Analyst command view

MSRC Driver CVE Board

Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.

Live snapshot
Last Sync
2026-05-20T07:39:30Z
Freshness
1 day(s) ago
Refresh Policy
24h baseline + release watch
Storage
Latest snapshot only
Rows In View
269
Current result set after filter and search.
Exploited Flagged
234
Rows with a non-empty exploitation signal.
Distinct CWE
13
Unique weakness classes in this view.
Modules
128
Unique inferred driver or component labels.
Reset
Active filters CWE CWE-125: Out-of-bounds Read Clear filters
Release Month
December 2023
3 CVE | last update 1 day(s) ago
Release 2023-12-12 Patch Tuesday Count 3
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-35635
Windows Kernel
Exploitation Less Likely
Windows Kernel Denial of Service Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2023-12-12 No
CVE-2023-36696
Windows Cloud Files Mini Filter Driver
Exploitation More Likely
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-12-12 No
Reported By
CVE-2023-35629
Microsoft USBHUB 3.0 Device Driver
Exploitation Less Likely
Microsoft USBHUB 3.0 Device Driver Remote Code Execution Vulnerability
CVSS vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-12-12 No
Reported By
Wei in Kunlun Lab with Cyber KunLun
Release Month
November 2023
2 CVE | last update 1 day(s) ago
Release 2023-11-14 Patch Tuesday Count 2
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-36424
Windows Common Log File System Driver
Exploitation More Likely
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-11-14 No
Reported By
CVE-2023-36428
Microsoft Local Security Authority Subsystem Service
Exploitation Less Likely
Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2023-11-14 No
Reported By
Anonymous
Release Month
October 2023
1 CVE | last update 1 day(s) ago
Release 2023-10-10 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-36701
Microsoft Resilient File System (ReFS)
Exploitation Less Likely
Microsoft Resilient File System (ReFS) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-10-10 No
Reported By
Sam Pope with MSRC Vulnerabilities & Mitigations and Benjamin Rodes with Microsoft CodeQL
Release Month
August 2023
2 CVE | last update 1 day(s) ago
Release 2023-08-08 Patch Tuesday Count 2
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-36905
Windows Wireless Wide Area Network Service (WwanSvc)
Exploitation Less Likely
Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2023-08-08 No
Reported By
g0st1
CVE-2023-35386
Windows Kernel
Exploitation More Likely
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-08-08 No
Reported By
Mateusz Jurczyk of Google Project Zero
Release Month
July 2023
14 CVE | last update 1 day(s) ago
Release 2023-07-11 Patch Tuesday Count 14
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-35358
Windows Kernel
Exploitation Less Likely
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-07-11 No
Reported By
Mateusz Jurczyk of Google Project Zero
CVE-2023-35357
Windows Kernel
Exploitation Less Likely
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-07-11 No
Reported By
Mateusz Jurczyk of Google Project Zero
CVE-2023-35299
Windows Common Log File System Driver
Exploitation Less Likely
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-07-11 No
Reported By
CVE-2023-35319
Remote Procedure Call Runtime
Exploitation Less Likely
Remote Procedure Call Runtime Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2023-07-11 No
Reported By
Microsoft Offensive Research & Security Engineering with Microsoft
CVE-2023-35318
Remote Procedure Call Runtime
Exploitation Less Likely
Remote Procedure Call Runtime Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2023-07-11 No
Reported By
Microsoft Offensive Research & Security Engineering with Microsoft
CVE-2023-35316
Remote Procedure Call Runtime
Exploitation Less Likely
Remote Procedure Call Runtime Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2023-07-11 No
Reported By
Microsoft Offensive Research & Security Engineering with Microsoft
CVE-2023-35314
Remote Procedure Call Runtime
Exploitation Less Likely
Remote Procedure Call Runtime Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2023-07-11 No
Reported By
Microsoft Offensive Research & Security Engineering with Microsoft
CVE-2023-33164
Remote Procedure Call Runtime
Exploitation Less Likely
Remote Procedure Call Runtime Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2023-07-11 No
Reported By
Microsoft Offensive Research & Security Engineering with Microsoft
CVE-2023-32035
Remote Procedure Call Runtime
Exploitation Less Likely
Remote Procedure Call Runtime Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2023-07-11 No
Reported By
Microsoft Offensive Research & Security Engineering with Microsoft
CVE-2023-32034
Remote Procedure Call Runtime
