Analyst command view

MSRC Driver CVE Board

Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.

Live snapshot
Last Sync
2026-05-20T07:39:30Z
Freshness
1 day(s) ago
Refresh Policy
24h baseline + release watch
Storage
Latest snapshot only
Rows In View
443
Current result set after filter and search.
Exploited Flagged
399
Rows with a non-empty exploitation signal.
Distinct CWE
8
Unique weakness classes in this view.
Modules
185
Unique inferred driver or component labels.
Reset
Active filters CWE CWE-416: Use After Free Clear filters
Release Month
August 2024
8 CVE | last update 1 day(s) ago
Release 2024-08-13 Patch Tuesday Count 7
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-38159
Windows Network Virtualization
Exploitation Less Likely
Windows Network Virtualization Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-08-13 No
Reported By
Anonymous
CVE-2024-38199
Windows Line Printer Daemon (LPD) Service
Exploitation Less Likely
Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-08-13 No
Reported By
Anonymous
bee13oy with Cyber Kunlun Lab
CVE-2024-38138
Windows Deployment Services
Exploitation Less Likely
Windows Deployment Services Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-08-13 No
CVE-2024-38150
Windows DWM Core Library
Exploitation More Likely
Windows DWM Core Library Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-08-13 No
CVE-2024-38193
Windows Ancillary Function Driver for WinSock
Exploitation Detected
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
2024-08-13 Yes
Reported By
Luigino Camastra and Milánek with Gen Digital
CVE-2024-38141
Windows Ancillary Function Driver for WinSock
Exploitation More Likely
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-08-13 No -
CVE-2024-38147
Microsoft DWM Core Library
Exploitation More Likely
Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-08-13 No
Release 2024-08-05 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2021-3929
A DMA reentrancy issue was found in the NVM Express Controller (NVME) emulation in QEMU. This CVE is similar to CVE-2021-3750 and just like it when the reentrancy write triggers the reset function nvme_ctrl_reset() data structs will be freed leading to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host resulting in a
No latest release note
A DMA reentrancy issue was found in the NVM Express Controller (NVME) emulation in QEMU. This CVE is similar to CVE-2021-3750 and just like it when the reentrancy write triggers the reset function nvme_ctrl_reset() data structs will be freed leading to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host resulting in a denial of service condition or potentially executing arbitrary code within the context of the QEMU process on the host.
CVSS vector: AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
2024-08-05 - -
Release Month
July 2024
5 CVE | last update 1 day(s) ago
Release 2024-07-09 Patch Tuesday Count 5
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-38078
Xbox Wireless Adapter
Exploitation Less Likely
Xbox Wireless Adapter Remote Code Execution Vulnerability
CVSS vector: AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-07-09 No
Reported By
Wei in Kunlun Lab with Cyber KunLun
CVE-2024-38066
Windows Win32k
Exploitation More Likely
Windows Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-07-09 No
Reported By
Marcin Wiazowski working with Trend Micro Zero Day Initiative
CVE-2024-38053
Windows Layer-2 Bridge Network Driver
Exploitation Less Likely
Windows Layer-2 Bridge Network Driver Remote Code Execution Vulnerability
CVSS vector: AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-07-09 No
Reported By
Wei in Kunlun Lab with Cyber KunLun
CVE-2024-38085
Windows Graphics Component
Exploitation More Likely
Windows Graphics Component Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-07-09 No
Reported By
Anonymous
CVE-2024-38059
Win32k
Exploitation More Likely
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-07-09 No
Release Month
June 2024
5 CVE | last update 1 day(s) ago
Release 2024-06-11 Patch Tuesday Count 5
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-30086
Windows Win32 Kernel Subsystem
Exploitation More Likely
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-06-11 No
CVE-2024-30062
Windows Standards-Based Storage Management Service
Exploitation Less Likely
Windows Standards-Based Storage Management Service Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
2024-06-11 No
Reported By
CVE-2024-30082
Win32k
Exploitation More Likely
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-06-11 No
CVE-2024-30089
Microsoft Streaming Service
Exploitation More Likely
Microsoft Streaming Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-06-11 No
Reported By
Valentina Palmiotti (@chompie1337) of IBM X-Force working with Trend Micro Zero Day Initiative
CVE-2024-30080
Microsoft Message Queuing (MSMQ)
Exploitation More Likely
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-06-11 No
Reported By
Release Month
May 2024
5 CVE | last update 1 day(s) ago
Release 2024-05-14 Patch Tuesday Count 5
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-30049
Windows Win32 Kernel Subsystem
Exploitation More Likely
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-05-14 No
Reported By
Anonymous
CVE-2024-30035
Windows DWM Core Library
Exploitation More Likely
Windows DWM Core Library Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-05-14 No
CVE-2024-30032
Windows DWM Core Library
Exploitation More Likely
Windows DWM Core Library Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-05-14 No
CVE-2024-30031
Windows CNG Key Isolation Service
Exploitation Less Likely
Windows CNG Key Isolation Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-05-14 No
Reported By
Microsoft Offensive Research & Security Engineering
CVE-2024-30028
Win32k
Exploitation Less Likely
