Msrc Windows Server Version 2004 vulnerabilities
499 known vulnerabilities affecting msrc/windows_server_version_2004.
Total CVEs
499
CISA KEV
15
actively exploited
Public exploits
6
Exploited in wild
15
Severity breakdown
CRITICAL15HIGH346MEDIUM137LOW1
Vulnerabilities
Page 11 of 25
CVE-2021-27063HIGHCVSS 7.52021-03-09
CVE-2021-27063 [HIGH] Windows DNS Server Denial of Service Vulnerability
Windows DNS Server Denial of Service Vulnerability
FAQ: Can this vulnerability by mitigated by enabling Secure Zone Updates?
Enabling Secure Zone Updates constrains the potential sources of the attack, but does not completely prevent it. For example, a malicious insider could attack a “secure zone update” DNS server from a domain-joined computer. This is only a partial mitigation.
Does this vulnerability impact just standa
msrc
CVE-2021-27070HIGHCVSS 7.32021-03-09
CVE-2021-27070 [HIGH] Windows 10 Update Assistant Elevation of Privilege Vulnerability
Windows 10 Update Assistant Elevation of Privilege Vulnerability
Windows Update Assistant: Windows Update Assistant
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000802
Ref
msrc
CVE-2021-26896HIGHCVSS 7.52021-03-09
CVE-2021-26896 [HIGH] Windows DNS Server Denial of Service Vulnerability
Windows DNS Server Denial of Service Vulnerability
FAQ: Can this vulnerability by mitigated by enabling Secure Zone Updates?
Enabling Secure Zone Updates constrains the potential sources of the attack, but does not completely prevent it. For example, a malicious insider could attack a “secure zone update” DNS server from a domain-joined computer. This is only a partial mitigation.
Does this vulnerability impact just standa
msrc
CVE-2021-26864HIGHCVSS 8.42021-03-09
CVE-2021-26864 [HIGH] Windows Virtual Registry Provider Elevation of Privilege Vulnerability
Windows Virtual Registry Provider Elevation of Privilege Vulnerability
Windows Registry: Windows Registry
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000822
Referen
msrc
CVE-2021-26874HIGHCVSS 7.82021-03-09
CVE-2021-26874 [HIGH] Windows Overlay Filter Elevation of Privilege Vulnerability
Windows Overlay Filter Elevation of Privilege Vulnerability
Windows Overlay Filter: Windows Overlay Filter
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000822
Reference: https:
msrc
CVE-2021-26860HIGHCVSS 7.82021-03-09
CVE-2021-26860 [HIGH] Windows App-V Overlay Filter Elevation of Privilege Vulnerability
Windows App-V Overlay Filter Elevation of Privilege Vulnerability
Windows Overlay Filter: Windows Overlay Filter
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000822
Refer
msrc
CVE-2021-26889HIGHCVSS 7.82021-03-09
CVE-2021-26889 [HIGH] Windows Update Stack Elevation of Privilege Vulnerability
Windows Update Stack Elevation of Privilege Vulnerability
Windows Update Stack: Windows Update Stack
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000809
Reference: https://catalo
msrc
CVE-2021-26880HIGHCVSS 7.82021-03-09
CVE-2021-26880 [HIGH] Storage Spaces Controller Elevation of Privilege Vulnerability
Storage Spaces Controller Elevation of Privilege Vulnerability
Windows Storage Spaces Controller: Windows Storage Spaces Controller
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=
msrc
CVE-2021-26866HIGHCVSS 7.12021-03-09
CVE-2021-26866 [HIGH] Windows Update Service Elevation of Privilege Vulnerability
Windows Update Service Elevation of Privilege Vulnerability
Windows Update Stack: Windows Update Stack
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000809
Reference: https://ca
msrc
CVE-2021-26876HIGHCVSS 8.82021-03-09
CVE-2021-26876 [HIGH] OpenType Font Parsing Remote Code Execution Vulnerability
OpenType Font Parsing Remote Code Execution Vulnerability
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000809
Reference:
msrc
CVE-2021-26891HIGHCVSS 7.82021-03-09
CVE-2021-26891 [HIGH] Windows Container Execution Agent Elevation of Privilege Vulnerability
Windows Container Execution Agent Elevation of Privilege Vulnerability
Windows Container Execution Agent: Windows Container Execution Agent
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/sit
msrc
CVE-2021-26900HIGHCVSS 7.82021-03-09
CVE-2021-26900 [HIGH] Windows Win32k Elevation of Privilege Vulnerability
Windows Win32k Elevation of Privilege Vulnerability
Windows Win32K: Windows Win32K
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000808
Reference: https://support.microsoft.com/help/500
msrc
CVE-2021-26892MEDIUMCVSS 6.22021-03-09
CVE-2021-26892 [MEDIUM] Windows Extensible Firmware Interface Security Feature Bypass Vulnerability
Windows Extensible Firmware Interface Security Feature Bypass Vulnerability
Windows Extensible Firmware Interface: Windows Extensible Firmware Interface
Microsoft: Microsoft
Impact: Security Feature Bypass
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update
msrc
CVE-2021-26884MEDIUMCVSS 5.52021-03-09
CVE-2021-26884 [MEDIUM] Windows Media Photo Codec Information Disclosure Vulnerability
Windows Media Photo Codec Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory.
Microsoft Windows Codecs Library: Micr
msrc
CVE-2021-26886MEDIUMCVSS 6.12021-03-09
CVE-2021-26886 [MEDIUM] User Profile Service Denial of Service Vulnerability
User Profile Service Denial of Service Vulnerability
Windows User Profile Service: Windows User Profile Service
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000809
Reference: https://cat
msrc
CVE-2021-24078CRITICALCVSS 9.82021-02-09
CVE-2021-24078 [CRITICAL] Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
FAQ: If my server is not configured to be a DNS server, it is vulnerable?
No, this vulnerability is only exploitable if the server is configured to be a DNS server.
Role: DNS Server: Role: DNS Server
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older So
msrc
CVE-2021-1732HIGHCVSS 7.8KEVPoC2021-02-09
CVE-2021-1732 [HIGH] Windows Win32k Elevation of Privilege Vulnerability
Windows Win32k Elevation of Privilege Vulnerability
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:Yes;Latest Software Release:Exploitation Detected;Older Software Release:Exploitation Detected;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4601354
Reference: https://catalog.update.microsoft.com/v7/site
msrc
CVE-2021-24093HIGHCVSS 8.82021-02-09
CVE-2021-24093 [HIGH] Windows Graphics Component Remote Code Execution Vulnerability
Windows Graphics Component Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. Howe
msrc
CVE-2021-1698HIGHCVSS 7.82021-02-09
CVE-2021-1698 [HIGH] Windows Win32k Elevation of Privilege Vulnerability
Windows Win32k Elevation of Privilege Vulnerability
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4601319
Reference: https://support.microsoft.com/help/4601
msrc
CVE-2021-24081HIGHCVSS 7.82021-02-09
CVE-2021-24081 [HIGH] Microsoft Windows Codecs Library Remote Code Execution Vulnerability
Microsoft Windows Codecs Library Remote Code Execution Vulnerability
Microsoft Windows Codecs Library: Microsoft Windows Codecs Library
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Searc
msrc