Analyst command view

MSRC Driver CVE Board

Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.

Live snapshot
Last Sync
2026-05-20T07:39:30Z
Freshness
1 day(s) ago
Refresh Policy
24h baseline + release watch
Storage
Latest snapshot only
Rows In View
108
Current result set after filter and search.
Exploited Flagged
66
Rows with a non-empty exploitation signal.
Distinct CWE
2
Unique weakness classes in this view.
Modules
72
Unique inferred driver or component labels.
Reset
Active filters CWE CWE-400: Uncontrolled Resource Consumption Clear filters
Release Month
May 2026
1 CVE | last update 1 day(s) ago
Release 2026-05-07 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2026-42154
Prometheus: remote read endpoint allows
No latest release note
Prometheus: remote read endpoint allows denial of service via crafted snappy payload
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2026-05-07 - -
Release Month
January 2026
1 CVE | last update 1 day(s) ago
Release 2026-01-19 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2026-0992
Libxml2: libxml2
No latest release note
Libxml2: libxml2: denial of service via crafted xml catalogs
CVSS vector: AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
2026-01-19 - -
Release Month
November 2025
1 CVE | last update 1 day(s) ago
Release 2025-11-11 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2025-60753
An issue was discovered in libarchive bsdtar before version 3.8.1 in function apply_substitution in file tar/subst.c when processing crafted -s substitution rules. This can cause unbounded memory allocation and lead to
No latest release note
An issue was discovered in libarchive bsdtar before version 3.8.1 in function apply_substitution in file tar/subst.c when processing crafted -s substitution rules. This can cause unbounded memory allocation and lead to denial of service (Out-of-Memory crash).
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
2025-11-11 - -
Release Month
October 2025
3 CVE | last update 1 day(s) ago
Release 2025-10-14 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2025-59502
Remote Procedure Call
Exploitation More Likely
Remote Procedure Call Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-10-14 No
Reported By
Release 2025-10-02 Other / OOB Count 2
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2025-55560
An issue in pytorch v2.7.0 can lead to a
No latest release note
An issue in pytorch v2.7.0 can lead to a Denial of Service (DoS) when a PyTorch model consists of torch.Tensor.to_sparse() and torch.Tensor.to_dense() and is compiled by Inductor.
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2025-10-02 - -
CVE-2025-55558
A buffer overflow occurs in pytorch v2.7.0 when a PyTorch model consists of torch.nn.Conv2d, torch.nn.functional.hardshrink, and torch.Tensor.view-torch.mv() and is compiled by Inductor, leading to a
No latest release note
A buffer overflow occurs in pytorch v2.7.0 when a PyTorch model consists of torch.nn.Conv2d, torch.nn.functional.hardshrink, and torch.Tensor.view-torch.mv() and is compiled by Inductor, leading to a Denial of Service (DoS).
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2025-10-02 - -
Release Month
September 2025
2 CVE | last update 1 day(s) ago
Release 2025-09-03 Other / OOB Count 2
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2025-24294
The attack vector is a potential
No latest release note
The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2025-09-03 - -
CVE-2024-57075
A prototype pollution in the lib.Logger function of eazy-logger v4.0.1 allows attackers to cause a
No latest release note
A prototype pollution in the lib.Logger function of eazy-logger v4.0.1 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload.
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2025-09-03 - -
Release Month
August 2025
1 CVE | last update 1 day(s) ago
Release 2025-08-12 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2025-53722
Windows Remote Desktop Services
Exploitation Less Likely
Windows Remote Desktop Services Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-08-12 No
Reported By
Release Month
July 2025
3 CVE | last update 1 day(s) ago
Release 2025-07-11 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-50967
latchset jose through version 11 allows attackers to cause a
No latest release note
latchset jose through version 11 allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value.
