Msrc Windows Server Version 2004 vulnerabilities
499 known vulnerabilities affecting msrc/windows_server_version_2004.
Total CVEs
499
CISA KEV
15
actively exploited
Public exploits
6
Exploited in wild
15
Severity breakdown
CRITICAL15HIGH346MEDIUM137LOW1
Vulnerabilities
Page 12 of 25
CVE-2020-17162HIGHCVSS 8.82021-02-09
CVE-2020-17162 [HIGH] Microsoft Windows Security Feature Bypass Vulnerability
Microsoft Windows Security Feature Bypass Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
It is a bypass of Extended Protection for Authentication(EPA) where Service Principle Name could allow Windows store UAP applications to elevate privileges.
Microsoft Windows: Microsoft Windows
Microsoft: Microsoft
Impact: Security Feature Bypass
Exploit Status
msrc
CVE-2021-24091HIGHCVSS 7.82021-02-09
CVE-2021-24091 [HIGH] Windows Camera Codec Pack Remote Code Execution Vulnerability
Windows Camera Codec Pack Remote Code Execution Vulnerability
Microsoft Windows Codecs Library: Microsoft Windows Codecs Library
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB460
msrc
CVE-2021-24096HIGHCVSS 7.82021-02-09
CVE-2021-24096 [HIGH] Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4601345
Reference: https://support.microsoft.com/help/460
msrc
CVE-2021-24075MEDIUMCVSS 6.82021-02-09
CVE-2021-24075 [MEDIUM] Microsoft Windows VMSwitch Denial of Service Vulnerability
Microsoft Windows VMSwitch Denial of Service Vulnerability
Windows Network File System: Windows Network File System
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4601319
Reference: h
msrc
CVE-2021-24084MEDIUMCVSS 5.52021-02-09
CVE-2021-24084 [MEDIUM] Windows Mobile Device Management Information Disclosure Vulnerability
Windows Mobile Device Management Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is unauthorized file system access - reading from the file system.
Windows Mobile Device Management: Windows Mobile Device Management
Microsoft: Microsoft
msrc
CVE-2021-24076MEDIUMCVSS 5.52021-02-09
CVE-2021-24076 [MEDIUM] Microsoft Windows VMSwitch Information Disclosure Vulnerability
Microsoft Windows VMSwitch Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.
Role: Windows Hyper-V: Role: Windows Hyper-V
Microsoft: Microsoft
Impact: Information Disclosure
Exploit Status: Publicly Disclosed:No;Exploi
msrc
CVE-2021-24079MEDIUMCVSS 5.52021-02-09
CVE-2021-24079 [MEDIUM] Windows Backup Engine Information Disclosure Vulnerability
Windows Backup Engine Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information.
Windows Backup Engine: Windows Backup Engine
Microsoft: Microsoft
Impact: Information Disclosure
Exploit Status: Publicly Disclosed:No;Exploited:No;La
msrc
CVE-2021-24106MEDIUMCVSS 5.52021-02-09
CVE-2021-24106 [MEDIUM] Windows DirectX Information Disclosure Vulnerability
Windows DirectX Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.
Windows DirectX: Windows DirectX
Microsoft: Microsoft
Impact: Information Disclosure
Exploit Status: Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Ex
msrc
CVE-2021-1731MEDIUMCVSS 5.52021-02-09
CVE-2021-1731 [MEDIUM] PFX Encryption Security Feature Bypass Vulnerability
PFX Encryption Security Feature Bypass Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
When exporting a SID-protected PFX file, keys encrypted using AES are not properly protected. Any SID-protected PFX files using AES for key encryption should be regenerated and exported after this update is installed.
Windows PFX Encryption: Windows PFX Encryption
Mic
msrc
CVE-2021-24082MEDIUMCVSS 4.32021-02-09
CVE-2021-24082 [MEDIUM] Microsoft.PowerShell.Utility Module WDAC Security Feature Bypass Vulnerability
Microsoft.PowerShell.Utility Module WDAC Security Feature Bypass Vulnerability
Windows PowerShell: Windows PowerShell
Microsoft: Microsoft
Impact: Security Feature Bypass
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.as
msrc
CVE-2021-24098MEDIUMCVSS 5.52021-02-09
CVE-2021-24098 [MEDIUM] Windows Console Driver Denial of Service Vulnerability
Windows Console Driver Denial of Service Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attack
msrc
CVE-2021-1662HIGHCVSS 7.82021-01-12
CVE-2021-1662 [HIGH] Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing: Windows Event Tracing
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB
msrc
CVE-2021-1703HIGHCVSS 7.82021-01-12
CVE-2021-1703 [HIGH] Windows Event Logging Service Elevation of Privilege Vulnerability
Windows Event Logging Service Elevation of Privilege Vulnerability
Windows Event Logging Service: Windows Event Logging Service
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.micros
msrc
CVE-2021-1710HIGHCVSS 7.82021-01-12
CVE-2021-1710 [HIGH] Microsoft Windows Media Foundation Remote Code Execution Vulnerability
Microsoft Windows Media Foundation Remote Code Execution Vulnerability
Windows Media: Windows Media
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.as
msrc
CVE-2021-1669HIGHCVSS 8.82021-01-12
CVE-2021-1669 [HIGH] Windows Remote Desktop Security Feature Bypass Vulnerability
Windows Remote Desktop Security Feature Bypass Vulnerability
FAQ: How do I get the update for Microsoft Remote Desktop for Android?
Tap the Google Play icon on your home screen.
Swipe in from the left edge of the screen.
Tap My apps & games.
Tap the Update box next to the Remote Desktop app.
Windows Remote Desktop: Windows Remote Desktop
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Security Fea
msrc
CVE-2021-1691HIGHCVSS 7.72021-01-12
CVE-2021-1691 [HIGH] Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V: Windows Hyper-V
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598242
Reference: https://support.mic
msrc
CVE-2021-1685HIGHCVSS 7.32021-01-12
CVE-2021-1685 [HIGH] Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
Windows AppX Deployment Extensions: Windows AppX Deployment Extensions
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://c
msrc
CVE-2021-1651HIGHCVSS 7.82021-01-12
CVE-2021-1651 [HIGH] Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
Windows Diagnostic Hub: Windows Diagnostic Hub
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.
msrc
CVE-2021-1704HIGHCVSS 7.32021-01-12
CVE-2021-1704 [HIGH] Windows Hyper-V Elevation of Privilege Vulnerability
Windows Hyper-V Elevation of Privilege Vulnerability
Windows Hyper-V: Windows Hyper-V
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598242
Reference: http
msrc
CVE-2021-1642HIGHCVSS 7.82021-01-12
CVE-2021-1642 [HIGH] Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
Windows AppX Deployment Extensions: Windows AppX Deployment Extensions
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://c
msrc