Analyst command view

MSRC Driver CVE Board

Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.

Live snapshot
Last Sync
2026-05-20T07:39:30Z
Freshness
1 day(s) ago
Refresh Policy
24h baseline + release watch
Storage
Latest snapshot only
Rows In View
75
Current result set after filter and search.
Exploited Flagged
74
Rows with a non-empty exploitation signal.
Distinct CWE
3
Unique weakness classes in this view.
Modules
46
Unique inferred driver or component labels.
Reset
Active filters CWE CWE-59: Improper Link Resolution Before File Access ('Link Following') Clear filters
Release Month
November 2023
3 CVE | last update 1 day(s) ago
Release 2023-11-14 Patch Tuesday Count 3
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-36705
Windows Installer
Exploitation Less Likely
Windows Installer Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-11-14 No
Reported By
Abdelhamid Naceri
CVE-2023-36047
Windows Authentication
Exploitation Less Likely
Windows Authentication Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-11-14 No
Reported By
CVE-2023-36046
Windows Authentication
Exploitation Less Likely
Windows Authentication Denial of Service Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
2023-11-14 No
Reported By
George Hughey with MSRC Vulnerabilities & Mitigations
Release Month
October 2023
2 CVE | last update 1 day(s) ago
Release 2023-10-10 Patch Tuesday Count 2
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-36711
Windows Runtime C++ Template Library
Exploitation Less Likely
Windows Runtime C++ Template Library Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-10-10 No
Reported By
CVE-2023-36723
Windows Container Manager Service
Exploitation Less Likely
Windows Container Manager Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-10-10 No
Reported By
Release Month
August 2023
3 CVE | last update 1 day(s) ago
Release 2023-08-08 Patch Tuesday Count 3
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-36903
Windows System Assessment Tool
Exploitation Less Likely
Windows System Assessment Tool Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-08-08 No
Reported By
CVE-2023-35379
Reliability Analysis Metrics Calculation Engine (RACEng)
Exploitation Less Likely
Reliability Analysis Metrics Calculation Engine (RACEng) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-08-08 No
Reported By
OUYANG FEI
CVE-2023-36876
Reliability Analysis Metrics Calculation (RacTask)
Exploitation Less Likely
Reliability Analysis Metrics Calculation (RacTask) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
2023-08-08 No
Reported By
OUYANG FEI
Release Month
July 2023
8 CVE | last update 1 day(s) ago
Release 2023-07-11 Patch Tuesday Count 8
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-32056
Windows Server Update Service (WSUS)
Exploitation Less Likely
Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-07-11 No
Reported By
Naceri with MSRC V&M
CVE-2023-32053
Windows Installer
Exploitation Less Likely
Windows Installer Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-07-11 No
Reported By
Naceri with MSRC V&M
CVE-2023-32050
Windows Installer
Exploitation Less Likely
Windows Installer Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-07-11 No
Reported By
JeongOh Kyea of THEORI Trend Micro Zero Day Initiative
CVE-2023-35342
Windows Image Acquisition
Exploitation Less Likely
Windows Image Acquisition Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-07-11 No
Reported By
OUYANG FEI
CVE-2023-36874
Windows Error Reporting Service
Exploitation Detected
Windows Error Reporting Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-07-11 Yes
Reported By
Vlad Stolyarov and Maddie Stone of Googles Threat Analysis Group (TAG)
CVE-2023-35347
Microsoft Install Service
Exploitation Less Likely
Microsoft Install Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
2023-07-11 No
Reported By
Filip Dragović with Infigo IS
CVE-2023-35353
Connected User Experiences and Telemetry
Exploitation Less Likely
Connected User Experiences and Telemetry Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-07-11 No
Reported By
George Hughey with MSRC Vulnerabilities & Mitigations
CVE-2023-35320
Connected User Experiences and Telemetry
Exploitation Less Likely
Connected User Experiences and Telemetry Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-07-11 No
Reported By
Release Month
June 2023
2 CVE | last update 1 day(s) ago
Release 2023-06-13 Patch Tuesday Count 2
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-29351
Windows Group Policy
Exploitation Less Likely
Windows Group Policy Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
2023-06-13 No
Reported By
Sukriti S. and Manish Singh with Microsoft
CVE-2023-32012
Windows Container Manager Service
Exploitation Less Likely
Windows Container Manager Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-06-13 No
Reported By
Naceri with MSRC Vulnerabilities and Mitigations
Release Month
May 2023
1 CVE | last update 1 day(s) ago
Release 2023-05-09 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-24904
Windows Installer
Exploitation Less Likely
Windows Installer Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
2023-05-09 No
Reported By
Naceri with MSRC V&M
Release Month
April 2023
1 CVE | last update 1 day(s) ago
Release 2023-04-11 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-28222
Windows Kernel
Exploitation Less Likely
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
2023-04-11 No
Reported By
Filip Dragović with Infigo IS
Abdelhamid Naceri
Release Month
January 2023
4 CVE | last update 1 day(s) ago
Release 2023-01-10 Patch Tuesday Count 4
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-21760
Windows Print Spooler
Exploitation Less Likely
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
2023-01-10 No
Reported By
CVE-2023-21678
Windows Print Spooler
Exploitation Less Likely
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-01-10 No
Reported By
National Security Agency
CVE-2023-21725
Windows Malicious Software Removal Tool
Exploitation Unlikely
Windows Malicious Software Removal Tool Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C
2023-01-10 No
Reported By
Filip Dragovic with Infigo IS
CVE-2023-21542
Windows Installer
Exploitation Less Likely
Windows Installer Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-01-10 No
Reported By
QueryX Team of Theori working with Trend Micro Zero Day Initiative
Release Month
December 2021
1 CVE | last update 1 day(s) ago
Release 2021-12-16 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2021-26720
avahi-daemon-check-dns.sh in the Debian avahi package through 0.8-4 is executed as root via /etc/network/if-up.d/avahi-daemon and allows a local attacker to cause a
No latest release note
avahi-daemon-check-dns.sh in the Debian avahi package through 0.8-4 is executed as root via /etc/network/if-up.d/avahi-daemon and allows a local attacker to cause a denial of service or create arbitrary empty files via a symlink attack on files under /run/avahi-daemon. NOTE: this only affects the packaging for Debian GNU/Linux (used indirectly by SUSE) not the upstream Avahi product.
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
2021-12-16 - -
Prev Page 2 / 2 | rows 51-75 of 75