Analyst command view

MSRC Driver CVE Board

Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.

Live snapshot
Last Sync
2026-05-20T07:39:30Z
Freshness
1 day(s) ago
Refresh Policy
24h baseline + release watch
Storage
Latest snapshot only
Rows In View
3
Current result set after filter and search.
Exploited Flagged
3
Rows with a non-empty exploitation signal.
Distinct CWE
1
Unique weakness classes in this view.
Modules
1
Unique inferred driver or component labels.
Reset
Active filters Module Windows Shell CWE CWE-416: Use After Free Clear filters

Top CWE

1 classes

Top Modules

1 modules
Release Month
April 2026
1 CVE | last update 1 day(s) ago
Release 2026-04-14 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2026-26165
Windows Shell
Exploitation Less Likely
Windows Shell Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2026-04-14 No
Reported By
Anonymous
Release Month
April 2025
1 CVE | last update 1 day(s) ago
Release 2025-04-08 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2025-27729
Windows Shell
Exploitation Less Likely
Windows Shell Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2025-04-08 No
Reported By
Zhiniang Peng with HUST Ver Lewis Lee
Release Month
October 2024
1 CVE | last update 1 day(s) ago
Release 2024-10-08 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-43552
Windows Shell
Exploitation Less Likely
Windows Shell Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-10-08 No
Reported By
CHEN QINGYANG with Topsec Alpha Team