Msrc Windows Server 2019 vulnerabilities
4,184 known vulnerabilities affecting msrc/windows_server_2019.
Total CVEs
4,184
CISA KEV
151
actively exploited
Public exploits
120
Exploited in wild
142
Severity breakdown
CRITICAL90HIGH2890MEDIUM1182LOW22
Vulnerabilities
Page 126 of 210
CVE-2022-21894MEDIUMCVSS 4.4Exploited2022-01-11
CVE-2022-21894 [MEDIUM] Secure Boot Security Feature Bypass Vulnerability
Secure Boot Security Feature Bypass Vulnerability
Windows Secure Boot: Windows Secure Boot
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Security Feature Bypass
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5009557
Reference: https:
msrc
CVE-2022-21839MEDIUMCVSS 6.12022-01-11
CVE-2022-21839 [MEDIUM] Windows Event Tracing Discretionary Access Control List Denial of Service Vulnerability
Windows Event Tracing Discretionary Access Control List Denial of Service Vulnerability
Windows Event Tracing: Windows Event Tracing
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://cata
msrc
CVE-2022-21892MEDIUMCVSS 6.82022-01-11
CVE-2022-21892 [MEDIUM] Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
An attacker with physical access to a vulnerable system could insert a specially crafted USB device.
Are there additional attack vectors?
This vulnerability could also be exploited through a local attack vector.
msrc
CVE-2021-43215CRITICALCVSS 9.82021-12-14
CVE-2021-43215 [CRITICAL] iSNS Server Memory Corruption Vulnerability Can Lead to Remote Code Execution
iSNS Server Memory Corruption Vulnerability Can Lead to Remote Code Execution
FAQ: How could an attacker exploit this vulnerability?
An attacker could send a specially crafted request to the Internet Storage Name Service (iSNS) server, which could result in remote code execution.
FAQ: What is Windows iSNS?
The Internet Storage Name Service (iSNS) protocol is used for interaction between iSNS
msrc
CVE-2021-43223HIGHCVSS 7.82021-12-14
CVE-2021-43223 [HIGH] Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
Windows Remote Access Connection Manager: Windows Remote Access Connection Manager
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog
msrc
CVE-2021-43219HIGHCVSS 7.42021-12-14
CVE-2021-43219 [HIGH] DirectX Graphics Kernel File Denial of Service Vulnerability
DirectX Graphics Kernel File Denial of Service Vulnerability
Windows DirectX: Windows DirectX
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008218
Reference: https://support.microso
msrc
CVE-2021-43248HIGHCVSS 7.82021-12-14
CVE-2021-43248 [HIGH] Windows Digital Media Receiver Elevation of Privilege Vulnerability
Windows Digital Media Receiver Elevation of Privilege Vulnerability
Microsoft Windows Codecs Library: Microsoft Windows Codecs Library
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search
msrc
CVE-2021-43231HIGHCVSS 7.82021-12-14
CVE-2021-43231 [HIGH] Windows NTFS Elevation of Privilege Vulnerability
Windows NTFS Elevation of Privilege Vulnerability
Windows NTFS: Windows NTFS
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008218
Reference: https://support.microsoft.com/help/5008218
Re
msrc
CVE-2021-43247HIGHCVSS 7.82021-12-14
CVE-2021-43247 [HIGH] Windows TCP/IP Driver Elevation of Privilege Vulnerability
Windows TCP/IP Driver Elevation of Privilege Vulnerability
Windows TCP/IP: Windows TCP/IP
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008218
Reference: https://support.microsof
msrc
CVE-2021-43233HIGHCVSS 7.52021-12-14
CVE-2021-43233 [HIGH] Remote Desktop Client Remote Code Execution Vulnerability
Remote Desktop Client Remote Code Execution Vulnerability
Remote Desktop Client: Remote Desktop Client
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008218
Reference: https://suppo
msrc
CVE-2021-43228HIGHCVSS 7.52021-12-14
CVE-2021-43228 [HIGH] SymCrypt Denial of Service Vulnerability
SymCrypt Denial of Service Vulnerability
Windows SymCrypt: Windows SymCrypt
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008218
Reference: https://support.microsoft.com/help/5008218
Reference: https:
msrc
CVE-2021-43232HIGHCVSS 7.82021-12-14
CVE-2021-43232 [HIGH] Windows Event Tracing Remote Code Execution Vulnerability
Windows Event Tracing Remote Code Execution Vulnerability
Windows Event Tracing: Windows Event Tracing
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008218
Reference: https://suppo
msrc
CVE-2021-43235MEDIUMCVSS 5.52021-12-14
CVE-2021-43235 [MEDIUM] Storage Spaces Controller Information Disclosure Vulnerability
Storage Spaces Controller Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Windows Storage: Windows Storage
Microsoft: Microsoft
Im
msrc
CVE-2021-43244MEDIUMCVSS 6.52021-12-14
CVE-2021-43244 [MEDIUM] Windows Kernel Information Disclosure Vulnerability
Windows Kernel Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Impact: Information Disclo
msrc
CVE-2021-43227MEDIUMCVSS 5.52021-12-14
CVE-2021-43227 [MEDIUM] Storage Spaces Controller Information Disclosure Vulnerability
Storage Spaces Controller Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Windows Storage Spaces Controller: Windows Storage Spaces
msrc
CVE-2021-43246MEDIUMCVSS 5.62021-12-14
CVE-2021-43246 [MEDIUM] Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
Role: Windows Hyper-V: Role: Windows Hyper-V
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008218
Reference: https://support.microsoft.com/help/
msrc
CVE-2021-26443CRITICALCVSS 9.02021-11-09
CVE-2021-26443 [CRITICAL] Microsoft Virtual Machine Bus (VMBus) Remote Code Execution Vulnerability
Microsoft Virtual Machine Bus (VMBus) Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
A remote code execution vulnerability exists when a VM guest fails to properly handle communication on a VMBus channel. To exploit the vulnerability, an authenticated attacker could send a specially crafted communication on the VMBus channel from the guest VM to the Hos
msrc
CVE-2021-41356HIGHCVSS 7.52021-11-09
CVE-2021-41356 [HIGH] Windows Denial of Service Vulnerability
Windows Denial of Service Vulnerability
Microsoft Windows: Microsoft Windows
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5007206
Reference: https://support.microsoft.com/help/500
msrc
CVE-2021-42276HIGHCVSS 7.82021-11-09
CVE-2021-42276 [HIGH] Microsoft Windows Media Foundation Remote Code Execution Vulnerability
Microsoft Windows Media Foundation Remote Code Execution Vulnerability
Microsoft Windows Codecs Library: Microsoft Windows Codecs Library
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.
msrc
CVE-2021-41370HIGHCVSS 7.82021-11-09
CVE-2021-41370 [HIGH] NTFS Elevation of Privilege Vulnerability
NTFS Elevation of Privilege Vulnerability
Windows NTFS: Windows NTFS
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5007206
Reference: https://support.microsoft.com/help/5007
msrc