Msrc Windows Server Version 2004 vulnerabilities

499 known vulnerabilities affecting msrc/windows_server_version_2004.

Total CVEs
499
CISA KEV
15
actively exploited
Public exploits
6
Exploited in wild
15
Severity breakdown
CRITICAL15HIGH346MEDIUM137LOW1

Vulnerabilities

Page 3 of 25
CVE-2021-41361MEDIUMCVSS 5.42021-10-12
CVE-2021-41361 [MEDIUM] Active Directory Federation Server Spoofing Vulnerability Active Directory Federation Server Spoofing Vulnerability FAQ: How could an attacker exploit this vulnerability? The ADFS (Active Directory Federation Services) services are vulnerable during the logout redirect request to cross-site scripting of the post logout redirect URI. An attacker who successfully exploited this vulnerability could leave an application using this ADFS library vulnerable to common XSS attack
msrc
CVE-2021-40456MEDIUMCVSS 5.32021-10-12
CVE-2021-40456 [MEDIUM] Windows AD FS Security Feature Bypass Vulnerability Windows AD FS Security Feature Bypass Vulnerability FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? This vulnerability could allow an attacker to bypass ADFS BannedIPList entries for WS-Trust workflows. Role: Windows AD FS Server: Role: Windows AD FS Server Microsoft: Microsoft Impact: Security Feature Bypass Exploit Status: Publicly Disclosed:No;Exploited:No;Lates
msrc
CVE-2021-41339MEDIUMCVSS 4.72021-10-12
CVE-2021-41339 [MEDIUM] Microsoft DWM Core Library Elevation of Privilege Vulnerability Microsoft DWM Core Library Elevation of Privilege Vulnerability Windows DWM Core Library: Windows DWM Core Library Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006667 Ref
msrc
CVE-2021-41337MEDIUMCVSS 4.92021-10-12
CVE-2021-41337 [MEDIUM] Active Directory Security Feature Bypass Vulnerability Active Directory Security Feature Bypass Vulnerability FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? This vulnerability could allow an attacker to bypass Active Directory domain permissions for Key Admins groups. Role: Windows Active Directory Server: Role: Windows Active Directory Server Microsoft: Microsoft Impact: Security Feature Bypass Exploit Status: Pub
msrc
CVE-2021-40468MEDIUMCVSS 5.52021-10-12
CVE-2021-40468 [MEDIUM] Windows Bind Filter Driver Information Disclosure Vulnerability Windows Bind Filter Driver Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process. Windows Bind Filter Driver: Windows Bind Filter Driver
msrc
CVE-2021-41338MEDIUMCVSS 5.52021-10-12
CVE-2021-41338 [MEDIUM] Windows AppContainer Firewall Rules Security Feature Bypass Vulnerability Windows AppContainer Firewall Rules Security Feature Bypass Vulnerability Windows AppContainer: Windows AppContainer Microsoft: Microsoft Impact: Security Feature Bypass Exploit Status: Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=
msrc
CVE-2021-36975HIGHCVSS 7.82021-09-14
CVE-2021-36975 [HIGH] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Windows Win32K: Windows Win32K Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568 Reference: https://support.microsoft.com/help/5005568 Reference:
msrc
CVE-2021-38630HIGHCVSS 7.82021-09-14
CVE-2021-38630 [HIGH] Windows Event Tracing Elevation of Privilege Vulnerability Windows Event Tracing Elevation of Privilege Vulnerability Windows Event Tracing: Windows Event Tracing Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568 Reference: https://su
msrc
CVE-2021-38634HIGHCVSS 7.12021-09-14
CVE-2021-38634 [HIGH] Microsoft Windows Update Client Elevation of Privilege Vulnerability Microsoft Windows Update Client Elevation of Privilege Vulnerability Windows Update: Windows Update Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568 Reference: http
msrc
CVE-2021-36973HIGHCVSS 7.82021-09-14
