Analyst command view

MSRC Driver CVE Board

Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.

Live snapshot
Last Sync
2026-05-20T07:39:30Z
Freshness
1 day(s) ago
Refresh Policy
24h baseline + release watch
Storage
Latest snapshot only
Rows In View
3
Current result set after filter and search.
Exploited Flagged
3
Rows with a non-empty exploitation signal.
Distinct CWE
1
Unique weakness classes in this view.
Modules
1
Unique inferred driver or component labels.
Reset
Active filters Module Windows Update Stack CWE CWE-284: Improper Access Control Clear filters

Top Modules

1 modules
Release Month
November 2024
1 CVE | last update 1 day(s) ago
Release 2024-11-12 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-43530
Windows Update Stack
Exploitation Less Likely
Windows Update Stack Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-11-12 No
Reported By
CHEN QINGYANG with Topsec Alpha Team
Release Month
August 2024
2 CVE | last update 1 day(s) ago
Release 2024-08-13 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-38163
Windows Update Stack
Exploitation More Likely
Windows Update Stack Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-08-13 No
Reported By
Ilan Kotler
Sandro Poppi
Nicholas Zubrisky (@NZubrisky) of Trend Micro Zero Day Initiative
Release 2024-08-07 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-38202
Windows Update Stack
Exploitation Less Likely
Windows Update Stack Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C
2024-08-07 No
Reported By