Msrc Windows Server Version 2004 vulnerabilities
499 known vulnerabilities affecting msrc/windows_server_version_2004.
Total CVEs
499
CISA KEV
15
actively exploited
Public exploits
6
Exploited in wild
15
Severity breakdown
CRITICAL15HIGH346MEDIUM137LOW1
Vulnerabilities
Page 10 of 25
CVE-2021-28326MEDIUMCVSS 5.52021-04-13
CVE-2021-28326 [MEDIUM] Windows AppX Deployment Server Denial of Service Vulnerability
Windows AppX Deployment Server Denial of Service Vulnerability
Windows AppX Deployment Extensions: Windows AppX Deployment Extensions
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=K
msrc
CVE-2021-28311MEDIUMCVSS 6.52021-04-13
CVE-2021-28311 [MEDIUM] Windows Application Compatibility Cache Denial of Service Vulnerability
Windows Application Compatibility Cache Denial of Service Vulnerability
Windows Application Compatibility Cache: Windows Application Compatibility Cache
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft
msrc
CVE-2021-27092MEDIUMCVSS 6.82021-04-13
CVE-2021-27092 [MEDIUM] Azure AD Web Sign-in Security Feature Bypass Vulnerability
Azure AD Web Sign-in Security Feature Bypass Vulnerability
Azure AD Web Sign-in: Azure AD Web Sign-in
Microsoft: Microsoft
Impact: Security Feature Bypass
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5001330
Reference: https://s
msrc
CVE-2021-28447MEDIUMCVSS 4.42021-04-13
CVE-2021-28447 [MEDIUM] Windows Early Launch Antimalware Driver Security Feature Bypass Vulnerability
Windows Early Launch Antimalware Driver Security Feature Bypass Vulnerability
Windows Early Launch Antimalware Driver: Windows Early Launch Antimalware Driver
Microsoft: Microsoft
Impact: Security Feature Bypass
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalo
msrc
CVE-2021-28312LOWCVSS 3.32021-04-13
CVE-2021-28312 [LOW] Windows NTFS Denial of Service Vulnerability
Windows NTFS Denial of Service Vulnerability
Windows NTFS: Windows NTFS
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5001342
Reference: https://support.microsoft.com/help/5001342
Reference: https:
msrc
CVE-2021-26897CRITICALCVSS 9.82021-03-09
CVE-2021-26897 [CRITICAL] Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: Can this vulnerability by mitigated by enabling Secure Zone Updates?
Enabling Secure Zone Updates constrains the potential sources of the attack, but does not completely prevent it. For example, a malicious insider could attack a “secure zone update” DNS server from a domain-joined computer. This is only a partial mitigation.
Does this vulnerability impact
msrc
CVE-2021-26894CRITICALCVSS 9.82021-03-09
CVE-2021-26894 [CRITICAL] Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: Can this vulnerability by mitigated by enabling Secure Zone Updates?
Enabling Secure Zone Updates constrains the potential sources of the attack, but does not completely prevent it. For example, a malicious insider could attack a “secure zone update” DNS server from a domain-joined computer. This is only a partial mitigation.
Does this vulnerability impact
msrc
CVE-2021-26895CRITICALCVSS 9.82021-03-09
CVE-2021-26895 [CRITICAL] Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: Can this vulnerability by mitigated by enabling Secure Zone Updates?
Enabling Secure Zone Updates constrains the potential sources of the attack, but does not completely prevent it. For example, a malicious insider could attack a “secure zone update” DNS server from a domain-joined computer. This is only a partial mitigation.
Does this vulnerability impact
msrc
CVE-2021-26877CRITICALCVSS 9.82021-03-09
CVE-2021-26877 [CRITICAL] Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: Can this vulnerability by mitigated by enabling Secure Zone Updates?
Enabling Secure Zone Updates constrains the potential sources of the attack, but does not completely prevent it. For example, a malicious insider could attack a “secure zone update” DNS server from a domain-joined computer. This is only a partial mitigation.
