Msrc Windows 10 Version 2004 vulnerabilities

754 known vulnerabilities affecting msrc/windows_10_version_2004.

Total CVEs
754
CISA KEV
18
actively exploited
Public exploits
6
Exploited in wild
19
Severity breakdown
CRITICAL8HIGH559MEDIUM186LOW1

Vulnerabilities

Page 4 of 38
CVE-2021-40466HIGHCVSS 7.82021-10-12
CVE-2021-40466 [HIGH] Windows Common Log File System Driver Elevation of Privilege Vulnerability Windows Common Log File System Driver Elevation of Privilege Vulnerability Windows Common Log File System Driver: Windows Common Log File System Driver Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A Reference: https://catalog.update.micr
msrc
CVE-2021-26441HIGHCVSS 7.82021-10-12
CVE-2021-26441 [HIGH] Storage Spaces Controller Elevation of Privilege Vulnerability Storage Spaces Controller Elevation of Privilege Vulnerability FAQ: How could an attacker exploit this vulnerability? An authorized (medium integrity level) attacker could exploit this Windows Storport driver elevation of privilege vulnerability by locally sending through a user mode application a specially crafted request to the driver specifying an IOCTL parameter, which could lead to an out-of-bounds buffer
msrc
CVE-2021-36953HIGHCVSS 7.52021-10-12
CVE-2021-36953 [HIGH] Windows TCP/IP Denial of Service Vulnerability Windows TCP/IP Denial of Service Vulnerability Windows TCP/IP: Windows TCP/IP Microsoft: Microsoft Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006672 Reference: https://support.microsoft.com/help/5006672 Reference
msrc
CVE-2021-40465HIGHCVSS 7.82021-10-12
CVE-2021-40465 [HIGH] Windows Text Shaping Remote Code Execution Vulnerability Windows Text Shaping Remote Code Execution Vulnerability Windows Text Shaping: Windows Text Shaping Microsoft: Microsoft Impact: Remote Code Execution Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006672 Reference: https://support.m
msrc
CVE-2021-40462HIGHCVSS 7.82021-10-12
CVE-2021-40462 [HIGH] Windows Media Foundation Dolby Digital Atmos Decoders Remote Code Execution Vulnerability Windows Media Foundation Dolby Digital Atmos Decoders Remote Code Execution Vulnerability Microsoft Windows Codecs Library: Microsoft Windows Codecs Library Microsoft: Microsoft Impact: Remote Code Execution Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://
msrc
CVE-2021-40467HIGHCVSS 7.82021-10-12
CVE-2021-40467 [HIGH] Windows Common Log File System Driver Elevation of Privilege Vulnerability Windows Common Log File System Driver Elevation of Privilege Vulnerability Windows Common Log File System Driver: Windows Common Log File System Driver Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A Reference: https://catalog.update.micr
msrc
CVE-2021-40489HIGHCVSS 7.82021-10-12
CVE-2021-40489 [HIGH] Storage Spaces Controller Elevation of Privilege Vulnerability Storage Spaces Controller Elevation of Privilege Vulnerability FAQ: How could an attacker exploit this vulnerability? An authorized (medium integrity level) attacker could exploit this Windows Storport driver elevation of privilege vulnerability by locally sending through a user mode application a specially crafted request to the driver specifying an IOCTL parameter, which could lead to an out-of-bounds buffer
msrc
CVE-2021-40443HIGHCVSS 7.82021-10-12
CVE-2021-40443 [HIGH] Windows Common Log File System Driver Elevation of Privilege Vulnerability Windows Common Log File System Driver Elevation of Privilege Vulnerability Windows Common Log File System Driver: Windows Common Log File System Driver Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A Reference: https://catalog.update.micr
msrc
CVE-2021-41340HIGHCVSS 7.82021-10-12
CVE-2021-41340 [HIGH] Windows Graphics Component Remote Code Execution Vulnerability Windows Graphics Component Remote Code Execution Vulnerability FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of the vulnerability requires that a user open a specially crafted file. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user t
