Msrc Windows 10 Version 2004 For 32-Bit Systems vulnerabilities
160 known vulnerabilities affecting msrc/windows_10_version_2004_for_32-bit_systems.
Total CVEs
160
CISA KEV
9
actively exploited
Public exploits
4
Exploited in wild
9
Severity breakdown
CRITICAL1HIGH111MEDIUM47LOW1
Vulnerabilities
Page 1 of 8
CVE-2021-43237HIGHCVSS 7.82021-12-14
CVE-2021-43237 [HIGH] Windows Setup Elevation of Privilege Vulnerability
Windows Setup Elevation of Privilege Vulnerability
Windows Update Stack: Windows Update Stack
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008206
Reference: https://catalog.update.micro
msrc
CVE-2021-43239HIGHCVSS 7.12021-12-14
CVE-2021-43239 [HIGH] Windows Recovery Environment Agent Elevation of Privilege Vulnerability
Windows Recovery Environment Agent Elevation of Privilege Vulnerability
Windows Update Stack: Windows Update Stack
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB500821
msrc
CVE-2021-43240HIGHCVSS 7.82021-12-14
CVE-2021-43240 [HIGH] NTFS Set Short Name Elevation of Privilege Vulnerability
NTFS Set Short Name Elevation of Privilege Vulnerability
Windows NTFS: Windows NTFS
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008206
Reference: https://catalog.update.microsof
msrc
CVE-2021-42286HIGHCVSS 7.82021-11-09
CVE-2021-42286 [HIGH] Windows Core Shell SI Host Extension Framework for Composable Shell Elevation of Privilege Vulnerability
Windows Core Shell SI Host Extension Framework for Composable Shell Elevation of Privilege Vulnerability
Windows Core Shell: Windows Core Shell
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less L
msrc
CVE-2021-42288MEDIUMCVSS 5.72021-11-09
CVE-2021-42288 [MEDIUM] Windows Hello Security Feature Bypass Vulnerability
Windows Hello Security Feature Bypass Vulnerability
Windows Hello: Windows Hello
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Security Feature Bypass
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5007206
Reference: https://suppor
msrc
CVE-2021-41330HIGHCVSS 7.82021-10-12
CVE-2021-41330 [HIGH] Microsoft Windows Media Foundation Remote Code Execution Vulnerability
Microsoft Windows Media Foundation Remote Code Execution Vulnerability
Microsoft Windows Codecs Library: Microsoft Windows Codecs Library
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/S
msrc
CVE-2021-41334HIGHCVSS 7.02021-10-12
CVE-2021-41334 [HIGH] Windows Desktop Bridge Elevation of Privilege Vulnerability
Windows Desktop Bridge Elevation of Privilege Vulnerability
Windows Desktop Bridge: Windows Desktop Bridge
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006670
Reference: https:
msrc
CVE-2021-41357HIGHCVSS 7.8KEV2021-10-12
CVE-2021-41357 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Windows Win32K: Windows Win32K
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006670
Reference: https://support.microsoft.com/help/5006670
Reference:
msrc
CVE-2021-41346MEDIUMCVSS 5.32021-10-12
CVE-2021-41346 [MEDIUM] Console Window Host Security Feature Bypass Vulnerability
Console Window Host Security Feature Bypass Vulnerability
Console Window Host: Console Window Host
Microsoft: Microsoft
Impact: Security Feature Bypass
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006670
Reference: https://suppo
msrc
CVE-2021-41339MEDIUMCVSS 4.72021-10-12
CVE-2021-41339 [MEDIUM] Microsoft DWM Core Library Elevation of Privilege Vulnerability
Microsoft DWM Core Library Elevation of Privilege Vulnerability
Windows DWM Core Library: Windows DWM Core Library
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006667
Ref
msrc
CVE-2021-40468MEDIUMCVSS 5.52021-10-12
CVE-2021-40468 [MEDIUM] Windows Bind Filter Driver Information Disclosure Vulnerability
Windows Bind Filter Driver Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Windows Bind Filter Driver: Windows Bind Filter Driver
msrc
CVE-2021-36966HIGHCVSS 7.82021-09-14
CVE-2021-36966 [HIGH] Windows Subsystem for Linux Elevation of Privilege Vulnerability
Windows Subsystem for Linux Elevation of Privilege Vulnerability
Windows Subsystem for Linux: Windows Subsystem for Linux
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB500556
msrc
CVE-2021-36948HIGHCVSS 7.8KEV2021-08-10
CVE-2021-36948 [HIGH] Windows Update Medic Service Elevation of Privilege Vulnerability
Windows Update Medic Service Elevation of Privilege Vulnerability
Windows Update: Windows Update
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:Yes;Latest Software Release:Exploitation Detected;Older Software Release:Exploitation Detected;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030
Reference: https://support
msrc
CVE-2021-26431HIGHCVSS 7.82021-08-10
CVE-2021-26431 [HIGH] Windows Recovery Environment Agent Elevation of Privilege Vulnerability
Windows Recovery Environment Agent Elevation of Privilege Vulnerability
Windows Update Assistant: Windows Update Assistant
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=
msrc
CVE-2021-34486HIGHCVSS 7.8KEV2021-08-10
CVE-2021-34486 [HIGH] Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing: Windows Event Tracing
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030
Reference: https://su
msrc
CVE-2021-33785HIGHCVSS 7.52021-07-13
CVE-2021-33785 [HIGH] Windows AF_UNIX Socket Provider Denial of Service Vulnerability
Windows AF_UNIX Socket Provider Denial of Service Vulnerability
Windows AF_UNIX Socket Provider: Windows AF_UNIX Socket Provider
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB50042
msrc
CVE-2021-33774HIGHCVSS 7.02021-07-13
CVE-2021-33774 [HIGH] Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing: Windows Event Tracing
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004244
Reference: https://su
msrc
CVE-2021-33740HIGHCVSS 7.82021-07-13
CVE-2021-33740 [HIGH] Windows Media Remote Code Execution Vulnerability
Windows Media Remote Code Execution Vulnerability
Microsoft Windows Codecs Library: Microsoft Windows Codecs Library
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004244
Reference: https:/
msrc
CVE-2021-34438HIGHCVSS 7.82021-07-13
CVE-2021-34438 [HIGH] Windows Font Driver Host Remote Code Execution Vulnerability
Windows Font Driver Host Remote Code Execution Vulnerability
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004244
Refe
msrc
CVE-2021-33772HIGHCVSS 7.52021-07-13
CVE-2021-33772 [HIGH] Windows TCP/IP Driver Denial of Service Vulnerability
Windows TCP/IP Driver Denial of Service Vulnerability
Windows TCP/IP: Windows TCP/IP
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004237
Reference: https://support.microsoft.com/help/5004
msrc
1 / 8Next →