Analyst command view

MSRC Driver CVE Board

Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.

Live snapshot
Last Sync
2026-05-20T07:39:30Z
Freshness
1 day(s) ago
Refresh Policy
24h baseline + release watch
Storage
Latest snapshot only
Rows In View
4
Current result set after filter and search.
Exploited Flagged
2
Rows with a non-empty exploitation signal.
Distinct CWE
1
Unique weakness classes in this view.
Modules
4
Unique inferred driver or component labels.
Reset
Active filters CWE CWE-732: Incorrect Permission Assignment for Critical Resource Clear filters
Release Month
March 2026
1 CVE | last update 1 day(s) ago
Release 2026-03-10 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2026-24291
Windows Accessibility Infrastructure (ATBroker.exe)
Exploitation More Likely
Windows Accessibility Infrastructure (ATBroker.exe) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2026-03-10 No
Reported By
James Forshaw with Google Project Zero
Release Month
January 2025
1 CVE | last update 1 day(s) ago
Release 2025-01-16 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2025-21325
Windows Secure Kernel Mode
Exploitation Less Likely
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2025-01-16 No
Reported By
Maxime Villard, of M.O.R.S.E.
Release Month
April 2024
1 CVE | last update 1 day(s) ago
Release 2024-04-15 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2022-2995
Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive
No latest release note
Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
2024-04-15 - -
Release Month
April 2023
1 CVE | last update 1 day(s) ago
Release 2023-04-21 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-24626
socket.c in GNU Screen through 4.9.0 when installed setuid or setgid (the default on platforms such as Arch Linux and FreeBSD) allows local users to send a privileged SIGHUP signal to any PID causing a
No latest release note
socket.c in GNU Screen through 4.9.0 when installed setuid or setgid (the default on platforms such as Arch Linux and FreeBSD) allows local users to send a privileged SIGHUP signal to any PID causing a denial of service or disruption of the target process.
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
2023-04-21 - -