Msrc Windows Server 2019 vulnerabilities

4,184 known vulnerabilities affecting msrc/windows_server_2019.

Total CVEs
4,184
CISA KEV
151
actively exploited
Public exploits
120
Exploited in wild
142
Severity breakdown
CRITICAL90HIGH2890MEDIUM1182LOW22

Vulnerabilities

Page 2 of 210
CVE-2026-25188HIGHCVSS 8.82026-03-10
CVE-2026-25188 [HIGH] CWE-122 Windows Telephony Service Elevation of Privilege Vulnerability Windows Telephony Service Elevation of Privilege Vulnerability Description: Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to elevate privileges over an adjacent network. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. FAQ:
msrc
CVE-2026-25173HIGHCVSS 8.02026-03-10
CVE-2026-25173 [HIGH] CWE-190 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Description: Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network. FAQ: How could an attacker exploit this vulnerability? An attacker authenticated on the domain could exploit this vulnerability by tricking
msrc
CVE-2026-24292HIGHCVSS 7.82026-03-10
CVE-2026-24292 [HIGH] CWE-416 Windows Connected Devices Platform Service Elevation of Privilege Vulnerability Windows Connected Devices Platform Service Elevation of Privilege Vulnerability Description: Use after free in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYST
msrc
CVE-2026-25187HIGHCVSS 7.82026-03-10
CVE-2026-25187 [HIGH] CWE-59 Winlogon Elevation of Privilege Vulnerability Winlogon Elevation of Privilege Vulnerability Description: Improper link resolution before file access ('link following') in Winlogon allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Winlogon: Winlogon Microsoft: Microsoft
msrc
CVE-2026-25190HIGHCVSS 7.82026-03-10
CVE-2026-25190 [HIGH] CWE-426 GDI Remote Code Execution Vulnerability GDI Remote Code Execution Vulnerability Description: Untrusted search path in Windows GDI allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Executio
msrc
CVE-2026-25189HIGHCVSS 7.82026-03-10
CVE-2026-25189 [HIGH] CWE-416 Windows DWM Core Library Elevation of Privilege Vulnerability Windows DWM Core Library Elevation of Privilege Vulnerability Description: Use after free in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows DWM Core Library: Windows DWM C
msrc
CVE-2026-23674HIGHCVSS 7.52026-03-10
CVE-2026-23674 [HIGH] CWE-41 MapUrlToZone Security Feature Bypass Vulnerability MapUrlToZone Security Feature Bypass Vulnerability Description: Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network. FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited the vulnerability could bypass the MapURLToZone method. FAQ: The Security
msrc
CVE-2026-25178HIGHCVSS 7.02026-03-10
CVE-2026-25178 [HIGH] CWE-416 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Description: Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could g
msrc
CVE-2026-25165HIGHCVSS 7.82026-03-10
CVE-2026-25165 [HIGH] CWE-476 Performance Counters for Windows Elevation of Privilege Vulnerability Performance Counters for Windows Elevation of Privilege Vulnerability Description: Null pointer dereference in Windows Performance Counters allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows P
msrc
CVE-2026-25172HIGHCVSS 8.02026-03-10
CVE-2026-25172 [HIGH] CWE-190 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Description: Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network. FAQ: How could an attacker exploit this vulnerability? An attacker authenticated on the domain could exploit this vulnerability by tricking
msrc
CVE-2026-25177HIGHCVSS 8.82026-03-10
CVE-2026-25177 [HIGH] CWE-641 Active Directory Domain Services Elevation of Privilege Vulnerability Active Directory Domain Services Elevation of Privilege Vulnerability Description: Improper restriction of names for files and other resources in Active Directory Domain Services allows an authorized attacker to elevate privileges over a network. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerab
msrc
CVE-2026-23669HIGHCVSS 8.82026-03-10
CVE-2026-23669 [HIGH] CWE-416 RPC Runtime Library Remote Code Execution Vulnerability RPC Runtime Library Remote Code Execution Vulnerability Description: Use after free in RPC Runtime allows an authorized attacker to execute code over a network. FAQ: How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by sending specially crafted network responses to a system running the Windows Print Spooler service. These malformed responses may cause the service t
msrc
CVE-2026-25185MEDIUMCVSS 5.32026-03-10
CVE-2026-25185 [MEDIUM] CWE-200 Windows Shell Link Processing Spoofing Vulnerability Windows Shell Link Processing Spoofing Vulnerability Description: Exposure of sensitive information to an unauthorized actor in Windows Shell Link Processing allows an unauthorized attacker to perform spoofing over a network. FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L),but lead to no loss of availability (A:N) and integrity
msrc
CVE-2026-25169MEDIUMCVSS 6.22026-03-10
CVE-2026-25169 [MEDIUM] CWE-369 Windows Graphics Component Denial of Service Vulnerability Windows Graphics Component Denial of Service Vulnerability Description: Divide by zero in Microsoft Graphics Component allows an unauthorized attacker to deny service locally. Microsoft Graphics Component: Microsoft Graphics Component Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Les
msrc
CVE-2026-25180MEDIUMCVSS 5.52026-03-10
CVE-2026-25180 [MEDIUM] CWE-125 Windows Graphics Component Information Disclosure Vulnerability Windows Graphics Component Information Disclosure Vulnerability Description: Out-of-bounds read in Microsoft Graphics Component allows an unauthorized attacker to disclose information locally. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? A user would need to be tricked into opening a folder that contains a specially crafted file.
msrc
CVE-2026-25168MEDIUMCVSS 6.22026-03-10
CVE-2026-25168 [MEDIUM] CWE-476 Windows Graphics Component Denial of Service Vulnerability Windows Graphics Component Denial of Service Vulnerability Description: Null pointer dereference in Microsoft Graphics Component allows an unauthorized attacker to deny service locally. Microsoft Graphics Component: Microsoft Graphics Component Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploi
msrc
CVE-2026-24297MEDIUMCVSS 6.52026-03-10
CVE-2026-24297 [MEDIUM] CWE-362 Windows Kerberos Security Feature Bypass Vulnerability Windows Kerberos Security Feature Bypass Vulnerability Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Kerberos allows an unauthorized attacker to bypass a security feature over a network. FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? When the group policy is being reapplied, Windows Kerb
msrc
CVE-2026-25186MEDIUMCVSS 5.52026-03-10
CVE-2026-25186 [MEDIUM] CWE-200 Windows Accessibility Infrastructure (ATBroker.exe) Information Disclosure Vulnerability Windows Accessibility Infrastructure (ATBroker.exe) Information Disclosure Vulnerability Description: Exposure of sensitive information to an unauthorized actor in Windows Accessibility Infrastructure (ATBroker.exe) allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? The type of information th
msrc
CVE-2026-21248HIGHCVSS 7.32026-02-10
CVE-2026-21248 [HIGH] CWE-122 Windows Hyper-V Remote Code Execution Vulnerability Windows Hyper-V Remote Code Execution Vulnerability Description: Heap-based buffer overflow in Windows Hyper-V allows an authorized attacker to execute code locally. FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? The file must be stored in a location that allows an attacker write access, enabling the file to
msrc
CVE-2026-21255HIGHCVSS 8.82026-02-10
CVE-2026-21255 [HIGH] CWE-284 Windows Hyper-V Security Feature Bypass Vulnerability Windows Hyper-V Security Feature Bypass Vulnerability Description: Improper access control in Windows Hyper-V allows an authorized attacker to bypass a security feature locally. FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass the Virtualization-based Security feature. FAQ: How could an att
msrc
Msrc Windows Server 2019 vulnerabilities | cvebase