CVE-2021-36973 [HIGH] Windows Redirected Drive Buffering System Elevation of Privilege Vulnerability Windows Redirected Drive Buffering System Elevation of Privilege Vulnerability Windows Redirected Drive Buffering: Windows Redirected Drive Buffering Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.mi
msrc
CVE-2021-36954HIGHCVSS 8.82021-09-14
CVE-2021-36954 [HIGH] Windows Bind Filter Driver Elevation of Privilege Vulnerability Windows Bind Filter Driver Elevation of Privilege Vulnerability Windows Bind Filter Driver: Windows Bind Filter Driver Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568 R
msrc
CVE-2021-36967HIGHCVSS 8.02021-09-14
CVE-2021-36967 [HIGH] Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability Windows WLAN Service: Windows WLAN Service Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568 Ref
msrc
CVE-2021-36974HIGHCVSS 7.82021-09-14
CVE-2021-36974 [HIGH] Windows SMB Elevation of Privilege Vulnerability Windows SMB Elevation of Privilege Vulnerability Windows SMB: Windows SMB Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568 Reference: https://support.microsoft.com/help/5005568 Refere
msrc
CVE-2021-36966HIGHCVSS 7.82021-09-14
CVE-2021-36966 [HIGH] Windows Subsystem for Linux Elevation of Privilege Vulnerability Windows Subsystem for Linux Elevation of Privilege Vulnerability Windows Subsystem for Linux: Windows Subsystem for Linux Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB500556
msrc
CVE-2021-38637MEDIUMCVSS 5.52021-09-14
CVE-2021-38637 [MEDIUM] Windows Storage Information Disclosure Vulnerability Windows Storage Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is unauthorized file system access - reading from the file system. Windows Storage: Windows Storage Microsoft: Microsoft Impact: Information Disclosure Exploit Status: Publicly Disclosed:N
msrc
CVE-2021-36972MEDIUMCVSS 5.52021-09-14
CVE-2021-36972 [MEDIUM] Windows SMB Information Disclosure Vulnerability Windows SMB Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory and kernel memory - unintentional read access to memory contents in kernel space from a user mode process. Windows SMB: Windows SMB Microsoft: Microsoft Impact: Information
msrc
CVE-2021-38632MEDIUMCVSS 5.72021-09-14
CVE-2021-38632 [MEDIUM] BitLocker Security Feature Bypass Vulnerability BitLocker Security Feature Bypass Vulnerability FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to a powered off system could exploit this vulnerability to gain access to encrypted data. Windows BitLocker: Windows BitLocker Microsoft:
msrc
CVE-2021-38624MEDIUMCVSS 6.52021-09-14
CVE-2021-38624 [MEDIUM] Windows Key Storage Provider Security Feature Bypass Vulnerability Windows Key Storage Provider Security Feature Bypass Vulnerability FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? A successful attacker could bypass the Windows Key Storage Provider which issues key certificates for trust in attestation scenarios. Windows Key Storage Provider: Windows Key Storage Provider Microsoft: Microsoft Impact: Security Feature
msrc
CVE-2021-26432CRITICALCVSS 9.82021-08-10
CVE-2021-26432 [CRITICAL] Windows Services for NFS ONCRPC XDR Driver Remote Code Execution Vulnerability Windows Services for NFS ONCRPC XDR Driver Remote Code Execution Vulnerability FAQ: What system configurations would expose this vulnerability? Servers that have installed the Network File System are exposed to this vulnerability in rpcxdr.sys. An attacker would require read or write permission to any file on an NFS share on the victim system. If NFS is configured to allow anonymous access,
msrc
CVE-2021-26433HIGHCVSS 7.52021-08-10
CVE-2021-26433 [HIGH] Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory. Windows Services for NFS ONCRPC XDR Driver: Windows Services for NFS ONCRPC XDR Driver Microsoft: Microsoft Impa
msrc