Msrc Windows Server 2019 vulnerabilities
4,184 known vulnerabilities affecting msrc/windows_server_2019.
Total CVEs
4,184
CISA KEV
151
actively exploited
Public exploits
120
Exploited in wild
142
Severity breakdown
CRITICAL90HIGH2890MEDIUM1182LOW22
Vulnerabilities
Page 97 of 210
CVE-2023-21754HIGHCVSS 7.82023-01-10
CVE-2023-21754 [HIGH] CWE-190 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Management Instrumentation: Windows Management Instrumentation
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publ
msrc
CVE-2023-21730HIGHCVSS 7.82023-01-10
CVE-2023-21730 [HIGH] CWE-190 Microsoft Cryptographic Services Elevation of Privilege Vulnerability
Microsoft Cryptographic Services Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Cryptographic Services: Windows Cryptographic Services
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Pri
msrc
CVE-2023-21747HIGHCVSS 7.82023-01-10
CVE-2023-21747 [HIGH] CWE-416 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Virtual Registry Provider: Windows Virtual Registry Provider
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Public
msrc
CVE-2023-21728HIGHCVSS 7.52023-01-10
CVE-2023-21728 [HIGH] CWE-400 Windows Netlogon Denial of Service Vulnerability
Windows Netlogon Denial of Service Vulnerability
Microsoft Local Security Authority Server (lsasrv): Microsoft Local Security Authority Server (lsasrv)
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.upd
msrc
CVE-2023-21547HIGHCVSS 7.52023-01-10
CVE-2023-21547 [HIGH] CWE-476 Internet Key Exchange (IKE) Protocol Denial of Service Vulnerability
Internet Key Exchange (IKE) Protocol Denial of Service Vulnerability
Windows Internet Key Exchange (IKE) Protocol: Windows Internet Key Exchange (IKE) Protocol
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7
msrc
CVE-2023-21543HIGHCVSS 8.12023-01-10
CVE-2023-21543 [HIGH] CWE-400 Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a specially crafted protocol message to a Routing and Remote Access Service (RRAS) server, which could lead to remote code execution (RCE) on the RAS server machine.
FAQ: According to the CVSS metric, the attack comple
msrc
CVE-2023-21674HIGHCVSS 8.8KEV2023-01-10
CVE-2023-21674 [HIGH] CWE-416 Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
This vulnerability could lead to a browser sandbox escape.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An at
msrc
CVE-2023-21750HIGHCVSS 7.12023-01-10
CVE-2023-21750 [HIGH] CWE-284 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N) but have major impact on integrity (I:H) and on availability (A:H). What does that mean for this vulnerability?
This vulnerability does not allow disclosure of any confidential information, but could allow an attacker to delete data tha
msrc
CVE-2023-21749HIGHCVSS 7.82023-01-10
CVE-2023-21749 [HIGH] CWE-20 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Virtual Registry Provider: Windows Virtual Registry Provider
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicl
msrc
CVE-2023-21558HIGHCVSS 7.82023-01-10
CVE-2023-21558 [HIGH] CWE-20 Windows Error Reporting Service Elevation of Privilege Vulnerability
Windows Error Reporting Service Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could gain specific limited SYSTEM privileges.
Windows Error Reporting: Windows Error Reporting
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Priv
msrc
CVE-2023-21767HIGHCVSS 7.82023-01-10
CVE-2023-21767 [HIGH] CWE-20 Windows Overlay Filter Elevation of Privilege Vulnerability
Windows Overlay Filter Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Overlay Filter: Windows Overlay Filter
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disc
msrc
CVE-2023-21758HIGHCVSS 7.52023-01-10
CVE-2023-21758 [HIGH] CWE-476 Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability
Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability
Windows IKE Extension: Windows IKE Extension
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.upd
msrc
CVE-2023-21555HIGHCVSS 8.12023-01-10
CVE-2023-21555 [HIGH] CWE-367 Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a specially crafted protocol message to a Routing and Remote Access Service (RRAS) server, which could lead to remote code execution (RCE) on the RAS server machine.
FAQ: According to the CVSS metric, the attack comple
msrc
CVE-2023-21712HIGHCVSS 8.12023-01-10
CVE-2023-21712 [HIGH] CWE-362 Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a special
msrc
CVE-2023-21681HIGHCVSS 8.82023-01-10
CVE-2023-21681 [HIGH] CWE-191 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to e
msrc
CVE-2023-21548HIGHCVSS 8.12023-01-10
CVE-2023-21548 [HIGH] CWE-591 Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
FAQ: How could an attacker exploit the vulnerability?
To exploit this vulnerability, an attacker would need to send a specially crafted malicious SSTP packet to a SSTP server. This could result in remote code execution on the server side.
FAQ: According to the CVSS metric, the attack complexity is h
msrc
CVE-2023-21773HIGHCVSS 7.82023-01-10
CVE-2023-21773 [HIGH] CWE-416 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Virtual Registry Provider: Windows Virtual Registry Provider
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Public
msrc
CVE-2023-21746HIGHCVSS 7.82023-01-10
CVE-2023-21746 [HIGH] Windows NTLM Elevation of Privilege Vulnerability
Windows NTLM Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows NTLM: Windows NTLM
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:E
msrc
CVE-2023-21772HIGHCVSS 7.82023-01-10
CVE-2023-21772 [HIGH] CWE-125 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Virtual Registry Provider: Windows Virtual Registry Provider
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Public
msrc
CVE-2023-21760HIGHCVSS 7.12023-01-10
CVE-2023-21760 [HIGH] CWE-59 Windows Print Spooler Elevation of Privilege Vulnerability
Windows Print Spooler Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N) but have major impact on integrity
msrc