Msrc Windows Server 2019 vulnerabilities
4,184 known vulnerabilities affecting msrc/windows_server_2019.
Total CVEs
4,184
CISA KEV
151
actively exploited
Public exploits
120
Exploited in wild
142
Severity breakdown
CRITICAL90HIGH2890MEDIUM1182LOW22
Vulnerabilities
Page 28 of 210
CVE-2025-29840HIGHCVSS 8.82025-05-13
CVE-2025-29840 [HIGH] CWE-121 Windows Media Remote Code Execution Vulnerability
Windows Media Remote Code Execution Vulnerability
Description: Stack-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and user interaction is required (UI:R). What is the target context of the remote code execution?
This attack requires a user to open a specially crafted file from the attacke
msrc
CVE-2025-29966HIGHCVSS 8.82025-05-13
CVE-2025-29966 [HIGH] CWE-122 Remote Desktop Client Remote Code Execution Vulnerability
Remote Desktop Client Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Remote Desktop allows an unauthorized attacker to execute code over a network.
FAQ: How could an attacker exploit this vulnerability?
In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the RDP client machine w
msrc
CVE-2025-29831HIGHCVSS 7.52025-05-13
CVE-2025-29831 [HIGH] CWE-416 Windows Remote Desktop Services Remote Code Execution Vulnerability
Windows Remote Desktop Services Remote Code Execution Vulnerability
Description: Use after free in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network.
FAQ: How could an attacker exploit this vulnerability?
An attacker could successfully exploit this vulnerability by attempting to connect to a system with the Remote Desktop Gateway role, triggering the rac
msrc
CVE-2025-27468HIGHCVSS 7.02025-05-13
CVE-2025-27468 [HIGH] CWE-269 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
Description: Improper privilege management in Windows Secure Kernel Mode allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race conditio
msrc
CVE-2025-30388HIGHCVSS 7.82025-05-13
CVE-2025-30388 [HIGH] CWE-122 Windows Graphics Component Remote Code Execution Vulnerability
Windows Graphics Component Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Win32K - GRFX allows an unauthorized attacker to execute code locally.
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?
The word Remote in the title refers to the location of the attacker. This type o
msrc
CVE-2025-29967HIGHCVSS 8.82025-05-13
CVE-2025-29967 [HIGH] CWE-122 Remote Desktop Client Remote Code Execution Vulnerability
Remote Desktop Client Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network.
FAQ: How could an attacker exploit this vulnerability?
In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the RDP client m
msrc
CVE-2025-26677HIGHCVSS 7.52025-05-13
CVE-2025-26677 [HIGH] CWE-400 Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
Description: Uncontrolled resource consumption in Remote Desktop Gateway Service allows an unauthorized attacker to deny service over a network.
Remote Desktop Gateway Service: Remote Desktop Gateway Service
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Di
msrc
CVE-2025-29963HIGHCVSS 8.82025-05-13
CVE-2025-29963 [HIGH] CWE-122 Windows Media Remote Code Execution Vulnerability
Windows Media Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and user interaction is required (UI:R). What is the target context of the remote code execution?
This attack requires a user to open a specially crafted file from the attacker
msrc
CVE-2025-30400HIGHCVSS 7.8KEV2025-05-13
CVE-2025-30400 [HIGH] CWE-416 Microsoft DWM Core Library Elevation of Privilege Vulnerability
Microsoft DWM Core Library Elevation of Privilege Vulnerability
Description: Use after free in Windows DWM allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows DWM: Windows DWM
Microsoft: Microsoft
msrc
CVE-2025-29969HIGHCVSS 7.52025-05-13
CVE-2025-29969 [HIGH] CWE-367 MS-EVEN RPC Remote Code Execution Vulnerability
MS-EVEN RPC Remote Code Execution Vulnerability
Description: Time-of-check time-of-use (toctou) race condition in Windows Fundamentals allows an authorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: Accordin
msrc
CVE-2025-29842HIGHCVSS 7.52025-05-13
CVE-2025-29842 [HIGH] CWE-349 UrlMon Security Feature Bypass Vulnerability
UrlMon Security Feature Bypass Vulnerability
Description: Acceptance of extraneous untrusted data with trusted data in UrlMon allows an unauthorized attacker to bypass a security feature over a network.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
The user would have to click on a specially crafted URL to be compromised by the attacker.
FAQ: What ki
msrc
CVE-2025-32707HIGHCVSS 7.82025-05-13
CVE-2025-32707 [HIGH] CWE-125 NTFS Elevation of Privilege Vulnerability
NTFS Elevation of Privilege Vulnerability
Description: Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability?
An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigg
msrc
CVE-2025-29974MEDIUMCVSS 5.72025-05-13
CVE-2025-29974 [MEDIUM] CWE-191 Windows Kernel Information Disclosure Vulnerability
Windows Kernel Information Disclosure Vulnerability
Description: Integer underflow (wrap or wraparound) in Windows Kernel allows an unauthorized attacker to disclose information over an adjacent network.
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of certain kernel memory content.
FAQ: According to the CVSS metric, user intera
msrc
CVE-2025-29960MEDIUMCVSS 6.52025-05-13
CVE-2025-29960 [MEDIUM] CWE-125 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Description: Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could po
msrc
CVE-2025-29829MEDIUMCVSS 5.52025-05-13
CVE-2025-29829 [MEDIUM] CWE-908 Windows Trusted Runtime Interface Driver Information Disclosure Vulnerability
Windows Trusted Runtime Interface Driver Information Disclosure Vulnerability
Description: Use of uninitialized resource in Windows Trusted Runtime Interface Driver allows an authorized attacker to disclose information locally.
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of certain kernel memory conten
msrc
CVE-2025-29837MEDIUMCVSS 5.52025-05-13
CVE-2025-29837 [MEDIUM] CWE-59 Windows Installer Information Disclosure Vulnerability
Windows Installer Information Disclosure Vulnerability
Description: Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to disclose information locally.
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of K
msrc
CVE-2025-29836MEDIUMCVSS 6.52025-05-13
CVE-2025-29836 [MEDIUM] CWE-125 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Description: Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for th
msrc
CVE-2025-29961MEDIUMCVSS 6.52025-05-13
CVE-2025-29961 [MEDIUM] CWE-125 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Description: Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
In a web-based attack
msrc
CVE-2025-30394MEDIUMCVSS 5.92025-05-13
CVE-2025-30394 [MEDIUM] CWE-591 Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
Description: Sensitive data storage in improperly locked memory in Remote Desktop Gateway Service allows an unauthorized attacker to deny service over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vul
msrc
CVE-2025-29830MEDIUMCVSS 6.52025-05-13
CVE-2025-29830 [MEDIUM] CWE-908 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Description: Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerabili
msrc