Msrc Windows 11 Version 21H2 vulnerabilities
1,324 known vulnerabilities affecting msrc/windows_11_version_21h2.
Total CVEs
1,324
CISA KEV
61
actively exploited
Public exploits
20
Exploited in wild
70
Severity breakdown
CRITICAL38HIGH978MEDIUM305LOW3
Vulnerabilities
Page 67 of 67
CVE-2021-38624MEDIUMCVSS 6.52021-09-14
CVE-2021-38624 [MEDIUM] Windows Key Storage Provider Security Feature Bypass Vulnerability
Windows Key Storage Provider Security Feature Bypass Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
A successful attacker could bypass the Windows Key Storage Provider which issues key certificates for trust in attestation scenarios.
Windows Key Storage Provider: Windows Key Storage Provider
Microsoft: Microsoft
Impact: Security Feature
msrc
CVE-2021-34527HIGHCVSS 8.8KEVPoC2021-07-13
CVE-2021-34527 [HIGH] Windows Print Spooler Remote Code Execution Vulnerability
Windows Print Spooler Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user
msrc
CVE-2021-33781HIGHCVSS 8.12021-07-13
CVE-2021-33781 [HIGH] Azure AD Security Feature Bypass Vulnerability
Azure AD Security Feature Bypass Vulnerability
Windows Active Directory: Windows Active Directory
Microsoft: Microsoft
Impact: Security Feature Bypass
Exploit Status: Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004244
Reference: https://support.microsoft.
msrc
CVE-2021-26414MEDIUMCVSS 4.82021-06-08
CVE-2021-26414 [MEDIUM] Windows DCOM Server Security Feature Bypass
Windows DCOM Server Security Feature Bypass
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
This vulnerability requires that a user with an affected version of Windows access a malicious server. An attacker would have to host a specially crafted server share or website. An attacker would have no way to force users to visit this specially crafted server share or
msrc
← Previous67 / 67