Analyst command view

MSRC Driver CVE Board

Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.

Live snapshot
Last Sync
2026-05-22T10:50:34Z
Freshness
5 hour(s) ago
Refresh Policy
24h baseline + release watch
Storage
Latest snapshot only
Rows In View
4943
Current result set after filter and search.
Exploited Flagged
4193
Rows with a non-empty exploitation signal.
Distinct CWE
162
Unique weakness classes in this view.
Modules
1535
Unique inferred driver or component labels.
Reset
Release Month
November 2024
27 CVE | last update 5 hour(s) ago
Release 2024-11-12 Patch Tuesday Count 26
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-43642
Windows SMB
Exploitation More Likely
Windows SMB Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2024-11-12 No
Reported By
Andrew Ruddick with Microsoft Red Team
CVE-2024-43625
Microsoft Windows VMSwitch
Exploitation Less Likely
Microsoft Windows VMSwitch Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-11-12 No
Reported By
Henry Wang with Microsoft Offensive Research and Security Engineering (MORSE)
CVE-2024-43447
Windows SMBv3 Server
Exploitation Less Likely
Windows SMBv3 Server Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-11-12 No
Reported By
Anonymous
CVE-2024-43640
Windows Kernel-Mode Driver
Exploitation Less Likely
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-11-12 No
Reported By
Kam Reypour
CVE-2024-49046
Windows Win32 Kernel Subsystem
Exploitation Less Likely
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-11-12 No
Reported By
Joe Bialek with Microsoft
CVE-2024-43452
Windows Registry
Exploitation Less Likely
Windows Registry Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-11-12 No
Reported By
Mateusz Jurczyk with Google Project Zero
CVE-2024-49039
Windows Task Scheduler
Exploitation Detected
Windows Task Scheduler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C
2024-11-12 Yes
Reported By
Anonymous
Vlad Stolyarov and Bahare Sabouri of Google's Threat Analysis Group
Mozilla Security Team
CVE-2024-43530
Windows Update Stack
Exploitation Less Likely
Windows Update Stack Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-11-12 No
Reported By
CHEN QINGYANG with Topsec Alpha Team
CVE-2024-43639
Windows KDC Proxy
Exploitation Less Likely
Windows KDC Proxy Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-11-12 No
Reported By
Wei in Kunlun Lab with Cyber KunLun
k0shl with Kunlun Lab
CVE-2024-43635
Windows Telephony Service
Exploitation Less Likely
Windows Telephony Service Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-11-12 No
Reported By
Anonymous
CVE-2024-43628
Windows Telephony Service
Exploitation Less Likely
Windows Telephony Service Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-11-12 No
Reported By
Anonymous
CVE-2024-43641
Windows Registry
Exploitation Less Likely
Windows Registry Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-11-12 No
Reported By
Mateusz Jurczyk with Google Project Zero
CVE-2024-43623
Windows NT OS Kernel
Exploitation More Likely
Windows NT OS Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-11-12 No
Reported By
Anonymous
CVE-2024-49019
Active Directory Certificate Services
Exploitation More Likely
Active Directory Certificate Services Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-11-12 No
CVE-2024-43643
Windows USB Video Class System Driver
Exploitation Less Likely
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
CVSS vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-11-12 No
Reported By
Adel from MSRC V&M
CVE-2024-43638
Windows USB Video Class System Driver
Exploitation Less Likely
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
CVSS vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-11-12 No
Reported By
Zhihua Wen with CyberKunLun
CVE-2024-43637
Windows USB Video Class System Driver
Exploitation Less Likely
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
CVSS vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-11-12 No
Reported By
Zhihua Wen with CyberKunLun
CVE-2024-43634
Windows USB Video Class System Driver
Exploitation Less Likely
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
CVSS vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-11-12 No
Reported By
Zhihua Wen with CyberKunLun
CVE-2024-43449
Windows USB Video Class System Driver
Exploitation Less Likely
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
CVSS vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-11-12 No
Reported By
Adel from MSRC V&M
CVE-2024-43644
Windows Client-Side Caching
Exploitation Less Likely
Windows Client-Side Caching Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-11-12 No
Reported By
Anonymous
CVE-2024-43627
Windows Telephony Service
Exploitation Less Likely
Windows Telephony Service Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-11-12 No
Reported By
Anonymous
CVE-2024-43626
Windows Telephony Service
Exploitation Less Likely
Windows Telephony Service Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-11-12 No
CVE-2024-43622
Windows Telephony Service
Exploitation Less Likely
Windows Telephony Service Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-11-12 No
Reported By
Anonymous
CVE-2024-43621
Windows Telephony Service
Exploitation Less Likely
Windows Telephony Service Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-11-12 No
Reported By
Anonymous
CVE-2024-43620
Windows Telephony Service
Exploitation Less Likely
Windows Telephony Service Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-11-12 No
Reported By
Anonymous
CVE-2024-43630
Windows Kernel
Exploitation More Likely
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-11-12 No
Reported By
Anonymous
RanchoIce
Release 2024-11-09 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-47554
Apache Commons IO: Possible
No latest release note
Apache Commons IO: Possible denial of service attack on untrusted input to XmlStreamReader
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
2024-11-09 - -
Release Month
October 2024
23 CVE | last update 5 hour(s) ago
Release 2024-10-16 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-42934
OpenIPMI before 2.0.36 has an out-of-bounds array access (for authentication type) in the ipmi_sim simulator resulting in
No latest release note
