Msrc Windows Server Version 2004 vulnerabilities

499 known vulnerabilities affecting msrc/windows_server_version_2004.

Total CVEs
499
CISA KEV
15
actively exploited
Public exploits
6
Exploited in wild
15
Severity breakdown
CRITICAL15HIGH346MEDIUM137LOW1

Vulnerabilities

Page 13 of 25
CVE-2021-1689HIGHCVSS 7.82021-01-12
CVE-2021-1689 [HIGH] Windows Multipoint Management Elevation of Privilege Vulnerability Windows Multipoint Management Elevation of Privilege Vulnerability Microsoft Windows: Microsoft Windows Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.a
msrc
CVE-2021-1692HIGHCVSS 7.72021-01-12
CVE-2021-1692 [HIGH] Windows Hyper-V Denial of Service Vulnerability Windows Hyper-V Denial of Service Vulnerability Windows Hyper-V: Windows Hyper-V Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4601319 Reference: https://support.mic
msrc
CVE-2021-1648HIGHCVSS 7.82021-01-12
CVE-2021-1648 [HIGH] Microsoft splwow64 Elevation of Privilege Vulnerability Microsoft splwow64 Elevation of Privilege Vulnerability FAQ: What type of information could be disclosed by this vulnerability? While this issue is labeled as an elevation of privilege, it can also be exploited to disclose information. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory. This CVE is marked as Publicly Disclosed. In what way wa
msrc
CVE-2021-1697HIGHCVSS 7.82021-01-12
CVE-2021-1697 [HIGH] Windows InstallService Elevation of Privilege Vulnerability Windows InstallService Elevation of Privilege Vulnerability Windows Installer: Windows Installer Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB459824
msrc
CVE-2021-1680HIGHCVSS 7.82021-01-12
CVE-2021-1680 [HIGH] Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability Windows Diagnostic Hub: Windows Diagnostic Hub Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.
msrc
CVE-2021-1682HIGHCVSS 7.02021-01-12
CVE-2021-1682 [HIGH] Windows Kernel Elevation of Privilege Vulnerability Windows Kernel Elevation of Privilege Vulnerability Windows Kernel: Windows Kernel Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598242 Reference: https://
msrc
CVE-2021-1638HIGHCVSS 7.72021-01-12
CVE-2021-1638 [HIGH] Windows Bluetooth Security Feature Bypass Vulnerability Windows Bluetooth Security Feature Bypass Vulnerability Description: Microsoft is aware of the "Impersonation in the Passkey Entry Protocol" vulnerability. For more information regarding the vulnerability, please see this statement from the Bluetooth SIG. To address the vulnerability, Microsoft has released a software update that will fail attempts to pair if the remote device exchanges a public key with the same X coo
msrc
CVE-2021-1650HIGHCVSS 7.82021-01-12
CVE-2021-1650 [HIGH] Windows Runtime C++ Template Library Elevation of Privilege Vulnerability Windows Runtime C++ Template Library Elevation of Privilege Vulnerability Microsoft Windows: Microsoft Windows Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7
msrc
CVE-2021-1670MEDIUMCVSS 5.52021-01-12
CVE-2021-1670 [MEDIUM] Windows Projected File System FS Filter Driver Information Disclosure Vulnerability Windows Projected File System FS Filter Driver Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory
msrc
CVE-2021-1637MEDIUMCVSS 5.52021-01-12
CVE-2021-1637 [MEDIUM] Windows DNS Query Information Disclosure Vulnerability Windows DNS Query Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory. Microsoft Windows DNS: Microsoft Windows DNS Microsoft: Microsoft Customer Action Required: Yes Impact: Information Disclosure Exploit Status: Publicly Disclos
msrc
CVE-2021-1645MEDIUMCVSS 5.02021-01-12
CVE-2021-1645 [MEDIUM] Windows Docker Information Disclosure Vulnerability Windows Docker Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is secret data encrypted with DP API can be decrypted. Windows DP API: Windows DP API Microsoft: Microsoft Customer Action Required: Yes Impact: Information Disclosure Exploit Status: Public
msrc
CVE-2021-1663MEDIUMCVSS 5.52021-01-12
CVE-2021-1663 [MEDIUM] Windows Projected File System FS Filter Driver Information Disclosure Vulnerability Windows Projected File System FS Filter Driver Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory
msrc
CVE-2021-1672MEDIUMCVSS 5.52021-01-12
CVE-2021-1672 [MEDIUM] Windows Projected File System FS Filter Driver Information Disclosure Vulnerability Windows Projected File System FS Filter Driver Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory
msrc
CVE-2021-1683MEDIUMCVSS 5.02021-01-12
CVE-2021-1683 [MEDIUM] Windows Bluetooth Security Feature Bypass Vulnerability Windows Bluetooth Security Feature Bypass Vulnerability Description: Microsoft is aware of the "Impersonation in the Passkey Entry Protocol" vulnerability. For more information regarding the vulnerability, please see this statement from the Bluetooth SIG. To address the vulnerability, Microsoft has released a software update that will fail attempts to pair if the remote device exchanges a public key with the same X c
msrc
CVE-2021-1684MEDIUMCVSS 5.02021-01-12
CVE-2021-1684 [MEDIUM] Windows Bluetooth Security Feature Bypass Vulnerability Windows Bluetooth Security Feature Bypass Vulnerability Description: Microsoft is aware of the "Impersonation in the Passkey Entry Protocol" vulnerability. For more information regarding the vulnerability, please see this statement from the Bluetooth SIG. To address the vulnerability, Microsoft has released a software update that will fail attempts to pair if the remote device exchanges a public key with the same X c
msrc
CVE-2021-1646MEDIUMCVSS 6.62021-01-12
CVE-2021-1646 [MEDIUM] Windows WLAN Service Elevation of Privilege Vulnerability Windows WLAN Service Elevation of Privilege Vulnerability Microsoft Windows: Microsoft Windows Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598242
msrc
CVE-2020-17103HIGHCVSS 7.02020-12-08
CVE-2020-17103 [HIGH] Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Microsoft Windows: Microsoft Windows Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/si
msrc
CVE-2020-16962HIGHCVSS 7.82020-12-08
CVE-2020-16962 [HIGH] Windows Backup Engine Elevation of Privilege Vulnerability Windows Backup Engine Elevation of Privilege Vulnerability Windows Backup Engine: Windows Backup Engine Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4592438
msrc
CVE-2020-17136HIGHCVSS 7.8PoC2020-12-08
CVE-2020-17136 [HIGH] Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Microsoft Windows: Microsoft Windows Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/si
msrc
CVE-2020-16958HIGHCVSS 7.82020-12-08
CVE-2020-16958 [HIGH] Windows Backup Engine Elevation of Privilege Vulnerability Windows Backup Engine Elevation of Privilege Vulnerability Windows Backup Engine: Windows Backup Engine Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4592438
msrc