Does this vulnerability impact
msrc
CVE-2021-26867CRITICALCVSS 9.92021-03-09
CVE-2021-26867 [CRITICAL] Windows Hyper-V Remote Code Execution Vulnerability
Windows Hyper-V Remote Code Execution Vulnerability
FAQ: Which Hyper-V systems are vulnerable?
Any Hyper-V client which is configured to use the Plan 9 file system could be vulnerable. An authenticated attacker who successfully exploited this vulnerability on a Hyper-V client could cause code to execute on the Hyper-V server.
Role: Windows Hyper-V: Role: Windows Hyper-V
Microsoft: Microsoft
Impact: Remote Code Exec
msrc
CVE-2021-26893CRITICALCVSS 9.82021-03-09
CVE-2021-26893 [CRITICAL] Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: Can this vulnerability by mitigated by enabling Secure Zone Updates?
Enabling Secure Zone Updates constrains the potential sources of the attack, but does not completely prevent it. For example, a malicious insider could attack a “secure zone update” DNS server from a domain-joined computer. This is only a partial mitigation.
Does this vulnerability impact
msrc
CVE-2021-24090HIGHCVSS 7.82021-03-09
CVE-2021-24090 [HIGH] Windows Error Reporting Elevation of Privilege Vulnerability
Windows Error Reporting Elevation of Privilege Vulnerability
Windows Error Reporting: Windows Error Reporting
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000802
Reference: ht
msrc
CVE-2021-26879HIGHCVSS 7.52021-03-09
CVE-2021-26879 [HIGH] Windows Network Address Translation (NAT) Denial of Service Vulnerability
Windows Network Address Translation (NAT) Denial of Service Vulnerability
Role: Windows Hyper-V: Role: Windows Hyper-V
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB50008
msrc
CVE-2021-1729HIGHCVSS 7.12021-03-09
CVE-2021-1729 [HIGH] Windows Update Stack Setup Elevation of Privilege Vulnerability
Windows Update Stack Setup Elevation of Privilege Vulnerability
Windows Update Stack: Windows Update Stack
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000809
Reference: htt
msrc
CVE-2021-26865HIGHCVSS 8.82021-03-09
CVE-2021-26865 [HIGH] Windows Container Execution Agent Elevation of Privilege Vulnerability
Windows Container Execution Agent Elevation of Privilege Vulnerability
Windows Container Execution Agent: Windows Container Execution Agent
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/sit
msrc
CVE-2021-24095HIGHCVSS 7.02021-03-09
CVE-2021-24095 [HIGH] DirectX Elevation of Privilege Vulnerability
DirectX Elevation of Privilege Vulnerability
Windows DirectX: Windows DirectX
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000809
Reference: https://catalog.update.microsoft.com/v7/site/Searc
msrc
CVE-2021-26870HIGHCVSS 7.82021-03-09
CVE-2021-26870 [HIGH] Windows Projected File System Elevation of Privilege Vulnerability
Windows Projected File System Elevation of Privilege Vulnerability
Windows Projected File System Filter Driver: Windows Projected File System Filter Driver
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsof
msrc
CVE-2021-26890HIGHCVSS 7.82021-03-09
CVE-2021-26890 [HIGH] Application Virtualization Remote Code Execution Vulnerability
Application Virtualization Remote Code Execution Vulnerability
Application Virtualization: Application Virtualization
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000822
Refe
msrc
CVE-2021-26868HIGHCVSS 7.82021-03-09
CVE-2021-26868 [HIGH] Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB500080
msrc
CVE-2021-26863HIGHCVSS 7.02021-03-09
CVE-2021-26863 [HIGH] Windows Win32k Elevation of Privilege Vulnerability
Windows Win32k Elevation of Privilege Vulnerability
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000809
Reference: https://ca
msrc