Analyst command view

MSRC Driver CVE Board

Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.

Live snapshot
Last Sync
2026-05-20T07:39:30Z
Freshness
1 day(s) ago
Refresh Policy
24h baseline + release watch
Storage
Latest snapshot only
Rows In View
2
Current result set after filter and search.
Exploited Flagged
2
Rows with a non-empty exploitation signal.
Distinct CWE
1
Unique weakness classes in this view.
Modules
1
Unique inferred driver or component labels.
Reset
Active filters Module Win32k CWE CWE-20: Improper Input Validation Clear filters

Top Modules

1 modules
Release Month
June 2024
1 CVE | last update 1 day(s) ago
Release 2024-06-11 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-30087
Win32k
Exploitation More Likely
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-06-11 No
Release Month
October 2023
1 CVE | last update 1 day(s) ago
Release 2023-10-10 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-36731
Win32k
Exploitation More Likely
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-10-10 No
Reported By
Marcin Wiazowski working with Trend Micro Zero Day Initiative