Msrc Windows 10 Version 2004 vulnerabilities
754 known vulnerabilities affecting msrc/windows_10_version_2004.
Total CVEs
754
CISA KEV
18
actively exploited
Public exploits
6
Exploited in wild
19
Severity breakdown
CRITICAL8HIGH559MEDIUM186LOW1
Vulnerabilities
Page 18 of 38
CVE-2021-1655HIGHCVSS 7.82021-01-12
CVE-2021-1655 [HIGH] Windows CSC Service Elevation of Privilege Vulnerability
Windows CSC Service Elevation of Privilege Vulnerability
Windows CSC Service: Windows CSC Service
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598242
msrc
CVE-2021-1648HIGHCVSS 7.82021-01-12
CVE-2021-1648 [HIGH] Microsoft splwow64 Elevation of Privilege Vulnerability
Microsoft splwow64 Elevation of Privilege Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
While this issue is labeled as an elevation of privilege, it can also be exploited to disclose information. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.
This CVE is marked as Publicly Disclosed. In what way wa
msrc
CVE-2021-1668HIGHCVSS 7.82021-01-12
CVE-2021-1668 [HIGH] Microsoft DTV-DVD Video Decoder Remote Code Execution Vulnerability
Microsoft DTV-DVD Video Decoder Remote Code Execution Vulnerability
Microsoft DTV-DVD Video Decoder: Microsoft DTV-DVD Video Decoder
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.m
msrc
CVE-2021-1688HIGHCVSS 7.82021-01-12
CVE-2021-1688 [HIGH] Windows CSC Service Elevation of Privilege Vulnerability
Windows CSC Service Elevation of Privilege Vulnerability
Windows CSC Service: Windows CSC Service
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598242
msrc
CVE-2021-1697HIGHCVSS 7.82021-01-12
CVE-2021-1697 [HIGH] Windows InstallService Elevation of Privilege Vulnerability
Windows InstallService Elevation of Privilege Vulnerability
Windows Installer: Windows Installer
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB459824
msrc
CVE-2021-1658HIGHCVSS 8.82021-01-12
CVE-2021-1658 [HIGH] Remote Procedure Call Runtime Remote Code Execution Vulnerability
Remote Procedure Call Runtime Remote Code Execution Vulnerability
Windows Remote Procedure Call Runtime: Windows Remote Procedure Call Runtime
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.
msrc
CVE-2021-1649HIGHCVSS 7.82021-01-12
CVE-2021-1649 [HIGH] Active Template Library Elevation of Privilege Vulnerability
Active Template Library Elevation of Privilege Vulnerability
Microsoft Windows: Microsoft Windows
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598
msrc
CVE-2021-1680HIGHCVSS 7.82021-01-12
CVE-2021-1680 [HIGH] Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
Windows Diagnostic Hub: Windows Diagnostic Hub
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.
msrc
CVE-2021-1665HIGHCVSS 7.82021-01-12
CVE-2021-1665 [HIGH] GDI+ Remote Code Execution Vulnerability
GDI+ Remote Code Execution Vulnerability
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598242
Reference: htt
msrc
CVE-2021-1653HIGHCVSS 7.82021-01-12
CVE-2021-1653 [HIGH] Windows CSC Service Elevation of Privilege Vulnerability
Windows CSC Service Elevation of Privilege Vulnerability
Windows CSC Service: Windows CSC Service
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598242
msrc
CVE-2021-1667HIGHCVSS 8.82021-01-12
CVE-2021-1667 [HIGH] Remote Procedure Call Runtime Remote Code Execution Vulnerability
Remote Procedure Call Runtime Remote Code Execution Vulnerability
Windows Remote Procedure Call Runtime: Windows Remote Procedure Call Runtime
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.
msrc
CVE-2021-1674HIGHCVSS 8.82021-01-12
CVE-2021-1674 [HIGH] Windows Remote Desktop Protocol Core Security Feature Bypass Vulnerability
Windows Remote Desktop Protocol Core Security Feature Bypass Vulnerability
Windows Remote Desktop: Windows Remote Desktop
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Security Feature Bypass
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.mic
msrc
CVE-2021-1701HIGHCVSS 8.82021-01-12
CVE-2021-1701 [HIGH] Remote Procedure Call Runtime Remote Code Execution Vulnerability
Remote Procedure Call Runtime Remote Code Execution Vulnerability
Windows Remote Procedure Call Runtime: Windows Remote Procedure Call Runtime
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.
msrc
CVE-2021-1695HIGHCVSS 7.82021-01-12
CVE-2021-1695 [HIGH] Windows Print Spooler Elevation of Privilege Vulnerability
Windows Print Spooler Elevation of Privilege Vulnerability
Windows Print Spooler Components: Windows Print Spooler Components
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7
msrc
CVE-2021-1650HIGHCVSS 7.82021-01-12
CVE-2021-1650 [HIGH] Windows Runtime C++ Template Library Elevation of Privilege Vulnerability
Windows Runtime C++ Template Library Elevation of Privilege Vulnerability
Microsoft Windows: Microsoft Windows
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7
msrc
CVE-2021-1637MEDIUMCVSS 5.52021-01-12
CVE-2021-1637 [MEDIUM] Windows DNS Query Information Disclosure Vulnerability
Windows DNS Query Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.
Microsoft Windows DNS: Microsoft Windows DNS
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information Disclosure
Exploit Status: Publicly Disclos
msrc
CVE-2021-1676MEDIUMCVSS 5.52021-01-12
CVE-2021-1676 [MEDIUM] Windows NT Lan Manager Datagram Receiver Driver Information Disclosure Vulnerability
Windows NT Lan Manager Datagram Receiver Driver Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memo
msrc
CVE-2021-1708MEDIUMCVSS 5.72021-01-12
CVE-2021-1708 [MEDIUM] Windows GDI+ Information Disclosure Vulnerability
Windows GDI+ Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory.
Microsoft Graphics Component: Microsoft Graphics Component
Micro
msrc
CVE-2021-1699MEDIUMCVSS 5.52021-01-12
CVE-2021-1699 [MEDIUM] Windows (modem.sys) Information Disclosure Vulnerability
Windows (modem.sys) Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.
Microsoft Windows: Microsoft Windows
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information Disclosure
Exploit Status: Publicly Disclosed:N
msrc
CVE-2021-1696MEDIUMCVSS 5.52021-01-12
CVE-2021-1696 [MEDIUM] Windows Graphics Component Information Disclosure Vulnerability
Windows Graphics Component Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information Disclosure
msrc