Msrc Windows Server Version 2004 vulnerabilities
499 known vulnerabilities affecting msrc/windows_server_version_2004.
Total CVEs
499
CISA KEV
15
actively exploited
Public exploits
6
Exploited in wild
15
Severity breakdown
CRITICAL15HIGH346MEDIUM137LOW1
Vulnerabilities
Page 7 of 25
CVE-2021-34444MEDIUMCVSS 6.52021-07-13
CVE-2021-34444 [MEDIUM] Windows DNS Server Denial of Service Vulnerability
Windows DNS Server Denial of Service Vulnerability
FAQ: If my server is not configured to be a DNS server, it is vulnerable?
No, this vulnerability is only exploitable if the server is configured to be a DNS server.
Role: DNS Server: Role: DNS Server
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release
msrc
CVE-2021-34493MEDIUMCVSS 6.72021-07-13
CVE-2021-34493 [MEDIUM] Windows Partition Management Driver Elevation of Privilege Vulnerability
Windows Partition Management Driver Elevation of Privilege Vulnerability
Windows Partition Management Driver: Windows Partition Management Driver
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.
msrc
CVE-2021-33763MEDIUMCVSS 5.52021-07-13
CVE-2021-33763 [MEDIUM] Windows Remote Access Connection Manager Information Disclosure Vulnerability
Windows Remote Access Connection Manager Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory.
Windows
msrc
CVE-2021-34454MEDIUMCVSS 5.52021-07-13
CVE-2021-34454 [MEDIUM] Windows Remote Access Connection Manager Information Disclosure Vulnerability
Windows Remote Access Connection Manager Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of initialized or uninitialized memory in the process heap.
Windows Shell: Windows Shell
Microsoft: Microsoft
Impact: Information Disclosure
Exploit Status: Publicly Disclosed:No;Exploit
msrc
CVE-2021-34509MEDIUMCVSS 5.52021-07-13
CVE-2021-34509 [MEDIUM] Storage Spaces Controller Information Disclosure Vulnerability
Storage Spaces Controller Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Windows Storage Spaces Controller: Windows Storage Spaces
msrc
CVE-2021-33760MEDIUMCVSS 5.52021-07-13
CVE-2021-33760 [MEDIUM] Media Foundation Information Disclosure Vulnerability
Media Foundation Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory.
Microsoft Windows Codecs Library: Microsoft Windows Code
msrc
CVE-2021-33764MEDIUMCVSS 5.92021-07-13
CVE-2021-33764 [MEDIUM] Windows Key Distribution Center Information Disclosure Vulnerability
Windows Key Distribution Center Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The vulnerable component uses a weak encryption algorithm or cipher. Traffic sent over a network by the vulnerable component could be decrypted and expose information related to a user or service's active session.
Windows Key Distribution Center: Windows Key Distr
msrc
CVE-2021-31968HIGHCVSS 7.52021-06-08
CVE-2021-31968 [HIGH] Windows Remote Desktop Services Denial of Service Vulnerability
Windows Remote Desktop Services Denial of Service Vulnerability
Windows Remote Desktop: Windows Remote Desktop
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003646
Reference: ht
msrc
CVE-2021-31952HIGHCVSS 7.82021-06-08
CVE-2021-31952 [HIGH] Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
Windows Kernel-Mode Drivers: Windows Kernel-Mode Drivers
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003646
msrc
CVE-2021-33739HIGHCVSS 8.4KEV2021-06-08
CVE-2021-33739 [HIGH] Microsoft DWM Core Library Elevation of Privilege Vulnerability
Microsoft DWM Core Library Elevation of Privilege Vulnerability
FAQ: How could an attacker exploit this vulnerability?
This vulnerability is subject to a local escalation of privilege attack. The attacker would most likely arrange to run an executable or script on the local computer. An attacker could gain access to the computer through a variety of methods, such as via a phishing attack where a user clicks an
msrc
CVE-2021-31977HIGHCVSS 8.62021-06-08
CVE-2021-31977 [HIGH] Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
FAQ: How might an attacker attempt to exploit this vulnerability?
By sending a specially crafted message to the Hyper-V host virtualization stack, a guest VM could cause a reference count in the host virtualization stack to be leaked. In most circumstances, this would result in a memory leak on the Hyper-V host. If the leaked reference count value were to overflow, reference cou
msrc
CVE-2021-31975HIGHCVSS 7.52021-06-08
CVE-2021-31975 [HIGH] Server for NFS Information Disclosure Vulnerability
Server for NFS Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Windows Network File System: Windows Network File System
Microsoft: Microsoft
Im
msrc
CVE-2021-31951HIGHCVSS 7.82021-06-08
CVE-2021-31951 [HIGH] Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003646
Reference: https://support.microsoft.com/help/500
msrc
CVE-2021-31974HIGHCVSS 7.52021-06-08
CVE-2021-31974 [HIGH] Server for NFS Denial of Service Vulnerability
Server for NFS Denial of Service Vulnerability
Windows Network File System: Windows Network File System
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003646
Reference: https://support.microsoft.c
msrc
CVE-2021-31976HIGHCVSS 7.52021-06-08
CVE-2021-31976 [HIGH] Server for NFS Information Disclosure Vulnerability
Server for NFS Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Windows Network File System: Windows Network File System
Microsoft: Microsoft
Im
msrc
CVE-2021-31969HIGHCVSS 7.82021-06-08
CVE-2021-31969 [HIGH] Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
Windows Drivers: Windows Drivers
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003646
msrc
CVE-2021-31970MEDIUMCVSS 5.52021-06-08
CVE-2021-31970 [MEDIUM] Windows TCP/IP Driver Security Feature Bypass Vulnerability
Windows TCP/IP Driver Security Feature Bypass Vulnerability
Windows TCP/IP: Windows TCP/IP
Microsoft: Microsoft
Impact: Security Feature Bypass
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003646
Reference: https://support.mic
msrc
CVE-2021-31972MEDIUMCVSS 5.52021-06-08
CVE-2021-31972 [MEDIUM] Event Tracing for Windows Information Disclosure Vulnerability
Event Tracing for Windows Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory.
Windows Event Logging Service: Windows
msrc
CVE-2021-31960MEDIUMCVSS 5.52021-06-08
CVE-2021-31960 [MEDIUM] Windows Bind Filter Driver Information Disclosure Vulnerability
Windows Bind Filter Driver Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory.
Windows Bind Filter Driver: Windows
msrc
CVE-2021-31955MEDIUMCVSS 5.5KEV2021-06-08
CVE-2021-31955 [MEDIUM] Windows Kernel Information Disclosure Vulnerability
Windows Kernel Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Impact: Information Disclo
msrc