Msrc Windows Server 2019 vulnerabilities

4,184 known vulnerabilities affecting msrc/windows_server_2019.

Total CVEs
4,184
CISA KEV
151
actively exploited
Public exploits
120
Exploited in wild
142
Severity breakdown
CRITICAL90HIGH2890MEDIUM1182LOW22

Vulnerabilities

Page 42 of 210
CVE-2025-21265MEDIUMCVSS 6.62025-01-14
CVE-2025-21265 [MEDIUM] CWE-125 Windows Digital Media Elevation of Privilege Vulnerability Windows Digital Media Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. FAQ: According to the CVSS metric, the Attack Vector is Physical (AV:P). What does that mean for this vulnerability? An attacker needs physical access to the tar
msrc
CVE-2025-21318MEDIUMCVSS 5.52025-01-14
CVE-2025-21318 [MEDIUM] CWE-532 Windows Kernel Memory Information Disclosure Vulnerability Windows Kernel Memory Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities. Windows Kernel Memory: Windows Kernel Memory Micr
msrc
CVE-2025-21225MEDIUMCVSS 5.92025-01-14
CVE-2025-21225 [MEDIUM] CWE-843 Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Windows Remote Desktop Services: Windows Remote Desktop Services Microsoft: Microsoft Customer Action R
msrc
CVE-2025-21341MEDIUMCVSS 6.62025-01-14
CVE-2025-21341 [MEDIUM] CWE-125 Windows Digital Media Elevation of Privilege Vulnerability Windows Digital Media Elevation of Privilege Vulnerability FAQ: According to the CVSS metric, the Attack Vector is Physical (AV:P). What does that mean for this vulnerability? An attacker needs physical access to the target computer to plug in a malicious USB drive. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited th
msrc
CVE-2025-21312LOWCVSS 2.42025-01-14
CVE-2025-21312 [LOW] CWE-908 Windows Smart Card Reader Information Disclosure Vulnerability Windows Smart Card Reader Information Disclosure Vulnerability FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L),but lead to no loss of availability (A:N) and integrity (I:N)? What does that mean for this vulnerability? An attacker who successfully exploited the vulnerability could view some sensitive information (Confidenti
msrc
CVE-2024-49112CRITICALCVSS 9.82024-12-10
CVE-2024-49112 [CRITICAL] CWE-190 Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability FAQ: What actions do customers need to perform to be protected against this vulnerability? This vulnerability affects both LDAP clients and servers running an affected version of Windows listed in the Security Updates table. Customers must apply the latest security update for their Wind
msrc
CVE-2024-49128HIGHCVSS 8.12024-12-10
CVE-2024-49128 [HIGH] CWE-591 Windows Remote Desktop Services Remote Code Execution Vulnerability Windows Remote Desktop Services Remote Code Execution Vulnerability Description: Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network. FAQ: How could an attacker exploit this vulnerability? An attacker could successfully exploit this vulnerability by attempting to connect to a system with the Remote Des
msrc
CVE-2024-49079HIGHCVSS 7.82024-12-10
CVE-2024-49079 [HIGH] CWE-416 Input Method Editor (IME) Remote Code Execution Vulnerability Input Method Editor (IME) Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an
msrc
CVE-2024-49118HIGHCVSS 8.12024-12-10
CVE-2024-49118 [HIGH] CWE-416 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition during the execution of a specific operation that recurs in a low frequency on the target system. This might require an att
msrc
CVE-2024-49076HIGHCVSS 7.82024-12-10
CVE-2024-49076 [HIGH] CWE-287 Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability FAQ: What privileges would an attacker gain by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could load a non-Microsoft DLL into an enclave, potentially leading to code execution within the context of the target enclave. Windows Virtu
msrc
CVE-2024-49074HIGHCVSS 7.82024-12-10
CVE-2024-49074 [HIGH] CWE-416 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability Windows Kernel-Mode Driver Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Kernel-Mode Drivers: Windows Kernel-Mode Drivers Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit St
msrc
CVE-2024-49075HIGHCVSS 7.52024-12-10
CVE-2024-49075 [HIGH] CWE-400 Windows Remote Desktop Services Denial of Service Vulnerability Windows Remote Desktop Services Denial of Service Vulnerability Windows Remote Desktop Services: Windows Remote Desktop Services Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5048661 Refer
msrc
CVE-2024-49090HIGHCVSS 7.82024-12-10
CVE-2024-49090 [HIGH] CWE-822 Windows Common Log File System Driver Elevation of Privilege Vulnerability Windows Common Log File System Driver Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Common Log File System Driver: Windows Common Log File System Driver Microsoft: Microsoft Customer Action Required: Yes
msrc
CVE-2024-49107HIGHCVSS 7.32024-12-10
CVE-2024-49107 [HIGH] CWE-59 WmsRepair Service Elevation of Privilege Vulnerability WmsRepair Service Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker would be able to delete any system files. FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required is low (PR:L). What does that mean for this vulnerability? An authorized attacker must send the user a malicious
msrc
CVE-2024-49119HIGHCVSS 8.12024-12-10
CVE-2024-49119 [HIGH] CWE-843 Windows Remote Desktop Services Remote Code Execution Vulnerability Windows Remote Desktop Services Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ: How could an attacker exploit this vulnerability? An attacker could successfully exploit this vulnerability by connect
msrc
CVE-2024-49086HIGHCVSS 8.82024-12-10
CVE-2024-49086 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain c
msrc
CVE-2024-49115HIGHCVSS 8.12024-12-10
CVE-2024-49115 [HIGH] CWE-591 Windows Remote Desktop Services Remote Code Execution Vulnerability Windows Remote Desktop Services Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ: How could an attacker exploit this vulnerability? An attacker could successfully exploit this vulnerability by connect
msrc
CVE-2024-49096HIGHCVSS 7.52024-12-10
CVE-2024-49096 [HIGH] CWE-400 Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability Windows Message Queuing: Windows Message Queuing Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5048661 Reference: https://
msrc
CVE-2024-49080HIGHCVSS 8.82024-12-10
CVE-2024-49080 [HIGH] CWE-122 Windows IP Routing Management Snapin Remote Code Execution Vulnerability Windows IP Routing Management Snapin Remote Code Execution Vulnerability FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. FAQ: How could an attacker exploit this vulnerability? An attacker could exploit this vulne
msrc
CVE-2024-49122HIGHCVSS 8.12024-12-10
CVE-2024-49122 [HIGH] CWE-416 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ: How could an attacker exploit the vulnerability? To exploit this vulnerability, an attacker would need to send a spe
msrc