msrc
CVE-2021-40475MEDIUMCVSS 5.52021-10-12
CVE-2021-40475 [MEDIUM] Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process. Windows Cloud Files Mini Filter
msrc
CVE-2021-40460MEDIUMCVSS 6.52021-10-12
CVE-2021-40460 [MEDIUM] Windows Remote Procedure Call Runtime Security Feature Bypass Vulnerability Windows Remote Procedure Call Runtime Security Feature Bypass Vulnerability FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? This vulnerability could allow an attacker to bypass Extended Protection for Authentication provided by SPN target name validation. Windows Remote Procedure Call Runtime: Windows Remote Procedure Call Runtime Microsoft: M
msrc
CVE-2021-38662MEDIUMCVSS 5.52021-10-12
CVE-2021-38662 [MEDIUM] Windows Fast FAT File System Driver Information Disclosure Vulnerability Windows Fast FAT File System Driver Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process. Windows Fast FAT Driver: Windows Fast
msrc
CVE-2021-40455MEDIUMCVSS 5.52021-10-12
CVE-2021-40455 [MEDIUM] Windows Installer Spoofing Vulnerability Windows Installer Spoofing Vulnerability Windows Installer: Windows Installer Microsoft: Microsoft Impact: Spoofing Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006672 Reference: https://support.microsoft.com/help/5006672 Reference: https://cat
msrc
CVE-2021-38663MEDIUMCVSS 5.52021-10-12
CVE-2021-38663 [MEDIUM] Windows exFAT File System Information Disclosure Vulnerability Windows exFAT File System Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory. Windows exFAT File System: Windows exFAT File System Microsoft: Microsoft Impact: Information Disclosure Exploit Status: Publicly Disclosed:No;
msrc
CVE-2021-41342MEDIUMCVSS 6.82021-10-12
CVE-2021-41342 [MEDIUM] Windows MSHTML Platform Remote Code Execution Vulnerability Windows MSHTML Platform Remote Code Execution Vulnerability FAQ: The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows. Why are IE Cumulative updates listed for Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows Server 2012, Windows 8.1, and Windows Server 2012 R2? While Microsoft has announced retirement of the Internet Explorer 11 applicat
msrc
CVE-2021-40454MEDIUMCVSS 5.52021-10-12
CVE-2021-40454 [MEDIUM] Rich Text Edit Control Information Disclosure Vulnerability Rich Text Edit Control Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? An attacker that successfully exploited this vulnerability could recover cleartext passwords from memory. Rich Text Edit Control: Rich Text Edit Control Microsoft: Microsoft Impact: Information Disclosure Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release
msrc
CVE-2021-41343MEDIUMCVSS 5.52021-10-12
CVE-2021-41343 [MEDIUM] Windows Fast FAT File System Driver Information Disclosure Vulnerability Windows Fast FAT File System Driver Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process. Windows Fast FAT Driver: Windows Fast
msrc
CVE-2021-41338MEDIUMCVSS 5.52021-10-12
CVE-2021-41338 [MEDIUM] Windows AppContainer Firewall Rules Security Feature Bypass Vulnerability Windows AppContainer Firewall Rules Security Feature Bypass Vulnerability Windows AppContainer: Windows AppContainer Microsoft: Microsoft Impact: Security Feature Bypass Exploit Status: Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=
msrc
CVE-2021-41332MEDIUMCVSS 6.52021-10-12
CVE-2021-41332 [MEDIUM] Windows Print Spooler Information Disclosure Vulnerability Windows Print Spooler Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory. Windows Print Spooler Components: Windows Print Spooler Components Microsoft: Microsoft Impact: Information Disclosure Exploit Status: Publicly Disclos
msrc
CVE-2021-36975HIGHCVSS 7.82021-09-14
CVE-2021-36975 [HIGH] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Windows Win32K: Windows Win32K Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568 Reference: https://support.microsoft.com/help/5005568 Reference:
msrc