Analyst command view

MSRC Driver CVE Board

Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.

Live snapshot
Last Sync
2026-05-20T07:39:30Z
Freshness
1 day(s) ago
Refresh Policy
24h baseline + release watch
Storage
Latest snapshot only
Rows In View
42
Current result set after filter and search.
Exploited Flagged
37
Rows with a non-empty exploitation signal.
Distinct CWE
4
Unique weakness classes in this view.
Modules
27
Unique inferred driver or component labels.
Reset
Active filters CWE CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') Clear filters
Release Month
May 2026
2 CVE | last update 1 day(s) ago
Release 2026-05-12 Patch Tuesday Count 2
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2026-35417
Windows Win32k
Exploitation More Likely
Windows Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2026-05-12 No
Reported By
Owen McCullough
CVE-2026-34344
Windows Ancillary Function Driver for WinSock
Exploitation Less Likely
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2026-05-12 No
Reported By
Release Month
April 2026
2 CVE | last update 1 day(s) ago
Release 2026-04-14 Patch Tuesday Count 2
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2026-26162
Windows OLE
Exploitation Less Likely
Windows OLE Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2026-04-14 No
Reported By
Hart Wilson with Microsoft
CVE-2026-20806
Windows COM Server
Exploitation Unlikely
Windows COM Server Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2026-04-14 No
Reported By
Pwnforr777
Release Month
February 2026
1 CVE | last update 1 day(s) ago
Release 2026-02-10 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2026-21519
Desktop Window Manager
Exploitation Detected
Desktop Window Manager Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2026-02-10 Yes
Reported By
Microsoft Threat Intelligence Center (MSTIC) & Microsoft Security Response Center (MSRC)
Release Month
January 2026
2 CVE | last update 1 day(s) ago
Release 2026-01-13 Patch Tuesday Count 2
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2026-20860
Windows Ancillary Function Driver for WinSock
Exploitation More Likely
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2026-01-13 No
Reported By
CVE-2026-20811
Win32k
Exploitation Less Likely
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2026-01-13 No
Reported By
Daniil Romanovych
Release Month
September 2025
1 CVE | last update 1 day(s) ago
Release 2025-09-09 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2025-55236
Graphics Kernel
Exploitation Less Likely
Graphics Kernel Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2025-09-09 No
Reported By
Release Month
August 2025
9 CVE | last update 1 day(s) ago
Release 2025-08-12 Patch Tuesday Count 9
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2025-53726
Windows Push Notifications Apps
Exploitation Unlikely
Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2025-08-12 No
Reported By
anonymous
CVE-2025-53725
Windows Push Notifications Apps
Exploitation Unlikely
Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2025-08-12 No
Reported By
Anonymous
CVE-2025-53724
Windows Push Notifications Apps
Exploitation Unlikely
Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2025-08-12 No
Reported By
Anonymous
CVE-2025-50155
Windows Push Notifications Apps
Exploitation Unlikely
Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2025-08-12 No
Reported By
Zhiniang Peng with HUST & R4nger with CyberKunLun
CVE-2025-50168
Win32k
Exploitation More Likely
Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2025-08-12 No
Reported By
Hyeonjin Choi (@d4m0n_8) of Out Of Bounds with Trend Zero Day Initiative
CVE-2025-53145
Microsoft Message Queuing (MSMQ)
Exploitation Less Likely
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2025-08-12 No
Reported By
CVE-2025-53144
Microsoft Message Queuing (MSMQ)
Exploitation Less Likely
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2025-08-12 No
Reported By
CVE-2025-53143
Microsoft Message Queuing (MSMQ)
Exploitation Less Likely
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2025-08-12 No
Reported By
CVE-2025-50176
DirectX Graphics Kernel
Exploitation Less Likely
DirectX Graphics Kernel Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2025-08-12 No
Reported By
b2ahex
cyanbamboo
Release Month
July 2025
1 CVE | last update 1 day(s) ago
Release 2025-07-08 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2025-48815
Windows Simple Search and Discovery Protocol (SSDP) Service
Exploitation Less Likely
Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2025-07-08 No
Reported By
Release Month
January 2025
2 CVE | last update 1 day(s) ago
Release 2025-01-14 Patch Tuesday Count 2
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2025-21225
Windows Remote Desktop Gateway (RD Gateway)
Exploitation Less Likely
Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2025-01-14 No
Reported By
ʌ!ↄ⊥ojv with Kunlun Lab
CVE-2025-21326
Internet Explorer
Exploitation Less Likely
Internet Explorer Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2025-01-14 No
Release Month
December 2024
1 CVE | last update 1 day(s) ago
Release 2024-12-10 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-49119
Windows Remote Desktop Services
Exploitation Less Likely
Windows Remote Desktop Services Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-12-10 No
Reported By
VictorV(Tang tianwen) with Kunlun Lab
SmallerDragon
Nikolai Skliarenko with Trend Micro
Release Month
September 2024
1 CVE | last update 1 day(s) ago
Release 2024-09-25 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-6119
Possible
No latest release note
Possible denial of service in X.509 name checks