Exploitation Less Likely
Remote Procedure Call Runtime Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2023-07-11 No
Reported By
Microsoft Offensive Research & Security Engineering with Microsoft
CVE-2023-35296
Microsoft PostScript and PCL6 Class Printer Driver
Exploitation Less Likely
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2023-07-11 No
Reported By
kap0k
CVE-2023-32039
Microsoft PostScript and PCL6 Class Printer Driver
Exploitation Less Likely
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2023-07-11 No
Reported By
kap0k
CVE-2023-32045
Microsoft Message Queuing (MSMQ)
Exploitation Less Likely
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2023-07-11 No
CVE-2023-32044
Microsoft Message Queuing (MSMQ)
Exploitation Less Likely
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2023-07-11 No
Release Month
June 2023
3 CVE | last update 1 day(s) ago
Release 2023-06-13 Patch Tuesday Count 3
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-32011
Windows iSCSI Discovery Service
Exploitation Less Likely
Windows iSCSI Discovery Service Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2023-06-13 No
Reported By
CVE-2023-32017
Microsoft PostScript Printer Driver
Exploitation Less Likely
Microsoft PostScript Printer Driver Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-06-13 No
Reported By
kap0k
CVE-2023-29373
Microsoft ODBC Driver
Exploitation Less Likely
Microsoft ODBC Driver Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-06-13 No
Reported By
Yousuke Shibazaki
Release Month
May 2023
2 CVE | last update 1 day(s) ago
Release 2023-05-09 Patch Tuesday Count 2
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-24900
Windows NTLM Security Support Provider
Exploitation Less Likely
Windows NTLM Security Support Provider Information Disclosure Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2023-05-09 No
Reported By
CVE-2023-24902
Win32k
Exploitation More Likely
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-05-09 No
Reported By
Hou Xiantong(Bl1nnnk) with Wuheng Lab of ByteDance
Andrew Ruddick with Microsoft Security Response Center
Release Month
April 2023
5 CVE | last update 1 day(s) ago
Release 2023-04-17 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-1916
A flaw was found in tiffcrop a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractImageSection function in tools/tiffcrop.c resulting in a denial of service and limited
No latest release note
A flaw was found in tiffcrop a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractImageSection function in tools/tiffcrop.c resulting in a denial of service and limited information disclosure. This issue affects libtiff versions 4.x.
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
2023-04-17 - -
Release 2023-04-11 Patch Tuesday Count 4
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-24931
Windows Secure Channel
Exploitation Less Likely
Windows Secure Channel Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2023-04-11 No
CVE-2023-21729
Remote Procedure Call Runtime
Exploitation Less Likely
Remote Procedure Call Runtime Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
2023-04-11 No
Reported By
bee13oy with Cyber Kunlun Lab
CVE-2023-24924
Microsoft PostScript and PCL6 Class Printer Driver
Exploitation Less Likely
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-04-11 No
Reported By
kap0k
CVE-2023-21769
Microsoft Message Queuing (MSMQ)
Exploitation Less Likely
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2023-04-11 No
Reported By
Haifei Li with Check Point Research
Release Month
March 2023
4 CVE | last update 1 day(s) ago
Release 2023-03-14 Patch Tuesday Count 3
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-24862
Windows Secure Channel
Exploitation Less Likely
Windows Secure Channel Denial of Service Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2023-03-14 No
CVE-2023-23418
Windows Resilient File System (ReFS)
Exploitation Less Likely
Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-03-14 No
Reported By
CVE-2023-24872
Microsoft PostScript and PCL6 Class Printer Driver
Exploitation Less Likely
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-03-14 No
Reported By
kap0k
Release 2023-03-10 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-27371
GNU libmicrohttpd before 0.9.76 allows remote DoS (
No latest release note
GNU libmicrohttpd before 0.9.76 allows remote DoS (Denial of Service) due to improper parsing of a multipart/form-data boundary in the postprocessor.c MHD_create_post_processor() method. This allows an attacker to remotely send a malicious HTTP POST packet that includes one or more '\0' bytes in a multipart/form-data boundary field which - assuming a specific heap layout - will result in an out-of-bounds read and a crash in the find_boundary() function.
