Msrc Windows Server Version 2004 vulnerabilities
499 known vulnerabilities affecting msrc/windows_server_version_2004.
Total CVEs
499
CISA KEV
15
actively exploited
Public exploits
6
Exploited in wild
15
Severity breakdown
CRITICAL15HIGH346MEDIUM137LOW1
Vulnerabilities
Page 9 of 25
CVE-2021-28436HIGHCVSS 7.82021-04-13
CVE-2021-28436 [HIGH] Windows Speech Runtime Elevation of Privilege Vulnerability
Windows Speech Runtime Elevation of Privilege Vulnerability
Microsoft Windows Speech: Microsoft Windows Speech
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5001339
Reference: ht
msrc
CVE-2021-28314HIGHCVSS 7.82021-04-13
CVE-2021-28314 [HIGH] Windows Hyper-V Elevation of Privilege Vulnerability
Windows Hyper-V Elevation of Privilege Vulnerability
Role: Windows Hyper-V: Role: Windows Hyper-V
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5001342
Reference: https://support.micros
msrc
CVE-2021-28321HIGHCVSS 7.82021-04-13
CVE-2021-28321 [HIGH] Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
Windows Diagnostic Hub: Windows Diagnostic Hub
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Se
msrc
CVE-2021-28319HIGHCVSS 7.52021-04-13
CVE-2021-28319 [HIGH] Windows TCP/IP Driver Denial of Service Vulnerability
Windows TCP/IP Driver Denial of Service Vulnerability
Windows TCP/IP: Windows TCP/IP
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5001339
Reference: https://catalog.update.microsoft.com/v7
msrc
CVE-2021-27090HIGHCVSS 7.82021-04-13
CVE-2021-27090 [HIGH] Windows Secure Kernel Mode Elevation of Privilege Vulnerability
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
Windows Secure Kernel Mode: Windows Secure Kernel Mode
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5001330
R
msrc
CVE-2021-27088HIGHCVSS 7.82021-04-13
CVE-2021-27088 [HIGH] Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing: Windows Event Tracing
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5001339
Reference: https://ca
msrc
CVE-2021-28347HIGHCVSS 7.82021-04-13
CVE-2021-28347 [HIGH] Windows Speech Runtime Elevation of Privilege Vulnerability
Windows Speech Runtime Elevation of Privilege Vulnerability
Microsoft Windows Speech: Microsoft Windows Speech
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5001339
Reference: ht
msrc
CVE-2021-28445HIGHCVSS 8.12021-04-13
CVE-2021-28445 [HIGH] Windows Network File System Remote Code Execution Vulnerability
Windows Network File System Remote Code Execution Vulnerability
Windows Network File System: Windows Network File System
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5001342
msrc
CVE-2021-28351HIGHCVSS 7.82021-04-13
CVE-2021-28351 [HIGH] Windows Speech Runtime Elevation of Privilege Vulnerability
Windows Speech Runtime Elevation of Privilege Vulnerability
Microsoft Windows Speech: Microsoft Windows Speech
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5001339
Reference: ht
msrc
CVE-2021-28446HIGHCVSS 7.12021-04-13
CVE-2021-28446 [HIGH] Windows Portmapping Information Disclosure Vulnerability
Windows Portmapping Information Disclosure Vulnerability
Description: N/A
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.
Windows Portmapping: Windows Portmapping
Microsoft: Microsoft
Impact: Information Disclosure
Exploit Status: Publicly Disclosed:No;Exploite
msrc
CVE-2021-28324HIGHCVSS 7.52021-04-13
CVE-2021-28324 [HIGH] Windows SMB Information Disclosure Vulnerability
Windows SMB Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory and kernel memory - unintentional read access to memory contents in kernel space from a user mode process.
Windows SMB Server: Windows SMB Server
Microsoft: Microsoft
Impact:
msrc
CVE-2021-28442MEDIUMCVSS 6.52021-04-13
CVE-2021-28442 [MEDIUM] Windows TCP/IP Information Disclosure Vulnerability
Windows TCP/IP Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.
Windows TCP/IP: Windows TCP/IP
Microsoft: Microsoft
Impact: Information Disclosure
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploit
msrc
CVE-2021-28441MEDIUMCVSS 6.52021-04-13
CVE-2021-28441 [MEDIUM] Windows Hyper-V Information Disclosure Vulnerability
Windows Hyper-V Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is Guest VM to Hyper-V host server - virtualization security boundary.
Role: Windows Hyper-V: Role: Windows Hyper-V
Microsoft: Microsoft
Impact: Information Disclosure
Exploit Status: Publ
msrc
CVE-2021-28435MEDIUMCVSS 5.52021-04-13
CVE-2021-28435 [MEDIUM] Windows Event Tracing Information Disclosure Vulnerability
Windows Event Tracing Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory.
Windows Event Tracing: Windows Event Tracing
msrc
CVE-2021-28438MEDIUMCVSS 5.52021-04-13
CVE-2021-28438 [MEDIUM] Windows Console Driver Denial of Service Vulnerability
Windows Console Driver Denial of Service Vulnerability
Windows Console Driver: Windows Console Driver
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5001339
Reference: https://catalog.upd
msrc
CVE-2021-27079MEDIUMCVSS 5.72021-04-13
CVE-2021-27079 [MEDIUM] Windows Media Photo Codec Information Disclosure Vulnerability
Windows Media Photo Codec Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.
Microsoft Windows Codecs Library: Microsoft Windows Codecs Library
Microsoft: Microsoft
Impact: Information Disclosure
Exploit Status: Publicly
msrc
CVE-2021-27094MEDIUMCVSS 4.42021-04-13
CVE-2021-27094 [MEDIUM] Windows Early Launch Antimalware Driver Security Feature Bypass Vulnerability
Windows Early Launch Antimalware Driver Security Feature Bypass Vulnerability
Windows ELAM: Windows ELAM
Microsoft: Microsoft
Impact: Security Feature Bypass
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5001339
msrc
CVE-2021-28444MEDIUMCVSS 5.72021-04-13
CVE-2021-28444 [MEDIUM] Windows Hyper-V Security Feature Bypass Vulnerability
Windows Hyper-V Security Feature Bypass Vulnerability
FAQ: What configurations or versions could be at risk from this vulnerability?
This bypass could affect any Hyper-V configurations that are using Router Guard.
What is the exposure if the vulnerability was bypassed?
Certain packets that would normally be blocked or dropped could be processed. This could allow an attacker to bypass set policy, potentially influencin
msrc
CVE-2021-26417MEDIUMCVSS 5.52021-04-13
CVE-2021-26417 [MEDIUM] Windows Overlay Filter Information Disclosure Vulnerability
Windows Overlay Filter Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory.
Windows Overlay Filter: Windows Overlay Filt
msrc
CVE-2021-28325MEDIUMCVSS 6.52021-04-13
CVE-2021-28325 [MEDIUM] Windows SMB Information Disclosure Vulnerability
Windows SMB Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory and kernel memory - unintentional read access to memory contents in kernel space from a user mode process.
Windows SMB Server: Windows SMB Server
Microsoft: Microsoft
Impact
msrc