com/advisories/ZDI-21-501/"],"published_time":"2021-03-11T16:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-27070","summary":"Windows 10 Update Assistant Elevation of Privilege Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":7.3,"cvss_v4":null,"epss":0.05004,"ranking_epss":0.89729,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27070","https://www.zerodayinitiative.com/advisories/ZDI-21-329/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27070","https://www.zerodayinitiative.com/advisories/ZDI-21-329/"],"published_time":"2021-03-11T16:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26891","summary":"Windows Container Execution Agent Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00378,"ranking_epss":0.59404,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26891","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26891"],"published_time":"2021-03-11T16:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26892","summary":"Windows Extensible Firmware Interface Security Feature Bypass Vulnerability","cvss":6.2,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":6.2,"cvss_v4":null,"epss":0.00748,"ranking_epss":0.7315,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26892","https://www.zerodayinitiative.com/advisories/ZDI-21-330/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26892","https://www.zerodayinitiative.com/advisories/ZDI-21-330/"],"published_time":"2021-03-11T16:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26898","summary":"Windows Event Tracing Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0051,"ranking_epss":0.66447,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26898","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26898"],"published_time":"2021-03-11T16:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26899","summary":"Windows UPnP Device Host Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00441,"ranking_epss":0.63255,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26899","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26899"],"published_time":"2021-03-11T16:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26900","summary":"Windows Win32k Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.05334,"ranking_epss":0.9007,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26900","https://www.zerodayinitiative.com/advisories/ZDI-21-331/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26900","https://www.zerodayinitiative.com/advisories/ZDI-21-331/"],"published_time":"2021-03-11T16:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26901","summary":"Windows Event Tracing Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0051,"ranking_epss":0.66447,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26901","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26901"],"published_time":"2021-03-11T16:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26875","summary":"Windows Win32k Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00355,"ranking_epss":0.57885,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26875","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26875"],"published_time":"2021-03-11T16:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26876","summary":"OpenType Font Parsing Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":8.8,"cvss_v4":null,"epss":0.1543,"ranking_epss":0.94663,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26876","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26876"],"published_time":"2021-03-11T16:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26878","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00355,"ranking_epss":0.57885,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26878","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26878"],"published_time":"2021-03-11T16:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26879","summary":"Windows Network Address Translation (NAT) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.23956,"ranking_epss":0.96043,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26879","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26879"],"published_time":"2021-03-11T16:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26880","summary":"Storage Spaces Controller Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00513,"ranking_epss":0.66591,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26880","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26880"],"published_time":"2021-03-11T16:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26881","summary":"Microsoft Windows Media Foundation Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":6.5,"cvss_v3":7.5,"cvss_v4":null,"epss":0.08498,"ranking_epss":0.92381,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26881","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26881"],"published_time":"2021-03-11T16:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26882","summary":"Remote Access API Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.04221,"ranking_epss":0.88776,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26882","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26882"],"published_time":"2021-03-11T16:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26884","summary":"Windows Media Photo Codec Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00446,"ranking_epss":0.63519,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26884","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26884"],"published_time":"2021-03-11T16:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26885","summary":"Windows WalletService Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.24544,"ranking_epss":0.96136,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26885","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26885"],"published_time":"2021-03-11T16:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26886","summary":"User Profile Service Denial of Service Vulnerability","cvss":6.1,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00206,"ranking_epss":0.43047,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26886","https://www.zerodayinitiative.com/advisories/ZDI-21-327/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26886","https://www.zerodayinitiative.com/advisories/ZDI-21-327/"],"published_time":"2021-03-11T16:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26887","summary":"<p>An elevation of privilege vulnerability exists in Microsoft Windows when Folder redirection has been enabled via Group Policy. When folder redirection file server is co-located with Terminal server, an attacker who successfully exploited the vulnerability would be able to begin redirecting another user's personal data to a created folder.</p>\n<p>To exploit the vulnerability, an attacker can create a new folder under the Folder Redirection root path and create a junction on a newly created User folder. When the new user logs in, Folder Redirection would start redirecting to the folder and copying personal data.</p>\n<p>This elevation of privilege vulnerability can only be addressed by reconfiguring Folder Redirection with Offline files and restricting permissions, and NOT via a security update for affected Windows Servers. See the <strong>FAQ</strong> section of this CVE for configuration guidance.</p>","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00459,"ranking_epss":0.64137,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26887","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26887"],"published_time":"2021-03-11T16:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26889","summary":"Windows Update Stack Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00679,"ranking_epss":0.71593,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26889","https://www.zerodayinitiative.com/advisories/ZDI-21-328/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26889","https://www.zerodayinitiative.com/advisories/ZDI-21-328/"],"published_time":"2021-03-11T16:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26890","summary":"Application Virtualization Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00738,"ranking_epss":0.72901,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26890","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26890"],"published_time":"2021-03-11T16:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26860","summary":"Windows App-V Overlay Filter Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.003,"ranking_epss":0.53422,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26860","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26860"],"published_time":"2021-03-11T16:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26861","summary":"Windows Graphics Component Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":6.8,"cvss_v3":7.8,"cvss_v4":null,"epss":0.12481,"ranking_epss":0.93943,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26861","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26861"],"published_time":"2021-03-11T16:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26862","summary":"Windows Installer Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00456,"ranking_epss":0.63928,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26862","https://www.zerodayinitiative.com/advisories/ZDI-21-285/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26862","https://www.zerodayinitiative.com/advisories/ZDI-21-285/"],"published_time":"2021-03-11T16:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26863","summary":"Windows Win32k Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00236,"ranking_epss":0.46565,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://packetstormsecurity.com/files/161768/Microsoft-Windows-Kernel-NtGdiGetDeviceCapsAll-Race-Condition-Use-After-Free.