Msrc Windows Server 2012 vulnerabilities
3,255 known vulnerabilities affecting msrc/windows_server_2012.
Total CVEs
3,255
CISA KEV
133
actively exploited
Public exploits
201
Exploited in wild
124
Severity breakdown
CRITICAL83HIGH2162MEDIUM978LOW32
Vulnerabilities
Page 95 of 163
CVE-2021-33754HIGHCVSS 8.02021-07-13
CVE-2021-33754 [HIGH] Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
Microsoft Windows DNS: Microsoft Windows DNS
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004244
Reference: https://support.mic
msrc
CVE-2021-34442HIGHCVSS 8.82021-07-13
CVE-2021-34442 [HIGH] Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: If my server is not configured to be a DNS server, it is vulnerable?
No, this vulnerability is only exploitable if the server is configured to be a DNS server.
Role: DNS Server: Role: DNS Server
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Softwa
msrc
CVE-2021-34456HIGHCVSS 7.82021-07-13
CVE-2021-34456 [HIGH] Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
Windows Remote Access Connection Manager: Windows Remote Access Connection Manager
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog
msrc
CVE-2021-34476HIGHCVSS 7.52021-07-13
CVE-2021-34476 [HIGH] Bowser.sys Denial of Service Vulnerability
Bowser.sys Denial of Service Vulnerability
Common Internet File System: Common Internet File System
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004244
Reference: https://support.microsoft.com/help/
msrc
CVE-2021-33746HIGHCVSS 8.02021-07-13
CVE-2021-33746 [HIGH] Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
Microsoft Windows DNS: Microsoft Windows DNS
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004244
Reference: https://support.mic
msrc
CVE-2021-33783MEDIUMCVSS 6.52021-07-13
CVE-2021-33783 [MEDIUM] Windows SMB Information Disclosure Vulnerability
Windows SMB Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is unauthorized file system access - reading from the file system.
Windows SMB: Windows SMB
Microsoft: Microsoft
Impact: Information Disclosure
Exploit Status: Publicly Disclosed:No;Exploited:No;L
msrc
CVE-2021-34500MEDIUMCVSS 6.32021-07-13
CVE-2021-34500 [MEDIUM] Windows Kernel Memory Information Disclosure Vulnerability
Windows Kernel Memory Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is Guest VM to Hyper-V host server - virtualization security boundary.
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could b
msrc
CVE-2021-33745MEDIUMCVSS 6.52021-07-13
CVE-2021-33745 [MEDIUM] Windows DNS Server Denial of Service Vulnerability
Windows DNS Server Denial of Service Vulnerability
FAQ: If my server is not configured to be a DNS server, it is vulnerable?
No, this vulnerability is only exploitable if the server is configured to be a DNS server.
Role: DNS Server: Role: DNS Server
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release
msrc
CVE-2021-34499MEDIUMCVSS 6.52021-07-13
CVE-2021-34499 [MEDIUM] Windows DNS Server Denial of Service Vulnerability
Windows DNS Server Denial of Service Vulnerability
Microsoft Windows DNS: Microsoft Windows DNS
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004244
Reference: https://support.microsoft.com
msrc
CVE-2021-34447MEDIUMCVSS 6.82021-07-13
CVE-2021-34447 [MEDIUM] Windows MSHTML Platform Remote Code Execution Vulnerability
Windows MSHTML Platform Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
This vulnerability requires that a user with an affected version of Windows access a malicious server. An attacker would have to host a specially crafted server share or website. An attacker would have no way to force users to visit this s
msrc
CVE-2021-34457MEDIUMCVSS 5.52021-07-13
CVE-2021-34457 [MEDIUM] Windows Remote Access Connection Manager Information Disclosure Vulnerability
Windows Remote Access Connection Manager Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory.
Windows
msrc
CVE-2021-33765MEDIUMCVSS 6.22021-07-13
CVE-2021-33765 [MEDIUM] Windows Installer Spoofing Vulnerability
Windows Installer Spoofing Vulnerability
Windows Installer: Windows Installer
Microsoft: Microsoft
Impact: Spoofing
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004244
Reference: https://support.microsoft.com/help/5004244
Reference: https://cat
msrc
CVE-2021-34444MEDIUMCVSS 6.52021-07-13
CVE-2021-34444 [MEDIUM] Windows DNS Server Denial of Service Vulnerability
Windows DNS Server Denial of Service Vulnerability
FAQ: If my server is not configured to be a DNS server, it is vulnerable?
No, this vulnerability is only exploitable if the server is configured to be a DNS server.
Role: DNS Server: Role: DNS Server
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release
msrc
CVE-2021-34507MEDIUMCVSS 6.52021-07-13
CVE-2021-34507 [MEDIUM] Windows Remote Assistance Information Disclosure Vulnerability
Windows Remote Assistance Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is unauthorized file system access - reading from the file system.
Windows Remote Assistance: Windows Remote Assistance
Microsoft: Microsoft
Impact: Information Disclosu
msrc
CVE-2021-33763MEDIUMCVSS 5.52021-07-13
CVE-2021-33763 [MEDIUM] Windows Remote Access Connection Manager Information Disclosure Vulnerability
Windows Remote Access Connection Manager Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory.
Windows
msrc
CVE-2021-33757MEDIUMCVSS 5.32021-07-13
CVE-2021-33757 [MEDIUM] Windows Security Account Manager Remote Protocol Security Feature Bypass Vulnerability
Windows Security Account Manager Remote Protocol Security Feature Bypass Vulnerability
FAQ: How do the security updates released on July 13, 2021 provide protections for CVE-2021-33757?
After the security updates released on July 13, 2021 or later are installed, Advanced Encryption Standard (AES) encryption will be the preferred method when using the MS-SAMR protocol to change or set a
msrc
CVE-2021-34497MEDIUMCVSS 6.82021-07-13
CVE-2021-34497 [MEDIUM] Windows MSHTML Platform Remote Code Execution Vulnerability
Windows MSHTML Platform Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
This vulnerability requires that a user with an affected version of Windows access a malicious server. An attacker would have to host a specially crafted server share or website. An attacker would have no way to force users to visit this s
msrc
CVE-2021-34448MEDIUMCVSS 6.8KEV2021-07-13
CVE-2021-34448 [MEDIUM] Scripting Engine Memory Corruption Vulnerability
Scripting Engine Memory Corruption Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would hav
msrc
CVE-2021-34440MEDIUMCVSS 5.52021-07-13
CVE-2021-34440 [MEDIUM] GDI+ Information Disclosure Vulnerability
GDI+ Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Impact: Information Disclosure
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release
msrc
CVE-2021-34496MEDIUMCVSS 5.52021-07-13
CVE-2021-34496 [MEDIUM] Windows GDI Information Disclosure Vulnerability
Windows GDI Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory.
Microsoft Graphics Component: Microsoft Graphics Component
Micros
msrc