Msrc Windows Server 2019 vulnerabilities
4,184 known vulnerabilities affecting msrc/windows_server_2019.
Total CVEs
4,184
CISA KEV
151
actively exploited
Public exploits
120
Exploited in wild
142
Severity breakdown
CRITICAL90HIGH2890MEDIUM1182LOW22
Vulnerabilities
Page 119 of 210
CVE-2022-26814MEDIUMCVSS 6.62022-04-12
CVE-2022-26814 [MEDIUM] Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean
msrc
CVE-2022-24483MEDIUMCVSS 5.52022-04-12
CVE-2022-24483 [MEDIUM] Windows Kernel Information Disclosure Vulnerability
Windows Kernel Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of certain kernel memory content.
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information Disclosure
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Le
msrc
CVE-2022-24493MEDIUMCVSS 5.52022-04-12
CVE-2022-24493 [MEDIUM] Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability
Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Microsoft Loca
msrc
CVE-2022-26817MEDIUMCVSS 6.62022-04-12
CVE-2022-26817 [MEDIUM] Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: How could an attacker exploit this vulnerability?
In a network-based attack an attacker would need to have the privileges to query the Domain Name Ser
msrc
CVE-2022-24498MEDIUMCVSS 6.52022-04-12
CVE-2022-24498 [MEDIUM] Windows iSCSI Target Service Information Disclosure Vulnerability
Windows iSCSI Target Service Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of initialized or uninitialized memory in the process heap.
Windows iSCSI Target Service: Windows iSCSI Target Service
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information Disclosure
Exploit
msrc
CVE-2022-26820MEDIUMCVSS 6.62022-04-12
CVE-2022-26820 [MEDIUM] Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires the attacker or targeted user to have specific elevated privileges. As is best practice, regular validation and audits of administrative groups should be conducted.
FAQ: According to the CVSS me
msrc
CVE-2022-26816MEDIUMCVSS 6.52022-04-12
CVE-2022-26816 [MEDIUM] Windows DNS Server Information Disclosure Vulnerability
Windows DNS Server Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.
Role: DNS Server: Role: DNS Server
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information Disclosure
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest
msrc
CVE-2022-24484MEDIUMCVSS 5.52022-04-12
CVE-2022-24484 [MEDIUM] Windows Cluster Shared Volume (CSV) Denial of Service Vulnerability
Windows Cluster Shared Volume (CSV) Denial of Service Vulnerability
Windows Cluster Shared Volume (CSV): Windows Cluster Shared Volume (CSV)
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.mi
msrc
CVE-2022-26785MEDIUMCVSS 6.52022-04-12
CVE-2022-26785 [MEDIUM] Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability
Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of initialized or uninitialized memory in the process heap.
Role: Windows Hyper-V: Role: Windows Hyper-V
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information Disclosu
msrc
CVE-2022-26920MEDIUMCVSS 5.52022-04-12
CVE-2022-26920 [MEDIUM] Windows Graphics Component Information Disclosure Vulnerability
Windows Graphics Component Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Microsoft Graphics Component: Microsoft Graphics Compone
msrc
CVE-2022-26822MEDIUMCVSS 6.62022-04-12
CVE-2022-26822 [MEDIUM] Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerab
msrc
CVE-2022-26818MEDIUMCVSS 6.62022-04-12
CVE-2022-26818 [MEDIUM] Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires the attacker or targeted user to have specific elevated privileges. As is best practice, regular validation and audits of administrative groups should be conducted.
FAQ: How could an attacker ex
msrc
CVE-2022-26784MEDIUMCVSS 6.52022-04-12
CVE-2022-26784 [MEDIUM] Windows Cluster Shared Volume (CSV) Denial of Service Vulnerability
Windows Cluster Shared Volume (CSV) Denial of Service Vulnerability
Windows Cluster Shared Volume (CSV): Windows Cluster Shared Volume (CSV)
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.mi
msrc
CVE-2022-26821MEDIUMCVSS 6.62022-04-12
CVE-2022-26821 [MEDIUM] Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires the attacker or targeted user to have specific elevated privileges. As is best practice, regular validation and audits of administrative groups should be conducted.
FAQ: According to the CVSS me
msrc
CVE-2022-24538MEDIUMCVSS 6.52022-04-12
CVE-2022-24538 [MEDIUM] Windows Cluster Shared Volume (CSV) Denial of Service Vulnerability
Windows Cluster Shared Volume (CSV) Denial of Service Vulnerability
Windows Cluster Shared Volume (CSV): Windows Cluster Shared Volume (CSV)
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.mi
msrc
CVE-2022-26829MEDIUMCVSS 6.62022-04-12
CVE-2022-26829 [MEDIUM] Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires the attacker or targeted user to have specific elevated privileges. As is best practice, regular validation and audits of administrative groups should be conducted.
FAQ: According to the CVSS me
msrc
CVE-2022-23286HIGHCVSS 7.02022-03-08
CVE-2022-23286 [HIGH] Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
Windows Cloud Files Mini Filter Driver: Windows Cloud Files Mini Filter Driver
Microsoft: Microsoft
Customer Acti
msrc
CVE-2022-24505HIGHCVSS 7.02022-03-08
CVE-2022-24505 [HIGH] Windows ALPC Elevation of Privilege Vulnerability
Windows ALPC Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
Windows ALPC: Windows ALPC
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Lat
msrc
CVE-2022-24507HIGHCVSS 7.82022-03-08
CVE-2022-24507 [HIGH] Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock: Windows Ancillary Function Driver for WinSock
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitat
msrc
CVE-2022-24459HIGHCVSS 7.82022-03-08
CVE-2022-24459 [HIGH] Windows Fax and Scan Service Elevation of Privilege Vulnerability
Windows Fax and Scan Service Elevation of Privilege Vulnerability
Windows Fax and Scan Service: Windows Fax and Scan Service
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsof
msrc