Analyst command view

MSRC Driver CVE Board

Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.

Live snapshot
Last Sync
2026-05-20T07:39:30Z
Freshness
1 day(s) ago
Refresh Policy
24h baseline + release watch
Storage
Latest snapshot only
Rows In View
7
Current result set after filter and search.
Exploited Flagged
4
Rows with a non-empty exploitation signal.
Distinct CWE
1
Unique weakness classes in this view.
Modules
7
Unique inferred driver or component labels.
Reset
Active filters CWE CWE-862: Missing Authorization Clear filters
Release Month
May 2026
1 CVE | last update 1 day(s) ago
Release 2026-05-12 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2026-35438
Windows Admin Center
Exploitation Less Likely
Windows Admin Center Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H/E:U/RL:O/RC:C
2026-05-12 No
Reported By
Release Month
November 2025
1 CVE | last update 1 day(s) ago
Release 2025-11-11 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2025-30398
Nuance PowerScribe 360
Exploitation Less Likely
Nuance PowerScribe 360 Information Disclosure Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
2025-11-11 No
Reported By
Brandon Kraycirik
Release Month
January 2025
1 CVE | last update 1 day(s) ago
Release 2025-01-29 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2025-21396
Microsoft Account
N/A
Microsoft Account Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C
2025-01-29 No
Reported By
M1n9K1n9 with APT250
Release Month
October 2024
1 CVE | last update 1 day(s) ago
Release 2024-10-16 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-42934
OpenIPMI before 2.0.36 has an out-of-bounds array access (for authentication type) in the ipmi_sim simulator resulting in
No latest release note
OpenIPMI before 2.0.36 has an out-of-bounds array access (for authentication type) in the ipmi_sim simulator resulting in denial of service or (with very low probability) authentication bypass or code execution.
CVSS vector: AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
2024-10-16 - -
Release Month
July 2024
1 CVE | last update 1 day(s) ago
Release 2024-07-09 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-21417
Windows Text Services Framework
Exploitation Less Likely
Windows Text Services Framework Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-07-09 No -
Release Month
June 2021
1 CVE | last update 1 day(s) ago
Release 2021-06-08 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2020-10701
A missing authorization flaw was found in the libvirt API responsible for changing the QEMU agent response timeout. This flaw allows read-only connections to adjust the time that libvirt waits for the QEMU guest agent to respond to agent commands. Depending on the timeout value that is set this flaw can make guest agent commands fail because the agent cannot respond in time. Unprivileged users with a read-only connection could abuse this flaw to set the response timeout for all guest agent messages to zero potentially leading to a
No latest release note
A missing authorization flaw was found in the libvirt API responsible for changing the QEMU agent response timeout. This flaw allows read-only connections to adjust the time that libvirt waits for the QEMU guest agent to respond to agent commands. Depending on the timeout value that is set this flaw can make guest agent commands fail because the agent cannot respond in time. Unprivileged users with a read-only connection could abuse this flaw to set the response timeout for all guest agent messages to zero potentially leading to a denial of service. This flaw affects libvirt versions before 6.2.0.
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
2021-06-08 - -
Release Month
September 2020
1 CVE | last update 1 day(s) ago
Release 2020-09-25 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2019-3886
An incorrect permissions check was discovered in libvirt 4.8.0 and above. The readonly permission was allowed to invoke APIs depending on the guest agent which could lead to potentially disclosing unintended information or
No latest release note
An incorrect permissions check was discovered in libvirt 4.8.0 and above. The readonly permission was allowed to invoke APIs depending on the guest agent which could lead to potentially disclosing unintended information or denial of service by causing libvirt to block.
CVSS vector: AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
2020-09-25 - -