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2025-07-11 - -
Release 2025-07-08 Patch Tuesday Count 2
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2025-49722
Windows Print Spooler
Exploitation Less Likely
Windows Print Spooler Denial of Service Vulnerability
CVSS vector: AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-07-08 No
Reported By
CVE-2025-49716
Windows Netlogon
Exploitation Unlikely
Windows Netlogon Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-07-08 No
Reported By
Or Yair Or Yair with SafeBreach
Shahak Morag Shahak Morag with SafeBreach
Release Month
June 2025
2 CVE | last update 1 day(s) ago
Release 2025-06-10 Patch Tuesday Count 2
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2025-33068
Windows Standards-Based Storage Management Service
Exploitation Unlikely
Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-06-10 No
Reported By
CVE-2025-32724
Windows Local Security Authority Subsystem Service (LSASS)
Exploitation Unlikely
Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-06-10 No
Reported By
Release Month
May 2025
3 CVE | last update 1 day(s) ago
Release 2025-05-13 Patch Tuesday Count 3
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2025-26677
Windows Remote Desktop Gateway (RD Gateway)
Exploitation Less Likely
Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-05-13 No
Reported By
ʌ!ɔ⊥ojv with Kunlun Lab
k0shl with Kunlun Lab
CVE-2025-29954
Windows Lightweight Directory Access Protocol (LDAP)
Exploitation Unlikely
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-05-13 No
Reported By
Erik Egsgard with Field Effect
Dan Reynolds
CVE-2025-29957
Windows Deployment Services
Exploitation Unlikely
Windows Deployment Services Denial of Service Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-05-13 No
Reported By
R4nger & Zhiniang Peng
Release Month
April 2025
10 CVE | last update 1 day(s) ago
Release 2025-04-08 Patch Tuesday Count 10
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2025-27486
Windows Standards-Based Storage Management Service
Exploitation Less Likely
Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-04-08 No
Reported By
CVE-2025-27485
Windows Standards-Based Storage Management Service
Exploitation Less Likely
Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-04-08 No
Reported By
CVE-2025-27470
Windows Standards-Based Storage Management Service
Exploitation Less Likely
Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-04-08 No
Reported By
CVE-2025-26680
Windows Standards-Based Storage Management Service
Exploitation Less Likely
Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-04-08 No
Reported By
CVE-2025-26652
Windows Standards-Based Storage Management Service
Exploitation Less Likely
Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-04-08 No
Reported By
CVE-2025-21174
Windows Standards-Based Storage Management Service
Exploitation Less Likely
Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-04-08 No
Reported By
Microsoft SMIS Team
Zhiniang Peng with HUST and wh1tc with kunlun lab
CVE-2025-27469
Windows Lightweight Directory Access Protocol (LDAP)
Exploitation Less Likely
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-04-08 No
Reported By
CVE-2025-26673
Windows Lightweight Directory Access Protocol (LDAP)
Exploitation Less Likely
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-04-08 No
Reported By
Azure Yang with Kunlun Lab
Or Yair and Shahak Morag with SafeBreach
CVE-2025-26641
Microsoft Message Queuing (MSMQ)
Exploitation Less Likely
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-04-08 No
Reported By
CVE-2025-27473
HTTP.sys
Exploitation Less Likely
HTTP.sys Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-04-08 No
Reported By
Release Month
March 2025
2 CVE | last update 1 day(s) ago
Release 2025-03-14 Other / OOB Count 2
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-25112
QuickTimeVideo::multipleEntriesDecoder in Exiv2
No latest release note
Denial of service due to unbounded recursion in QuickTimeVideo::multipleEntriesDecoder in Exiv2
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
2025-03-14 - -
CVE-2025-0426
A security issue was discovered in Kubernetes where a large number of container checkpoint requests made to the unauthenticated kubelet read-only HTTP endpoint may cause a Node
No latest release note
A security issue was discovered in Kubernetes where a large number of container checkpoint requests made to the unauthenticated kubelet read-only HTTP endpoint may cause a Node Denial of Service by filling the Node's disk.