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
2023-03-10 - -
Release Month
February 2023
7 CVE | last update 1 day(s) ago
Release 2023-02-14 Patch Tuesday Count 7
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-21702
Windows iSCSI Service
Exploitation Less Likely
Windows iSCSI Service Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2023-02-14 No
Reported By
Azure Yang with Kunlun Lab
liubenjin with Codesafe Team of Legendsec at Qi'anxin Group
CVE-2023-21819
Windows Secure Channel
Exploitation More Likely
Windows Secure Channel Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2023-02-14 No
Reported By
CVE-2023-21699
Windows Internet Storage Name Service (iSNS) Server
Exploitation Less Likely
Windows Internet Storage Name Service (iSNS) Server Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
2023-02-14 No
Reported By
bee13oy with Cyber Kunlun Lab
CVE-2023-21691
Microsoft Protected Extensible Authentication Protocol (PEAP)
Exploitation Less Likely
Microsoft Protected Extensible Authentication Protocol (PEAP) Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2023-02-14 No
CVE-2023-21693
Microsoft PostScript and PCL6 Class Printer Driver
Exploitation Less Likely
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
2023-02-14 No
CVE-2023-21798
Microsoft ODBC Driver
Exploitation Less Likely
Microsoft ODBC Driver Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-02-14 No
Reported By
Anonymous
CVE-2023-21687
HTTP.sys
Exploitation Less Likely
HTTP.sys Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2023-02-14 No
Reported By
Release Month
January 2023
5 CVE | last update 1 day(s) ago
Release 2023-01-10 Patch Tuesday Count 5
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-21682
Windows Point-to-Point Protocol (PPP)
Exploitation Less Likely
Windows Point-to-Point Protocol (PPP) Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
2023-01-10 No
CVE-2023-21776
Windows Kernel
Exploitation Less Likely
Windows Kernel Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2023-01-10 No
Reported By
Mateusz Jurczyk of Google Project Zero
CVE-2023-21772
Windows Kernel
Exploitation Less Likely
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-01-10 No
Reported By
Mateusz Jurczyk of Google Project Zero
CVE-2023-21539
Windows Authentication
Exploitation Less Likely
Windows Authentication Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-01-10 No
Reported By
Alexander Clouter with coreMem Limited and Alan DeKok with NetworkRADIUS
CVE-2023-21536
Event Tracing for Windows
Exploitation Less Likely
Event Tracing for Windows Information Disclosure Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2023-01-10 No
Reported By
Release Month
January 2022
2 CVE | last update 1 day(s) ago
Release 2022-01-22 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2022-20698
Clam AntiVirus (ClamAV)
No latest release note
Clam AntiVirus (ClamAV) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2022-01-22 - -
Release 2022-01-19 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2018-10392
mapping0_forward in mapping0.c in Xiph.Org libvorbis 1.3.6 does not validate the number of channels which allows remote attackers to cause a
No latest release note
mapping0_forward in mapping0.c in Xiph.Org libvorbis 1.3.6 does not validate the number of channels which allows remote attackers to cause a denial of service (heap-based buffer overflow or over-read) or possibly have unspecified other impact via a crafted file.
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
2022-01-19 - -
Prev Page 5 / 6 | rows 201-250 of 269 Next