Msrc Windows Server Version 20H2 vulnerabilities

473 known vulnerabilities affecting msrc/windows_server_version_20h2.

Total CVEs
473
CISA KEV
17
actively exploited
Public exploits
8
Exploited in wild
19
Severity breakdown
CRITICAL18HIGH323MEDIUM130LOW2

Vulnerabilities

Page 12 of 24
CVE-2021-41334HIGHCVSS 7.02021-10-12
CVE-2021-41334 [HIGH] Windows Desktop Bridge Elevation of Privilege Vulnerability Windows Desktop Bridge Elevation of Privilege Vulnerability Windows Desktop Bridge: Windows Desktop Bridge Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006670 Reference: https:
msrc
CVE-2021-40464HIGHCVSS 8.02021-10-12
CVE-2021-40464 [HIGH] Windows Nearby Sharing Elevation of Privilege Vulnerability Windows Nearby Sharing Elevation of Privilege Vulnerability Windows Nearby Sharing: Windows Nearby Sharing Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006672 Reference: https:
msrc
CVE-2021-41347HIGHCVSS 7.82021-10-12
CVE-2021-41347 [HIGH] Windows AppX Deployment Service Elevation of Privilege Vulnerability Windows AppX Deployment Service Elevation of Privilege Vulnerability Windows AppX Deployment Service: Windows AppX Deployment Service Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search
msrc
CVE-2021-41357HIGHCVSS 7.8KEV2021-10-12
CVE-2021-41357 [HIGH] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Windows Win32K: Windows Win32K Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006670 Reference: https://support.microsoft.com/help/5006670 Reference:
msrc
CVE-2021-40462HIGHCVSS 7.82021-10-12
CVE-2021-40462 [HIGH] Windows Media Foundation Dolby Digital Atmos Decoders Remote Code Execution Vulnerability Windows Media Foundation Dolby Digital Atmos Decoders Remote Code Execution Vulnerability Microsoft Windows Codecs Library: Microsoft Windows Codecs Library Microsoft: Microsoft Impact: Remote Code Execution Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://
msrc
CVE-2021-40475MEDIUMCVSS 5.52021-10-12
CVE-2021-40475 [MEDIUM] Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process. Windows Cloud Files Mini Filter
msrc
CVE-2021-41346MEDIUMCVSS 5.32021-10-12
CVE-2021-41346 [MEDIUM] Console Window Host Security Feature Bypass Vulnerability Console Window Host Security Feature Bypass Vulnerability Console Window Host: Console Window Host Microsoft: Microsoft Impact: Security Feature Bypass Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006670 Reference: https://suppo
msrc
CVE-2021-41361MEDIUMCVSS 5.42021-10-12
CVE-2021-41361 [MEDIUM] Active Directory Federation Server Spoofing Vulnerability Active Directory Federation Server Spoofing Vulnerability FAQ: How could an attacker exploit this vulnerability? The ADFS (Active Directory Federation Services) services are vulnerable during the logout redirect request to cross-site scripting of the post logout redirect URI. An attacker who successfully exploited this vulnerability could leave an application using this ADFS library vulnerable to common XSS attack
msrc
CVE-2021-40456MEDIUMCVSS 5.32021-10-12
CVE-2021-40456 [MEDIUM] Windows AD FS Security Feature Bypass Vulnerability Windows AD FS Security Feature Bypass Vulnerability FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? This vulnerability could allow an attacker to bypass ADFS BannedIPList entries for WS-Trust workflows. Role: Windows AD FS Server: Role: Windows AD FS Server Microsoft: Microsoft Impact: Security Feature Bypass Exploit Status: Publicly Disclosed:No;Exploited:No;Lates
msrc
CVE-2021-41339MEDIUMCVSS 4.72021-10-12
CVE-2021-41339 [MEDIUM] Microsoft DWM Core Library Elevation of Privilege Vulnerability Microsoft DWM Core Library Elevation of Privilege Vulnerability Windows DWM Core Library: Windows DWM Core Library Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006667 Ref
msrc
CVE-2021-41337MEDIUMCVSS 4.92021-10-12
CVE-2021-41337 [MEDIUM] Active Directory Security Feature Bypass Vulnerability Active Directory Security Feature Bypass Vulnerability FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? This vulnerability could allow an attacker to bypass Active Directory domain permissions for Key Admins groups. Role: Windows Active Directory Server: Role: Windows Active Directory Server Microsoft: Microsoft Impact: Security Feature Bypass Exploit Status: Pub
msrc
CVE-2021-40468MEDIUMCVSS 5.52021-10-12
CVE-2021-40468 [MEDIUM] Windows Bind Filter Driver Information Disclosure Vulnerability Windows Bind Filter Driver Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process. Windows Bind Filter Driver: Windows Bind Filter Driver
msrc
CVE-2021-41338MEDIUMCVSS 5.52021-10-12
CVE-2021-41338 [MEDIUM] Windows AppContainer Firewall Rules Security Feature Bypass Vulnerability Windows AppContainer Firewall Rules Security Feature Bypass Vulnerability Windows AppContainer: Windows AppContainer Microsoft: Microsoft Impact: Security Feature Bypass Exploit Status: Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=
msrc
CVE-2021-36975HIGHCVSS 7.82021-09-14
CVE-2021-36975 [HIGH] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Windows Win32K: Windows Win32K Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568 Reference: https://support.microsoft.com/help/5005568 Reference:
msrc
CVE-2021-38634HIGHCVSS 7.12021-09-14
CVE-2021-38634 [HIGH] Microsoft Windows Update Client Elevation of Privilege Vulnerability Microsoft Windows Update Client Elevation of Privilege Vulnerability Windows Update: Windows Update Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568 Reference: http
msrc
CVE-2021-36973HIGHCVSS 7.82021-09-14
CVE-2021-36973 [HIGH] Windows Redirected Drive Buffering System Elevation of Privilege Vulnerability Windows Redirected Drive Buffering System Elevation of Privilege Vulnerability Windows Redirected Drive Buffering: Windows Redirected Drive Buffering Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.mi
msrc
CVE-2021-36954HIGHCVSS 8.82021-09-14
CVE-2021-36954 [HIGH] Windows Bind Filter Driver Elevation of Privilege Vulnerability Windows Bind Filter Driver Elevation of Privilege Vulnerability Windows Bind Filter Driver: Windows Bind Filter Driver Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568 R
msrc
CVE-2021-36967HIGHCVSS 8.02021-09-14
CVE-2021-36967 [HIGH] Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability Windows WLAN Service: Windows WLAN Service Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568 Ref
msrc
CVE-2021-36966HIGHCVSS 7.82021-09-14
CVE-2021-36966 [HIGH] Windows Subsystem for Linux Elevation of Privilege Vulnerability Windows Subsystem for Linux Elevation of Privilege Vulnerability Windows Subsystem for Linux: Windows Subsystem for Linux Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB500556
msrc
CVE-2021-38637MEDIUMCVSS 5.52021-09-14
CVE-2021-38637 [MEDIUM] Windows Storage Information Disclosure Vulnerability Windows Storage Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is unauthorized file system access - reading from the file system. Windows Storage: Windows Storage Microsoft: Microsoft Impact: Information Disclosure Exploit Status: Publicly Disclosed:N
msrc