Analyst command view

MSRC Driver CVE Board

Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.

Live snapshot
Last Sync
2026-05-20T07:39:30Z
Freshness
1 day(s) ago
Refresh Policy
24h baseline + release watch
Storage
Latest snapshot only
Rows In View
12
Current result set after filter and search.
Exploited Flagged
9
Rows with a non-empty exploitation signal.
Distinct CWE
1
Unique weakness classes in this view.
Modules
10
Unique inferred driver or component labels.
Reset
Active filters CWE CWE-502: Deserialization of Untrusted Data Clear filters
Release Month
April 2026
2 CVE | last update 1 day(s) ago
Release 2026-04-23 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2026-33819
Microsoft Bing
N/A
Microsoft Bing Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
2026-04-23 No -
Release 2026-04-14 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2026-32184
Microsoft High Performance Compute (HPC) Pack
Exploitation Less Likely
Microsoft High Performance Compute (HPC) Pack Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2026-04-14 No
Reported By
Long Zhang
Release Month
March 2026
1 CVE | last update 1 day(s) ago
Release 2026-03-10 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2026-25166
Windows System Image Manager Assessment and Deployment Kit (ADK)
Exploitation Unlikely
Windows System Image Manager Assessment and Deployment Kit (ADK) Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2026-03-10 No
Reported By
Tim Baker with dotSec
Release Month
October 2025
1 CVE | last update 1 day(s) ago
Release 2025-10-14 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2025-59287
Windows Server Update Service (WSUS)
Exploitation More Likely
Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
2025-10-14 No
Reported By
Markus Wulftange with CODE WHITE GmbH
MEOW
f7d8c52bec79e42795cf15888b85cbad
Release Month
September 2025
1 CVE | last update 1 day(s) ago
Release 2025-09-09 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2025-55232
Microsoft High Performance Compute (HPC) Pack
Exploitation Less Likely
Microsoft High Performance Compute (HPC) Pack Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2025-09-09 No
Reported By
Dennis Carlson with Abacus Group LLC
Release Month
August 2025
1 CVE | last update 1 day(s) ago
Release 2025-08-12 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2025-53772
Web Deploy
Exploitation Less Likely
Web Deploy Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2025-08-12 No
Reported By
Release Month
April 2025
1 CVE | last update 1 day(s) ago
Release 2025-04-24 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2025-32434
PyTorch: `torch.load` with `weights_only=True` leads to
No latest release note
PyTorch: `torch.load` with `weights_only=True` leads to remote code execution
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2025-04-24 - -
Release Month
December 2024
1 CVE | last update 1 day(s) ago
Release 2024-12-12 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-49147
Microsoft Update Catalog
N/A
Microsoft Update Catalog Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N/E:P/RL:O/RC:C
2024-12-12 No
Reported By
Release Month
May 2024
1 CVE | last update 1 day(s) ago
Release 2024-05-14 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-27281
An issue was discovered in RDoc 6.3.3 through 6.6.2 as distributed in Ruby 3.x through 3.3.0. When parsing .rdoc_options (used for configuration in RDoc) as a YAML file object injection and resultant
No latest release note
An issue was discovered in RDoc 6.3.3 through 6.6.2 as distributed in Ruby 3.x through 3.3.0. When parsing .rdoc_options (used for configuration in RDoc) as a YAML file object injection and resultant remote code execution are possible because there are no restrictions on the classes that can be restored. (When loading the documentation cache object injection and resultant remote code execution are also possible if there were a crafted cache.) The main fixed version is 6.6.3.1. For Ruby 3.0 users a fixed version is rdoc 6.3.4.1. For Ruby 3.1 users a fixed version is rdoc 6.4.1.1. For Ruby 3.2 users a fixed version is rdoc 6.5.1.1.
CVSS vector: AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2024-05-14 - -
Release Month
September 2023
1 CVE | last update 1 day(s) ago
Release 2023-09-12 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-36736
Microsoft Identity Linux Broker
Exploitation Less Likely
Microsoft Identity Linux Broker Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C
2023-09-12 No
Reported By
Jamie McClymont with CyberCX
Rhys Davies with CyberCX
Release Month
July 2023
1 CVE | last update 1 day(s) ago
Release 2023-07-11 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-35317
Windows Server Update Service (WSUS)
Exploitation Less Likely
Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-07-11 No
Reported By
l1k3beef
Release Month
November 2022
1 CVE | last update 1 day(s) ago
Release 2022-11-09 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2022-39379
Fluentd vulnerable to
No latest release note
Fluentd vulnerable to remote code execution due to insecure deserialization (in non-default configuration)
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2022-11-09 - -