Analyst command view

MSRC Driver CVE Board

Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.

Live snapshot
Last Sync
2026-05-20T07:39:30Z
Freshness
1 day(s) ago
Refresh Policy
24h baseline + release watch
Storage
Latest snapshot only
Rows In View
4
Current result set after filter and search.
Exploited Flagged
2
Rows with a non-empty exploitation signal.
Distinct CWE
1
Unique weakness classes in this view.
Modules
3
Unique inferred driver or component labels.
Reset
Active filters CWE CWE-601: URL Redirection to Untrusted Site ('Open Redirect') Clear filters
Release Month
October 2024
2 CVE | last update 1 day(s) ago
Release 2024-10-08 Patch Tuesday Count 2
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-43543
Windows Mobile Broadband Driver
Exploitation Less Likely
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVSS vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-10-08 No
Reported By
Microsoft Offensive Research & Security Engineering with Microsoft
CVE-2024-43536
Windows Mobile Broadband Driver
Exploitation Less Likely
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVSS vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-10-08 No
Reported By
Zhihua Wen with CyberKunLun
Release Month
January 2024
1 CVE | last update 1 day(s) ago
Release 2024-01-08 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-26159
Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site potentially leading to
No latest release note
Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site potentially leading to information disclosure phishing attacks or other security breaches.
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2024-01-08 - -
Release Month
August 2022
1 CVE | last update 1 day(s) ago
Release 2022-08-25 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2021-28861
Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to
No latest release note
Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure. NOTE: this is disputed by a third party because the http.server.html documentation page states "Warning: http.server is not recommended for production. It only implements basic security checks."
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
2022-08-25 - -