Msrc Windows Server Version 2004 vulnerabilities

499 known vulnerabilities affecting msrc/windows_server_version_2004.

Total CVEs
499
CISA KEV
15
actively exploited
Public exploits
6
Exploited in wild
15
Severity breakdown
CRITICAL15HIGH346MEDIUM137LOW1

Vulnerabilities

Page 7 of 25
CVE-2021-34444MEDIUMCVSS 6.52021-07-13
CVE-2021-34444 [MEDIUM] Windows DNS Server Denial of Service Vulnerability Windows DNS Server Denial of Service Vulnerability FAQ: If my server is not configured to be a DNS server, it is vulnerable? No, this vulnerability is only exploitable if the server is configured to be a DNS server. Role: DNS Server: Role: DNS Server Microsoft: Microsoft Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release
msrc
CVE-2021-34493MEDIUMCVSS 6.72021-07-13
CVE-2021-34493 [MEDIUM] Windows Partition Management Driver Elevation of Privilege Vulnerability Windows Partition Management Driver Elevation of Privilege Vulnerability Windows Partition Management Driver: Windows Partition Management Driver Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.
msrc
CVE-2021-33763MEDIUMCVSS 5.52021-07-13
CVE-2021-33763 [MEDIUM] Windows Remote Access Connection Manager Information Disclosure Vulnerability Windows Remote Access Connection Manager Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory. Windows
msrc
CVE-2021-34454MEDIUMCVSS 5.52021-07-13
CVE-2021-34454 [MEDIUM] Windows Remote Access Connection Manager Information Disclosure Vulnerability Windows Remote Access Connection Manager Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of initialized or uninitialized memory in the process heap. Windows Shell: Windows Shell Microsoft: Microsoft Impact: Information Disclosure Exploit Status: Publicly Disclosed:No;Exploit
msrc
CVE-2021-34509MEDIUMCVSS 5.52021-07-13
CVE-2021-34509 [MEDIUM] Storage Spaces Controller Information Disclosure Vulnerability Storage Spaces Controller Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process. Windows Storage Spaces Controller: Windows Storage Spaces
msrc
CVE-2021-33760MEDIUMCVSS 5.52021-07-13
CVE-2021-33760 [MEDIUM] Media Foundation Information Disclosure Vulnerability Media Foundation Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory. Microsoft Windows Codecs Library: Microsoft Windows Code
msrc
CVE-2021-33764MEDIUMCVSS 5.92021-07-13
CVE-2021-33764 [MEDIUM] Windows Key Distribution Center Information Disclosure Vulnerability Windows Key Distribution Center Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The vulnerable component uses a weak encryption algorithm or cipher. Traffic sent over a network by the vulnerable component could be decrypted and expose information related to a user or service's active session. Windows Key Distribution Center: Windows Key Distr
msrc
CVE-2021-31968HIGHCVSS 7.52021-06-08
CVE-2021-31968 [HIGH] Windows Remote Desktop Services Denial of Service Vulnerability Windows Remote Desktop Services Denial of Service Vulnerability Windows Remote Desktop: Windows Remote Desktop Microsoft: Microsoft Impact: Denial of Service Exploit Status: Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003646 Reference: ht
msrc
CVE-2021-31952HIGHCVSS 7.82021-06-08
CVE-2021-31952 [HIGH] Windows Kernel-Mode Driver Elevation of Privilege Vulnerability Windows Kernel-Mode Driver Elevation of Privilege Vulnerability Windows Kernel-Mode Drivers: Windows Kernel-Mode Drivers Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003646
msrc
CVE-2021-33739HIGHCVSS 8.4KEV2021-06-08
CVE-2021-33739 [HIGH] Microsoft DWM Core Library Elevation of Privilege Vulnerability Microsoft DWM Core Library Elevation of Privilege Vulnerability FAQ: How could an attacker exploit this vulnerability? This vulnerability is subject to a local escalation of privilege attack. The attacker would most likely arrange to run an executable or script on the local computer. An attacker could gain access to the computer through a variety of methods, such as via a phishing attack where a user clicks an
msrc
CVE-2021-31977HIGHCVSS 8.62021-06-08
CVE-2021-31977 [HIGH] Windows Hyper-V Denial of Service Vulnerability Windows Hyper-V Denial of Service Vulnerability FAQ: How might an attacker attempt to exploit this vulnerability? By sending a specially crafted message to the Hyper-V host virtualization stack, a guest VM could cause a reference count in the host virtualization stack to be leaked. In most circumstances, this would result in a memory leak on the Hyper-V host. If the leaked reference count value were to overflow, reference cou
msrc
CVE-2021-31975HIGHCVSS 7.52021-06-08
CVE-2021-31975 [HIGH] Server for NFS Information Disclosure Vulnerability Server for NFS Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process. Windows Network File System: Windows Network File System Microsoft: Microsoft Im
msrc
CVE-2021-31951HIGHCVSS 7.82021-06-08
CVE-2021-31951 [HIGH] Windows Kernel Elevation of Privilege Vulnerability Windows Kernel Elevation of Privilege Vulnerability Windows Kernel: Windows Kernel Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003646 Reference: https://support.microsoft.com/help/500
msrc
CVE-2021-31974HIGHCVSS 7.52021-06-08
CVE-2021-31974 [HIGH] Server for NFS Denial of Service Vulnerability Server for NFS Denial of Service Vulnerability Windows Network File System: Windows Network File System Microsoft: Microsoft Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003646 Reference: https://support.microsoft.c
msrc
CVE-2021-31976HIGHCVSS 7.52021-06-08
CVE-2021-31976 [HIGH] Server for NFS Information Disclosure Vulnerability Server for NFS Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process. Windows Network File System: Windows Network File System Microsoft: Microsoft Im
msrc
CVE-2021-31969HIGHCVSS 7.82021-06-08
CVE-2021-31969 [HIGH] Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Windows Drivers: Windows Drivers Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003646
msrc
CVE-2021-31970MEDIUMCVSS 5.52021-06-08
CVE-2021-31970 [MEDIUM] Windows TCP/IP Driver Security Feature Bypass Vulnerability Windows TCP/IP Driver Security Feature Bypass Vulnerability Windows TCP/IP: Windows TCP/IP Microsoft: Microsoft Impact: Security Feature Bypass Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003646 Reference: https://support.mic
msrc
CVE-2021-31972MEDIUMCVSS 5.52021-06-08
CVE-2021-31972 [MEDIUM] Event Tracing for Windows Information Disclosure Vulnerability Event Tracing for Windows Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory. Windows Event Logging Service: Windows
msrc
CVE-2021-31960MEDIUMCVSS 5.52021-06-08
CVE-2021-31960 [MEDIUM] Windows Bind Filter Driver Information Disclosure Vulnerability Windows Bind Filter Driver Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory. Windows Bind Filter Driver: Windows
msrc
CVE-2021-31955MEDIUMCVSS 5.5KEV2021-06-08
CVE-2021-31955 [MEDIUM] Windows Kernel Information Disclosure Vulnerability Windows Kernel Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process. Windows Kernel: Windows Kernel Microsoft: Microsoft Impact: Information Disclo
msrc
Msrc Windows Server Version 2004 vulnerabilities | cvebase