Msrc Windows Server 2019 vulnerabilities
4,184 known vulnerabilities affecting msrc/windows_server_2019.
Total CVEs
4,184
CISA KEV
151
actively exploited
Public exploits
120
Exploited in wild
142
Severity breakdown
CRITICAL90HIGH2890MEDIUM1182LOW22
Vulnerabilities
Page 133 of 210
CVE-2021-34458CRITICALCVSS 9.92021-07-13
CVE-2021-34458 [CRITICAL] Windows Kernel Remote Code Execution Vulnerability
Windows Kernel Remote Code Execution Vulnerability
FAQ: How do I know if I'm affected by this vulnerability?
This issue allows a single root input/output virtualization (SR-IOV) device which is assigned to a guest to potentially interfere with its Peripheral Component Interface Express (PCIe) siblings which are attached to other guests or to the root.
You will be vulnerable if you implement the following:
Your Windows
msrc
CVE-2021-33759HIGHCVSS 7.82021-07-13
CVE-2021-33759 [HIGH] Windows Desktop Bridge Elevation of Privilege Vulnerability
Windows Desktop Bridge Elevation of Privilege Vulnerability
Windows Desktop Bridge: Windows Desktop Bridge
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004244
Reference: https:
msrc
CVE-2021-33785HIGHCVSS 7.52021-07-13
CVE-2021-33785 [HIGH] Windows AF_UNIX Socket Provider Denial of Service Vulnerability
Windows AF_UNIX Socket Provider Denial of Service Vulnerability
Windows AF_UNIX Socket Provider: Windows AF_UNIX Socket Provider
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB50042
msrc
CVE-2021-34481HIGHCVSS 8.82021-07-13
CVE-2021-34481 [HIGH] Windows Print Spooler Remote Code Execution Vulnerability
Windows Print Spooler Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user
msrc
CVE-2021-34441HIGHCVSS 7.82021-07-13
CVE-2021-34441 [HIGH] Microsoft Windows Media Foundation Remote Code Execution Vulnerability
Microsoft Windows Media Foundation Remote Code Execution Vulnerability
Microsoft Windows Media Foundation: Microsoft Windows Media Foundation
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/si
msrc
CVE-2021-33774HIGHCVSS 7.02021-07-13
CVE-2021-33774 [HIGH] Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing: Windows Event Tracing
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004244
Reference: https://su
msrc
CVE-2021-33749HIGHCVSS 8.82021-07-13
CVE-2021-33749 [HIGH] Windows DNS Snap-in Remote Code Execution Vulnerability
Windows DNS Snap-in Remote Code Execution Vulnerability
FAQ: How could an attacker exploit the vulnerability?
An administrator would need to view a malicious record in the DNS Snap-in to allow exploitation this vulnerability.
Role: DNS Server: Role: DNS Server
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older
msrc
CVE-2021-33751HIGHCVSS 7.02021-07-13
CVE-2021-33751 [HIGH] Storage Spaces Controller Elevation of Privilege Vulnerability
Storage Spaces Controller Elevation of Privilege Vulnerability
Windows Storage Spaces Controller: Windows Storage Spaces Controller
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=
msrc
CVE-2021-31183HIGHCVSS 7.52021-07-13
CVE-2021-31183 [HIGH] Windows TCP/IP Driver Denial of Service Vulnerability
Windows TCP/IP Driver Denial of Service Vulnerability
Windows TCP/IP: Windows TCP/IP
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004244
Reference: https://support.microsoft.com/help/5004
msrc
CVE-2021-34511HIGHCVSS 7.82021-07-13
CVE-2021-34511 [HIGH] Windows Installer Elevation of Privilege Vulnerability
Windows Installer Elevation of Privilege Vulnerability
Windows Installer: Windows Installer
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004244
Reference: https://support.microsoft.
msrc
CVE-2021-34455HIGHCVSS 7.82021-07-13
CVE-2021-34455 [HIGH] Windows File History Service Elevation of Privilege Vulnerability
Windows File History Service Elevation of Privilege Vulnerability
Windows File History Service: Windows File History Service
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB50
msrc
CVE-2021-33740HIGHCVSS 7.82021-07-13
CVE-2021-33740 [HIGH] Windows Media Remote Code Execution Vulnerability
Windows Media Remote Code Execution Vulnerability
Microsoft Windows Codecs Library: Microsoft Windows Codecs Library
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004244
Reference: https:/
msrc
CVE-2021-33780HIGHCVSS 8.82021-07-13
CVE-2021-33780 [HIGH] Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: If my server is not configured to be a DNS server, it is vulnerable?
No, this vulnerability is only exploitable if the server is configured to be a DNS server.
Role: DNS Server: Role: DNS Server
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Softwa
msrc
CVE-2021-34438HIGHCVSS 7.82021-07-13
CVE-2021-34438 [HIGH] Windows Font Driver Host Remote Code Execution Vulnerability
Windows Font Driver Host Remote Code Execution Vulnerability
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004244
Refe
msrc
CVE-2021-34504HIGHCVSS 7.82021-07-13
CVE-2021-34504 [HIGH] Windows Address Book Remote Code Execution Vulnerability
Windows Address Book Remote Code Execution Vulnerability
Windows Address Book: Windows Address Book
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004244
Reference: https://support.m
msrc
CVE-2021-33761HIGHCVSS 7.82021-07-13
CVE-2021-33761 [HIGH] Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
Windows Remote Access Connection Manager: Windows Remote Access Connection Manager
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog
msrc
CVE-2021-34525HIGHCVSS 8.82021-07-13
CVE-2021-34525 [HIGH] Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
Role: DNS Server: Role: DNS Server
Microsoft: Microsoft
Impact: Remote Code Execution
Impact: Defense in Depth
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004244
Reference: htt
msrc
CVE-2021-34462HIGHCVSS 7.02021-07-13
CVE-2021-34462 [HIGH] Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
Windows AppX Deployment Extensions: Windows AppX Deployment Extensions
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7
msrc
CVE-2021-33750HIGHCVSS 8.82021-07-13
CVE-2021-33750 [HIGH] Windows DNS Snap-in Remote Code Execution Vulnerability
Windows DNS Snap-in Remote Code Execution Vulnerability
FAQ: How could an attacker exploit the vulnerability?
An administrator would need to view a malicious record in the DNS Snap-in to allow exploitation this vulnerability.
Role: DNS Server: Role: DNS Server
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older
msrc
CVE-2021-33752HIGHCVSS 8.82021-07-13
CVE-2021-33752 [HIGH] Windows DNS Snap-in Remote Code Execution Vulnerability
Windows DNS Snap-in Remote Code Execution Vulnerability
FAQ: How could an attacker exploit the vulnerability?
An administrator would need to view a malicious record in the DNS Snap-in to allow exploitation this vulnerability.
Role: DNS Server: Role: DNS Server
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older
msrc