Msrc Windows Server 2019 vulnerabilities

4,184 known vulnerabilities affecting msrc/windows_server_2019.

Total CVEs
4,184
CISA KEV
151
actively exploited
Public exploits
120
Exploited in wild
142
Severity breakdown
CRITICAL90HIGH2890MEDIUM1182LOW22

Vulnerabilities

Page 111 of 210
CVE-2022-30160HIGHCVSS 7.82022-06-14
CVE-2022-30160 [HIGH] Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability Windows ALPC: Windows ALPC Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A Reference: https://catalog.update.microsoft
msrc
CVE-2022-30150HIGHCVSS 7.52022-06-14
CVE-2022-30150 [HIGH] Windows Defender Remote Credential Guard Elevation of Privilege Vulnerability Windows Defender Remote Credential Guard Elevation of Privilege Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component. FAQ: According to the CVSS metric, privileges required is l
msrc
CVE-2022-30131HIGHCVSS 7.82022-06-14
CVE-2022-30131 [HIGH] Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability Windows Container Isolation FS Filter Driver: Windows Container Isolation FS Filter Driver Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation
msrc
CVE-2022-30147HIGHCVSS 7.82022-06-14
CVE-2022-30147 [HIGH] Windows Installer Elevation of Privilege Vulnerability Windows Installer Elevation of Privilege Vulnerability Windows Installer: Windows Installer Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5014692 Refere
msrc
CVE-2022-30153HIGHCVSS 8.82022-06-14
CVE-2022-30153 [HIGH] Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious LDAP server usi
msrc
CVE-2022-30146HIGHCVSS 7.52022-06-14
CVE-2022-30146 [HIGH] Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability. FAQ: According to the CVSS metric, the attack ve
msrc
CVE-2022-30141HIGHCVSS 8.12022-06-14
CVE-2022-30141 [HIGH] Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability FAQ: How could an attacker exploit this vulnerability? An unauthenticated attacker could send a specially crafted request to a vulnerable server. Successful exploitation could result in the attacker's code running in the context of the SYSTEM account. FAQ: Are there any special conditions necessar
msrc
CVE-2022-30166HIGHCVSS 7.82022-06-14
CVE-2022-30166 [HIGH] Local Security Authority Subsystem Service Elevation of Privilege Vulnerability Local Security Authority Subsystem Service Elevation of Privilege Vulnerability Windows Local Security Authority Subsystem Service (LSASS): Windows Local Security Authority Subsystem Service (LSASS) Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Softwa
msrc
CVE-2022-30145HIGHCVSS 7.52022-06-14
CVE-2022-30145 [HIGH] Windows Encrypting File System (EFS) Remote Code Execution Vulnerability Windows Encrypting File System (EFS) Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability. FAQ: According to the CVSS metric, privileges required is low (PR:L). What does
msrc
CVE-2022-21125HIGHCVSS 5.52022-06-14
CVE-2022-21125 [MEDIUM] Intel: CVE-2022-21125 Shared Buffers Data Sampling (SBDS) Intel: CVE-2022-21125 Shared Buffers Data Sampling (SBDS) FAQ: Why is this Intel CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in certain processor models offered by Intel. The mitigation for this vulnerability requires a firmware update, and a corresponding Windows updates enables the mitigation. This CVE is being documented in the Security Update Guide to announce that the
msrc
CVE-2022-30149HIGHCVSS 7.52022-06-14
CVE-2022-30149 [HIGH] Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability. FAQ: According to the CVSS metric, the attack ve
msrc
CVE-2022-21127HIGHCVSS 5.52022-06-14
CVE-2022-21127 [MEDIUM] Intel: CVE-2022-21127 Special Register Buffer Data Sampling Update (SRBDS Update) Intel: CVE-2022-21127 Special Register Buffer Data Sampling Update (SRBDS Update) FAQ: Why is this Intel CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in certain processor models offered by Intel. The mitigation for this vulnerability requires a firmware update, and a corresponding Windows updates enables the mitigation. This CVE is being documented in
msrc
CVE-2022-30151HIGHCVSS 7.02022-06-14
CVE-2022-30151 [HIGH] Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Windows Ancillary Function Driver for WinSock: Windows Ancillary Function Driver for WinSock Microso
msrc
CVE-2022-30142HIGHCVSS 7.52022-06-14
CVE-2022-30142 [HIGH] Windows File History Remote Code Execution Vulnerability Windows File History Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to
msrc
CVE-2022-30143HIGHCVSS 7.52022-06-14
CVE-2022-30143 [HIGH] Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability FAQ: Are there any special conditions necessary for this vulnerability to be exploitable? Yes. This vulnerability is only exploitable if the MaxReceiveBuffer LDAP policy is set to a value higher than the default value. Systems with the default value of this policy would not be vulnerable. For more
msrc
CVE-2022-21166HIGHCVSS 5.52022-06-14
CVE-2022-21166 [MEDIUM] Intel: CVE-2022-21166 Device Register Partial Write (DRPW) Intel: CVE-2022-21166 Device Register Partial Write (DRPW) FAQ: Why is this Intel CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in certain processor models offered by Intel. The mitigation for this vulnerability requires a firmware update, and a corresponding Windows updates enables the mitigation. This CVE is being documented in the Security Update Guide to announce that th
msrc
CVE-2022-21123HIGHCVSS 5.52022-06-14
CVE-2022-21123 [MEDIUM] Intel: CVE-2022-21123 Shared Buffers Data Read (SBDR) Intel: CVE-2022-21123 Shared Buffers Data Read (SBDR) FAQ: Why is this Intel CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in certain processor models offered by Intel. The mitigation for this vulnerability requires a firmware update, and a corresponding Windows updates enables the mitigation. This CVE is being documented in the Security Update Guide to announce that the latest b
msrc
CVE-2022-32230HIGHCVSS 7.52022-06-14
CVE-2022-32230 [HIGH] Windows SMB Denial of Service Vulnerability Windows SMB Denial of Service Vulnerability FAQ: Why is this Rapid7 CVE included in the Security Update Guide? The vulnerability assigned to this CVE was originally classified as a stability bug in Windows. Rapid7 discovered that this bug could be used to cause a denial of service condition on affected versions of Windows. Microsoft had provided an update to address this issue prior to being contacted about it by Rapid 7. Microso
msrc
CVE-2022-30140HIGHCVSS 7.52022-06-14
CVE-2022-30140 [HIGH] Windows iSCSI Discovery Service Remote Code Execution Vulnerability Windows iSCSI Discovery Service Remote Code Execution Vulnerability FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Successful exploitation of this vulnerability requires a user to place a call to trigger the vulnerability. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
msrc
CVE-2022-30152HIGHCVSS 7.52022-06-14
CVE-2022-30152 [HIGH] Windows Network Address Translation (NAT) Denial of Service Vulnerability Windows Network Address Translation (NAT) Denial of Service Vulnerability Windows Network Address Translation (NAT): Windows Network Address Translation (NAT) Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Refere
msrc