OpenIPMI before 2.0.36 has an out-of-bounds array access (for authentication type) in the ipmi_sim simulator resulting in denial of service or (with very low probability) authentication bypass or code execution.
CVSS vector: AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
2024-10-16 - -
Release 2024-10-15 Other / OOB Count 7
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-45506
HAProxy 2.9.x before 2.9.10 3.0.x before 3.0.4 and 3.1.x through 3.1-dev6 allows a remote
No latest release note
HAProxy 2.9.x before 2.9.10 3.0.x before 3.0.4 and 3.1.x through 3.1-dev6 allows a remote denial of service for HTTP/2 zero-copy forwarding (h2_send loop) under a certain set of conditions as exploited in the wild in 2024.
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2024-10-15 - -
CVE-2024-6345
pypa/setuptools
No latest release note
Remote Code Execution in pypa/setuptools
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
2024-10-15 - -
CVE-2020-14323
A null pointer dereference flaw was found in samba's Winbind service in versions before 4.11.15 before 4.12.9 and before 4.13.1. A local user could use this flaw to crash the winbind service causing
No latest release note
A null pointer dereference flaw was found in samba's Winbind service in versions before 4.11.15 before 4.12.9 and before 4.13.1. A local user could use this flaw to crash the winbind service causing denial of service.
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
2024-10-15 - -
CVE-2024-45590
body-parser vulnerable to
No latest release note
body-parser vulnerable to denial of service when url encoding is enabled
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2024-10-15 - -
CVE-2023-50966
erlang-jose (aka JOSE for Erlang and Elixir) through 1.11.6 allow attackers to cause a
No latest release note
erlang-jose (aka JOSE for Erlang and Elixir) through 1.11.6 allow attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value in a JOSE header.
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
2024-10-15 - -
CVE-2024-39908
REXML
No latest release note
Denial of service in REXML
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
2024-10-15 - -
CVE-2022-3437
A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory when presented with a maliciously small packet. This flaw allows a remote user to send specially crafted malicious data to the application possibly resulting in a
No latest release note
A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory when presented with a maliciously small packet. This flaw allows a remote user to send specially crafted malicious data to the application possibly resulting in a denial of service (DoS) attack.
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
2024-10-15 - -
Release 2024-10-10 Other / OOB Count 2
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-33655
The DNS protocol in RFC 1035 and updates allows remote attackers to cause a
No latest release note
The DNS protocol in RFC 1035 and updates allows remote attackers to cause a denial of service (resource consumption) by arranging for DNS queries to be accumulated for seconds such that responses are later sent in a pulsing burst (which can be considered traffic amplification in some cases) aka the "DNSBomb" issue.
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2024-10-10 - -
CVE-2024-8508
Unbounded name compression could lead to
No latest release note
Unbounded name compression could lead to Denial of Service
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
2024-10-10 - -
Release 2024-10-08 Patch Tuesday Count 13
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2024-43537
Windows Mobile Broadband Driver
Exploitation Less Likely
Windows Mobile Broadband Driver Denial of Service Vulnerability
CVSS vector: AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2024-10-08 No
Reported By
Adam Hassan with Microsoft Offensive Research & Security Engineering
CVE-2024-43502
Windows Kernel
Exploitation More Likely
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
2024-10-08 No
Reported By
Florian Schweins
CVE-2024-43468
Microsoft Configuration Manager
Exploitation Less Likely
Microsoft Configuration Manager Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-10-08 No
Reported By
CVE-2024-43512
Windows Standards-Based Storage Management Service
Exploitation Less Likely
Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2024-10-08 No
Reported By
CVE-2024-43516
Windows Secure Kernel Mode
Exploitation Less Likely
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-10-08 No
Reported By
Maxime Villard, of M.O.R.S.E.
CVE-2024-43529
Windows Print Spooler
Exploitation Less Likely
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-10-08 No
Reported By
Florian Schweins
CVE-2024-37979
Windows Kernel
Exploitation Less Likely
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-10-08 No
Reported By
Netanel Ben Simon with Microsoft Offensive Research & Security Engineering
CVE-2024-43553
NT OS Kernel
Exploitation Less Likely
NT OS Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-10-08 No
Reported By
Thomas Imbert with Synacktiv
Anonymous
CVE-2024-43567
Windows Hyper-V
Exploitation Less Likely
Windows Hyper-V Denial of Service Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2024-10-08 No
Reported By
CVE-2024-43572
Microsoft Management Console
Exploitation Detected
Microsoft Management Console Remote Code Execution Vulnerability
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
2024-10-08 Yes
Reported By
Andres and Shady
CVE-2024-43532
Remote Registry Service
Exploitation Less Likely
Remote Registry Service Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-10-08 No
Reported By
Stiv Kupchik with Akamai
CVE-2024-43543
Windows Mobile Broadband Driver
Exploitation Less Likely
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVSS vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-10-08 No
Reported By
Microsoft Offensive Research & Security Engineering with Microsoft
CVE-2024-43536
Windows Mobile Broadband Driver
Exploitation Less Likely
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVSS vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2024-10-08 No
Reported By
Zhihua Wen with CyberKunLun
Prev Page 29 / 99 | rows 1401-1450 of 4943 Next