Total
4185 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-34499 | 1 Microsoft | 4 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 1 more | 2023-12-28 | 4.0 MEDIUM | 6.5 MEDIUM |
Windows DNS Server Denial of Service Vulnerability | |||||
CVE-2021-34498 | 1 Microsoft | 8 Windows 10, Windows 7, Windows 8.1 and 5 more | 2023-12-28 | 7.2 HIGH | 7.8 HIGH |
Windows GDI Elevation of Privilege Vulnerability | |||||
CVE-2021-34447 | 1 Microsoft | 8 Windows 10, Windows 7, Windows 8.1 and 5 more | 2023-12-28 | 6.8 MEDIUM | 6.8 MEDIUM |
Windows MSHTML Platform Remote Code Execution Vulnerability | |||||
CVE-2021-33773 | 1 Microsoft | 6 Windows 10, Windows 8.1, Windows Rt 8.1 and 3 more | 2023-12-28 | 4.6 MEDIUM | 7.8 HIGH |
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability | |||||
CVE-2021-34525 | 1 Microsoft | 3 Windows Server 2012, Windows Server 2016, Windows Server 2019 | 2023-12-28 | 6.5 MEDIUM | 8.8 HIGH |
Windows DNS Server Remote Code Execution Vulnerability | |||||
CVE-2021-33780 | 1 Microsoft | 4 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 1 more | 2023-12-28 | 6.5 MEDIUM | 8.8 HIGH |
Windows DNS Server Remote Code Execution Vulnerability | |||||
CVE-2021-34491 | 1 Microsoft | 6 Windows 10, Windows 8.1, Windows Rt 8.1 and 3 more | 2023-12-28 | 4.9 MEDIUM | 5.5 MEDIUM |
Win32k Information Disclosure Vulnerability | |||||
CVE-2021-33745 | 1 Microsoft | 4 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 1 more | 2023-12-28 | 4.0 MEDIUM | 6.5 MEDIUM |
Windows DNS Server Denial of Service Vulnerability | |||||
CVE-2021-33756 | 1 Microsoft | 8 Windows 10, Windows 7, Windows 8.1 and 5 more | 2023-12-28 | 6.8 MEDIUM | 8.8 HIGH |
Windows DNS Snap-in Remote Code Execution Vulnerability | |||||
CVE-2021-34446 | 1 Microsoft | 8 Windows 10, Windows 7, Windows 8.1 and 5 more | 2023-12-28 | 6.8 MEDIUM | 8.0 HIGH |
Windows HTML Platforms Security Feature Bypass Vulnerability | |||||
CVE-2021-34504 | 1 Microsoft | 8 Windows 10, Windows 7, Windows 8.1 and 5 more | 2023-12-28 | 6.8 MEDIUM | 7.8 HIGH |
Windows Address Book Remote Code Execution Vulnerability | |||||
CVE-2021-33763 | 1 Microsoft | 6 Windows 10, Windows 8.1, Windows Rt 8.1 and 3 more | 2023-12-28 | 2.1 LOW | 5.5 MEDIUM |
Windows Remote Access Connection Manager Information Disclosure Vulnerability | |||||
CVE-2021-34458 | 1 Microsoft | 2 Windows Server 2016, Windows Server 2019 | 2023-12-28 | 9.0 HIGH | 9.9 CRITICAL |
Windows Kernel Remote Code Execution Vulnerability | |||||
CVE-2021-34462 | 1 Microsoft | 3 Windows 10, Windows Server 2016, Windows Server 2019 | 2023-12-28 | 4.6 MEDIUM | 7.0 HIGH |
Windows AppX Deployment Extensions Elevation of Privilege Vulnerability | |||||
CVE-2021-33785 | 1 Microsoft | 3 Windows 10, Windows Server 2016, Windows Server 2019 | 2023-12-28 | 5.0 MEDIUM | 7.5 HIGH |
Windows AF_UNIX Socket Provider Denial of Service Vulnerability | |||||
CVE-2021-33746 | 1 Microsoft | 4 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 1 more | 2023-12-28 | 6.5 MEDIUM | 8.0 HIGH |
Windows DNS Server Remote Code Execution Vulnerability | |||||
CVE-2021-33774 | 1 Microsoft | 3 Windows 10, Windows Server 2016, Windows Server 2019 | 2023-12-28 | 4.6 MEDIUM | 7.0 HIGH |
Windows Event Tracing Elevation of Privilege Vulnerability | |||||
CVE-2021-33764 | 1 Microsoft | 4 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 1 more | 2023-12-28 | 4.3 MEDIUM | 5.9 MEDIUM |
Windows Key Distribution Center Information Disclosure Vulnerability | |||||
CVE-2021-33750 | 1 Microsoft | 8 Windows 10, Windows 7, Windows 8.1 and 5 more | 2023-12-28 | 6.8 MEDIUM | 8.8 HIGH |
Windows DNS Snap-in Remote Code Execution Vulnerability | |||||
CVE-2021-34481 | 1 Microsoft | 8 Windows 10, Windows 7, Windows 8.1 and 5 more | 2023-12-28 | 7.5 HIGH | 8.8 HIGH |
<p>A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p><strong>UPDATE</strong> August 10, 2021: Microsoft has completed the investigation and has released security updates to address this vulnerability. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. This security update changes the Point and Print default behavior; please see <a href="https://support.microsoft.com/help/5005652">KB5005652</a>.</p> |