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26863","http://packetstormsecurity.com/files/161768/Microsoft-Windows-Kernel-NtGdiGetDeviceCapsAll-Race-Condition-Use-After-Free.html","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26863"],"published_time":"2021-03-11T16:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26864","summary":"Windows Virtual Registry Provider Elevation of Privilege Vulnerability","cvss":8.4,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":8.4,"cvss_v4":null,"epss":0.00598,"ranking_epss":0.69447,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26864","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26864"],"published_time":"2021-03-11T16:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26865","summary":"Windows Container Execution Agent Elevation of Privilege Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02206,"ranking_epss":0.84466,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26865","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26865"],"published_time":"2021-03-11T16:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26866","summary":"Windows Update Service Elevation of Privilege Vulnerability","cvss":7.1,"cvss_version":3.0,"cvss_v2":3.6,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00639,"ranking_epss":0.7058,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26866","https://www.zerodayinitiative.com/advisories/ZDI-21-286/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26866","https://www.zerodayinitiative.com/advisories/ZDI-21-286/"],"published_time":"2021-03-11T16:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26867","summary":"Windows Hyper-V Remote Code Execution Vulnerability","cvss":9.9,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":9.9,"cvss_v4":null,"epss":0.01182,"ranking_epss":0.78791,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26867","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26867"],"published_time":"2021-03-11T16:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26868","summary":"Windows Graphics Component Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.04946,"ranking_epss":0.89663,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26868","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26868"],"published_time":"2021-03-11T16:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26869","summary":"Windows ActiveX Installer Service Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00426,"ranking_epss":0.623,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26869","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26869"],"published_time":"2021-03-11T16:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26870","summary":"Windows Projected File System Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00513,"ranking_epss":0.66591,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26870","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26870"],"published_time":"2021-03-11T16:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26871","summary":"Windows WalletService Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01927,"ranking_epss":0.83411,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26871","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26871"],"published_time":"2021-03-11T16:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26872","summary":"Windows Event Tracing Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00483,"ranking_epss":0.65226,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26872","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26872"],"published_time":"2021-03-11T16:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26873","summary":"Windows User Profile Service Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00267,"ranking_epss":0.50248,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26873","https://www.zerodayinitiative.com/advisories/ZDI-21-283/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26873","https://www.zerodayinitiative.com/advisories/ZDI-21-283/"],"published_time":"2021-03-11T16:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-26874","summary":"Windows Overlay Filter Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00387,"ranking_epss":0.59906,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26874","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26874"],"published_time":"2021-03-11T16:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-1640","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00752,"ranking_epss":0.73227,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1640","https://www.zerodayinitiative.com/advisories/ZDI-21-493/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1640","https://www.zerodayinitiative.com/advisories/ZDI-21-493/"],"published_time":"2021-03-11T16:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-1729","summary":"Windows Update Stack Setup Elevation of Privilege Vulnerability","cvss":7.1,"cvss_version":3.0,"cvss_v2":7.2,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00184,"ranking_epss":0.40112,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1729","https://www.zerodayinitiative.com/advisories/ZDI-21-284/","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1729","https://www.zerodayinitiative.com/advisories/ZDI-21-284/"],"published_time":"2021-03-11T16:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-24090","summary":"Windows Error Reporting Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":9.3,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01457,"ranking_epss":0.8086,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24090","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24090"],"published_time":"2021-03-11T16:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-24095","summary":"DirectX Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.0,"cvss_v4":null,"epss":0.0015,"ranking_epss":0.35557,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24095","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24095"],"published_time":"2021-03-11T16:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-24107","summary":"Windows Event Tracing Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.0038,"ranking_epss":0.59509,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24107","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24107"],"published_time":"2021-03-11T16:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-24102","summary":"Windows Event Tracing Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00355,"ranking_epss":0.57876,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24102","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24102"],"published_time":"2021-02-25T23:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-24103","summary":"Windows Event Tracing Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00399,"ranking_epss":0.60678,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24103","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24103"],"published_time":"2021-02-25T23:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-24106","summary":"Windows DirectX Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":2.1,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00284,"ranking_epss":0.51856,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24106","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24106"],"published_time":"2021-02-25T23:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-24111","summary":".NET Framework Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":7.5,"cvss_v4":null,"epss":0.24574,"ranking_epss":0.96139,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24111","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24111"],"published_time":"2021-02-25T23:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2021-25195","summary":"Windows PKU2U Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":4.6,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00193,"ranking_epss":0.41278,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-25195","https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-25195"],"published_time":"2021-02-25T23:15:16","vendor":null,"product":null,"version":null}]}