Microsoft Windows Server Version 2004 vulnerabilities

747 known vulnerabilities affecting microsoft/windows_server_version_2004.

Total CVEs
747
CISA KEV
27
actively exploited
Public exploits
10
Exploited in wild
28
Severity breakdown
CRITICAL32HIGH535MEDIUM177LOW3

Vulnerabilities

Page 29 of 38
CVE-2020-16912HIGHCVSS 7.8≥ 10.0.0, < publication2020-10-16
CVE-2020-16912 [HIGH] CVE-2020-16912: <p>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting ho
nvd
CVE-2020-16896HIGHCVSS 7.5≥ 10.0.0, < publication2020-10-16
CVE-2020-16896 [HIGH] CVE-2020-16896: <p>An information disclosure vulnerability exists in Remote Desktop Protocol (RDP) when an attacker An information disclosure vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would need to run a
nvd
CVE-2020-16891HIGHCVSS 8.8≥ 10.0.0, < publication2020-10-16
CVE-2020-16891 [HIGH] CWE-20 CVE-2020-16891: <p>A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to prope A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrar
nvd
CVE-2020-16913HIGHCVSS 7.8≥ 10.0.0, < publication2020-10-16
CVE-2020-16913 [HIGH] CVE-2020-16913: <p>An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fai An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To expl
nvd
CVE-2020-16887HIGHCVSS 7.8≥ 10.0.0, < publication2020-10-16
CVE-2020-16887 [HIGH] CVE-2020-16887: <p>An elevation of privilege vulnerability exists in the way that the Windows Network Connections Se An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update ad
nvd
CVE-2020-1080HIGHCVSS 7.8≥ 10.0.0, < publication2020-10-16
CVE-2020-1080 [HIGH] CVE-2020-1080: <p>An elevation of privilege vulnerability exists when Windows Hyper-V on a host server fails to pro An elevation of privilege vulnerability exists when Windows Hyper-V on a host server fails to properly handle objects in memory. An attacker who successfully exploited these vulnerabilities could gain elevated privileges on a target operating system. This vulnerability by itself does not allow arbitrary code to be run. However, this vulnerability could be used
nvd
CVE-2020-16876HIGHCVSS 7.8≥ 10.0.0, < publication2020-10-16
CVE-2020-16876 [HIGH] CVE-2020-16876: <p>An elevation of privilege vulnerability exists when the Windows Application Compatibility Client An elevation of privilege vulnerability exists when the Windows Application Compatibility Client Library improperly handles registry operations. An attacker who successfully exploited this vulnerability could gain elevated privileges. To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a spec
nvd
CVE-2020-16920HIGHCVSS 7.8≥ 10.0.0, < publication2020-10-16
CVE-2020-16920 [HIGH] CVE-2020-16920: <p>An elevation of privilege vulnerability exists when the Windows Application Compatibility Client An elevation of privilege vulnerability exists when the Windows Application Compatibility Client Library improperly handles registry operations. An attacker who successfully exploited this vulnerability could gain elevated privileges. To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a spec
nvd
CVE-2020-16899HIGHCVSS 7.5≥ 10.0.0, < publication2020-10-16
CVE-2020-16899 [HIGH] CVE-2020-16899: <p>A denial of service vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 A denial of service vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets. An attacker who successfully exploited this vulnerability could cause a target system to stop responding. To exploit this vulnerability, an attacker would have to send specially crafted ICMPv6 Router Advertisement packets to a remote W
nvd
CVE-2020-16974HIGHCVSS 7.8≥ 10.0.0, < publication2020-10-16
CVE-2020-16974 [HIGH] CVE-2020-16974: <p>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting ho
nvd
CVE-2020-16892HIGHCVSS 7.8≥ 10.0.0, < publication2020-10-16
CVE-2020-16892 [HIGH] CVE-2020-16892: <p>An elevation of privilege vulnerability exists in the way that the Windows kernel image handles o An elevation of privilege vulnerability exists in the way that the Windows kernel image handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vul
nvd
CVE-2020-16972HIGHCVSS 7.8≥ 10.0.0, < publication2020-10-16
CVE-2020-16972 [HIGH] CVE-2020-16972: <p>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting ho
nvd
CVE-2020-16924HIGHCVSS 7.8≥ 10.0.0, < publication2020-10-16
CVE-2020-16924 [HIGH] CVE-2020-16924: <p>A remote code execution vulnerability exists when the Windows Jet Database Engine improperly hand A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerabi
nvd
CVE-2020-16909HIGHCVSS 7.8≥ 10.0.0, < publication2020-10-16
CVE-2020-16909 [HIGH] CVE-2020-16909: <p>An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files. The vulnerability could allow elevation of privilege if an attacker can successfully exploit it. An attacker who successfully exploited the vulnerability could gain greater access to sensitive information and system functionality. To exploit the
nvd
CVE-2020-16877HIGHCVSS 7.1≥ 10.0.0, < publication2020-10-16
CVE-2020-16877 [HIGH] CVE-2020-16877: <p>An elevation of privilege vulnerability exists when Microsoft Windows improperly handles reparse An elevation of privilege vulnerability exists when Microsoft Windows improperly handles reparse points. An attacker who successfully exploited this vulnerability could overwrite or delete a targeted file that would normally require elevated permissions. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then
nvd
CVE-2020-16936HIGHCVSS 7.8≥ 10.0.0, < publication2020-10-16
CVE-2020-16936 [HIGH] CVE-2020-16936: <p>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting ho
nvd
CVE-2020-16973HIGHCVSS 7.8≥ 10.0.0, < publication2020-10-16
CVE-2020-16973 [HIGH] CVE-2020-16973: <p>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting ho
nvd
CVE-2020-16916HIGHCVSS 7.8≥ 10.0.0, < publication2020-10-16
CVE-2020-16916 [HIGH] CVE-2020-16916: <p>An elevation of privilege vulnerability exists when Windows improperly handles COM object creatio An elevation of privilege vulnerability exists when Windows improperly handles COM object creation. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that coul
nvd
CVE-2020-16927HIGHCVSS 7.5≥ 10.0.0, < publication2020-10-16
CVE-2020-16927 [HIGH] CVE-2020-16927: <p>A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connec A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests. An attacker who successfully exploited this vulnerability could cause the RDP service on the target system to stop responding. To exploit this vulnerability, an attacker would need to run a sp
nvd
CVE-2020-16923HIGHCVSS 7.8≥ 10.0.0, < publication2020-10-16
CVE-2020-16923 [HIGH] CVE-2020-16923: <p>A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system. To exploit the vulnerability, a user would have to open a specially crafted file. The security update addresses the vulnerability by corre
nvd