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-05-14 No
Reported By
Guopengfei from Codesafe Team of Legendsec at Qi'anxin Group
Release Month
April 2024
9 CVE | last update 1 day(s) ago
Release 2024-04-09 Patch Tuesday Count 9
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-26230
Windows Telephony Server
Exploitation More Likely
Windows Telephony Server Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-04-09 No -
CVE-2024-26233
Windows DNS Server
Exploitation Less Likely
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-04-09 No
Reported By
Rajesh Kumar with Microsoft
CVE-2024-26231
Windows DNS Server
Exploitation Less Likely
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-04-09 No
Reported By
Rajesh Kumar with Microsoft
CVE-2024-26227
Windows DNS Server
Exploitation Less Likely
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-04-09 No
Reported By
Rajesh Kumar with Microsoft
CVE-2024-26224
Windows DNS Server
Exploitation Less Likely
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-04-09 No
Reported By
Rajesh Kumar with Microsoft
CVE-2024-26223
Windows DNS Server
Exploitation Less Likely
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-04-09 No
Reported By
Rajesh Kumar with Microsoft
CVE-2024-26222
Windows DNS Server
Exploitation Less Likely
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-04-09 No
Reported By
Rajesh Kumar with Microsoft
CVE-2024-26221
Windows DNS Server
Exploitation Less Likely
Windows DNS Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-04-09 No
Reported By
Rajesh Kumar with Microsoft
CVE-2024-26241
Win32k
Exploitation More Likely
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-04-09 No
Reported By
Anonymous
Release Month
March 2024
5 CVE | last update 1 day(s) ago
Release 2024-03-12 Patch Tuesday Count 5
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-21439
Windows Telephony Server
Exploitation Less Likely
Windows Telephony Server Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-03-12 No
Reported By
CVE-2024-26182
Windows Kernel
Exploitation More Likely
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-03-12 No
Reported By
Mateusz Jurczyk with Google Project Zero
CVE-2024-21443
Windows Kernel
Exploitation Less Likely
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-03-12 No
Reported By
CHEN QINGYANG with Topsec Alpha Team
CVE-2024-21407
Windows Hyper-V
Exploitation Less Likely
Windows Hyper-V Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-03-12 No
Reported By
chief banana
@australeo
CVE-2024-21437
Windows Graphics Component
Exploitation More Likely
Windows Graphics Component Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-03-12 No
Reported By
esakis
Release Month
February 2024
1 CVE | last update 1 day(s) ago
Release 2024-02-13 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-21339
Windows USB Generic Parent Driver
Exploitation Less Likely
Windows USB Generic Parent Driver Remote Code Execution Vulnerability
CVSS vector: AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-02-13 No
Reported By
Wei in Kunlun Lab with Cyber KunLun
Release Month
January 2024
4 CVE | last update 1 day(s) ago
Release 2024-01-09 Patch Tuesday Count 4
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-20681
Windows Subsystem for Linux
Exploitation Less Likely
Windows Subsystem for Linux Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-01-09 No
Reported By
bframer12@live.com
CVE-2024-20683
Win32k
Exploitation More Likely
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-01-09 No
Reported By
jackery
CVE-2024-21307
Remote Desktop Client
Exploitation More Likely
Remote Desktop Client Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-01-09 No
CVE-2024-20655
Microsoft Online Certificate Status Protocol (OCSP)
Exploitation Less Likely
Microsoft Online Certificate Status Protocol (OCSP) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-01-09 No
Reported By
Release Month
December 2023
1 CVE | last update 1 day(s) ago
Release 2023-12-12 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-35628
Windows MSHTML Platform
Exploitation More Likely
Windows MSHTML Platform Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-12-12 No
Reported By
Release Month
October 2023
7 CVE | last update 1 day(s) ago
Release 2023-10-11 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2014-9940
The regulator_ena_gpio_free function in drivers/regulator/core.c in the Linux kernel before 3.19 allows local users to gain privileges or cause a
No latest release note
The regulator_ena_gpio_free function in drivers/regulator/core.c in the Linux kernel before 3.19 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted application.
CVSS vector: AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
2023-10-11 - -
Release 2023-10-10 Patch Tuesday Count 6
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-36902
Windows Runtime
Exploitation Less Likely
Windows Runtime Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-10-10 No
Reported By
CHEN QINGYANG with Topsec Alpha Team
CVE-2023-36605
Windows Named Pipe Filesystem
Exploitation Less Likely
Windows Named Pipe Filesystem Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-10-10 No
Reported By
greenbamboo
CVE-2023-36776
Win32k
Exploitation More Likely
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-10-10 No
Reported By
jackery
CVE-2023-36743
Win32k
Exploitation More Likely
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-10-10 No
Reported By
Anonymous
CVE-2023-36583
Microsoft Message Queuing (MSMQ)
Exploitation Less Likely
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-10-10 No
Reported By
CVE-2023-41774
Layer 2 Tunneling Protocol
Exploitation Less Likely
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-10-10 No
Reported By
Microsoft’s Windows Servicing and Delivery Group – Network Security and Containers (NSC) Team
Prev Page 7 / 9 | rows 301-350 of 443 Next