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2024-09-25 - -
Release Month
May 2024
1 CVE | last update 1 day(s) ago
Release 2024-05-14 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-30034
Windows Cloud Files Mini Filter Driver
Exploitation More Likely
Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2024-05-14 No
Reported By
Wei Lei and Sergey Kornienko (@b1thvn_) of PixiePoint Security working with Trend Micro Zero Day Initiative
Release Month
April 2024
2 CVE | last update 1 day(s) ago
Release 2024-04-09 Patch Tuesday Count 2
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-20678
Remote Procedure Call Runtime
Exploitation Less Likely
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-04-09 No
Reported By
Microsoft Offensive Research & Security Engineering with Microsoft
CVE-2024-26232
Microsoft Message Queuing (MSMQ)
Exploitation Less Likely
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-04-09 No
Reported By
Release Month
February 2024
2 CVE | last update 1 day(s) ago
Release 2024-02-13 Patch Tuesday Count 2
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-21357
Windows Pragmatic General Multicast (PGM)
Exploitation More Likely
Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-02-13 No
Reported By
Anonymous
CVE-2024-21363
Microsoft Message Queuing (MSMQ)
Exploitation Less Likely
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-02-13 No
Reported By
Release Month
January 2024
1 CVE | last update 1 day(s) ago
Release 2024-01-09 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-20662
Windows Online Certificate Status Protocol (OCSP)
Exploitation Less Likely
Windows Online Certificate Status Protocol (OCSP) Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2024-01-09 No
Reported By
Release Month
October 2023
2 CVE | last update 1 day(s) ago
Release 2023-10-10 Patch Tuesday Count 2
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-36594
Windows Graphics Component
Exploitation More Likely
Windows Graphics Component Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-10-10 No
Reported By
CVE-2023-36578
Microsoft Message Queuing (MSMQ)
Exploitation Less Likely
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-10-10 No
Reported By
Release Month
July 2023
2 CVE | last update 1 day(s) ago
Release 2023-07-11 Patch Tuesday Count 2
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-35297
Windows Pragmatic General Multicast (PGM)
Exploitation Less Likely
Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-07-11 No
Reported By
Anonymous
CVE-2023-35356
Windows Kernel
Exploitation Less Likely
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-07-11 No
Reported By
Mateusz Jurczyk of Google Project Zero
Release Month
May 2023
1 CVE | last update 1 day(s) ago
Release 2023-05-09 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-24944
Windows Bluetooth Driver
Exploitation Less Likely
Windows Bluetooth Driver Information Disclosure Vulnerability
CVSS vector: AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2023-05-09 No
Reported By
Keqi Hu
Bryan Gonzalez from Ocelot Team @ Metabase Q
Release Month
April 2023
4 CVE | last update 1 day(s) ago
Release 2023-04-11 Patch Tuesday Count 4
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-28243
Microsoft PostScript and PCL6 Class Printer Driver
Exploitation Less Likely
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-04-11 No
Reported By
kap0k
CVE-2023-24929
Microsoft PostScript and PCL6 Class Printer Driver
Exploitation Less Likely
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-04-11 No
Reported By
kap0k
CVE-2023-24927
Microsoft PostScript and PCL6 Class Printer Driver
Exploitation Less Likely
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-04-11 No
Reported By
kap0k
CVE-2023-24885
Microsoft PostScript and PCL6 Class Printer Driver
Exploitation Less Likely
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-04-11 No
Reported By
kap0k
Release Month
January 2023
3 CVE | last update 1 day(s) ago
Release 2023-01-21 Other / OOB Count 2
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-23454
cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a
No latest release note
cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
2023-01-21 - -
CVE-2023-23455
atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a
No latest release note
atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
2023-01-21 - -
Release 2023-01-10 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-21675
Windows Kernel
Exploitation Less Likely
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-01-10 No
Reported By
Mateusz Jurczyk of Google Project Zero
Release Month
April 2022
1 CVE | last update 1 day(s) ago
Release 2022-04-14 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2021-44647
Lua v5.4.3 and above are affected by SEGV by type confusion in funcnamefromcode function in ldebug.c which can cause a local
No latest release note
Lua v5.4.3 and above are affected by SEGV by type confusion in funcnamefromcode function in ldebug.c which can cause a local denial of service.
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
2022-04-14 - -
Release Month
January 2021
1 CVE | last update 1 day(s) ago
Release 2021-01-30 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2020-36229
A flaw was discovered in ldap_X509dn2bv in OpenLDAP before 2.4.57 leading to a slapd crash in the X.509 DN parsing in ad_keystring resulting in
No latest release note
A flaw was discovered in ldap_X509dn2bv in OpenLDAP before 2.4.57 leading to a slapd crash in the X.509 DN parsing in ad_keystring resulting in denial of service.
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2021-01-30 - -