CVSS vector: AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2025-03-14 - -
Release Month
February 2025
4 CVE | last update 1 day(s) ago
Release 2025-02-25 Monthly Preview Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-32636
A flaw was found in glib, where the gvariant deserialization code is vulnerable to a
No latest release note
A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
2025-02-25 - -
Release 2025-02-11 Patch Tuesday Count 3
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2025-21351
Windows Active Directory Domain Services API
Exploitation Less Likely
Windows Active Directory Domain Services API Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-02-11 No
Reported By
CVE-2025-21181
Microsoft Message Queuing (MSMQ)
Exploitation Less Likely
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-02-11 No
Reported By
CVE-2025-21352
Internet Connection Sharing (ICS)
Exploitation Less Likely
Internet Connection Sharing (ICS) Denial of Service Vulnerability
CVSS vector: AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-02-11 No
Reported By
bee13oy with Cyber Kunlun Lab
Release Month
January 2025
10 CVE | last update 1 day(s) ago
Release 2025-01-14 Patch Tuesday Count 10
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2025-21389
Windows Universal Plug and Play (UPnP) Device Host
Exploitation Less Likely
Windows Universal Plug and Play (UPnP) Device Host Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-01-14 No
Reported By
CVE-2025-21300
Windows Universal Plug and Play (UPnP) Device Host
Exploitation Less Likely
Windows Universal Plug and Play (UPnP) Device Host Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-01-14 No
Reported By
CVE-2025-21330
Windows Remote Desktop Services
Exploitation Less Likely
Windows Remote Desktop Services Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-01-14 No
Reported By
ʌ!ↄ⊥ojv with Kunlun Lab
CVE-2025-21207
Windows Connected Devices Platform Service (Cdpsvc)
Exploitation Less Likely
Windows Connected Devices Platform Service (Cdpsvc) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-01-14 No
Reported By
CVE-2025-21290
Microsoft Message Queuing (MSMQ)
Exploitation Less Likely
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-01-14 No
Reported By
CVE-2025-21289
Microsoft Message Queuing (MSMQ)
Exploitation Less Likely
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-01-14 No
Reported By
CVE-2025-21270
Microsoft Message Queuing (MSMQ)
Exploitation Less Likely
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-01-14 No
Reported By
CVE-2025-21251
Microsoft Message Queuing (MSMQ)
Exploitation Less Likely
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-01-14 No
Reported By
CVE-2025-21231
IP Helper
Exploitation Less Likely
IP Helper Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-01-14 No
Reported By
CVE-2025-21230
Microsoft Message Queuing (MSMQ)
Exploitation Less Likely
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-01-14 No
Reported By
Release Month
December 2024
3 CVE | last update 1 day(s) ago
Release 2024-12-10 Patch Tuesday Count 3
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-49075
Windows Remote Desktop Services
Exploitation Less Likely
Windows Remote Desktop Services Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2024-12-10 No
Reported By
CVE-2024-49129
Windows Remote Desktop Gateway (RD Gateway)
Exploitation Less Likely
Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
CVSS vector: AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-12-10 No
Reported By
CVE-2024-49096
Microsoft Message Queuing (MSMQ)
Exploitation Less Likely
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2024-12-10 No
Reported By
Release Month
November 2024
1 CVE | last update 1 day(s) ago
Release 2024-11-09 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-47554
Apache Commons IO: Possible
No latest release note
Apache Commons IO: Possible denial of service attack on untrusted input to XmlStreamReader
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
2024-11-09 - -
Release Month
October 2024
3 CVE | last update 1 day(s) ago
Release 2024-10-15 Other / OOB Count 2
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-50966
erlang-jose (aka JOSE for Erlang and Elixir) through 1.11.6 allow attackers to cause a
No latest release note
erlang-jose (aka JOSE for Erlang and Elixir) through 1.11.6 allow attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value in a JOSE header.
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
2024-10-15 - -
CVE-2024-39908
REXML
No latest release note
Denial of service in REXML
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
2024-10-15 - -
Release 2024-10-10 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-33655
The DNS protocol in RFC 1035 and updates allows remote attackers to cause a
No latest release note
The DNS protocol in RFC 1035 and updates allows remote attackers to cause a denial of service (resource consumption) by arranging for DNS queries to be accumulated for seconds such that responses are later sent in a pulsing burst (which can be considered traffic amplification in some cases) aka the "DNSBomb" issue.
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2024-10-10 - -
Page 1 / 3 | rows 1-50 of 108 Next