U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Keyword (text search): cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*
  • CPE Name Search: true
There are 1,228 matching records.
Displaying matches 341 through 360.
Vuln ID Summary CVSS Severity
CVE-2021-26896

Windows DNS Server Denial of Service Vulnerability

Published: March 11, 2021; 11:15:16 AM -0500
V4.0:(not available)
V3.1: 7.5 HIGH
V2.0: 5.0 MEDIUM
CVE-2021-26895

Windows DNS Server Remote Code Execution Vulnerability

Published: March 11, 2021; 11:15:16 AM -0500
V4.0:(not available)
V3.1: 9.8 CRITICAL
V2.0: 10.0 HIGH
CVE-2021-26894

Windows DNS Server Remote Code Execution Vulnerability

Published: March 11, 2021; 11:15:16 AM -0500
V4.0:(not available)
V3.1: 9.8 CRITICAL
V2.0: 10.0 HIGH
CVE-2021-26893

Windows DNS Server Remote Code Execution Vulnerability

Published: March 11, 2021; 11:15:16 AM -0500
V4.0:(not available)
V3.1: 9.8 CRITICAL
V2.0: 7.5 HIGH
CVE-2021-26892

Windows Extensible Firmware Interface Security Feature Bypass Vulnerability

Published: March 11, 2021; 11:15:16 AM -0500
V4.0:(not available)
V3.1: 6.2 MEDIUM
V2.0: 2.1 LOW
CVE-2021-26891

Windows Container Execution Agent Elevation of Privilege Vulnerability

Published: March 11, 2021; 11:15:16 AM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2021-26889

Windows Update Stack Elevation of Privilege Vulnerability

Published: March 11, 2021; 11:15:15 AM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2021-26887

<p>An elevation of privilege vulnerability exists in Microsoft Windows when Folder redirection has been enabled via Group Policy. When folder redirection file server is co-located with Terminal server, an attacker who successfully exploited the vulnerability would be able to begin redirecting another user's personal data to a created folder.</p> <p>To exploit the vulnerability, an attacker can create a new folder under the Folder Redirection root path and create a junction on a newly created User folder. When the new user logs in, Folder Redirection would start redirecting to the folder and copying personal data.</p> <p>This elevation of privilege vulnerability can only be addressed by reconfiguring Folder Redirection with Offline files and restricting permissions, and NOT via a security update for affected Windows Servers. See the <strong>FAQ</strong> section of this CVE for configuration guidance.</p>

Published: March 11, 2021; 11:15:15 AM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2021-26886

User Profile Service Denial of Service Vulnerability

Published: March 11, 2021; 11:15:15 AM -0500
V4.0:(not available)
V3.1: 6.1 MEDIUM
V2.0: 3.6 LOW
CVE-2021-26884

Windows Media Photo Codec Information Disclosure Vulnerability

Published: March 11, 2021; 11:15:15 AM -0500
V4.0:(not available)
V3.1: 5.5 MEDIUM
V2.0: 2.1 LOW
CVE-2021-26882

Remote Access API Elevation of Privilege Vulnerability

Published: March 11, 2021; 11:15:15 AM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2021-26881

Microsoft Windows Media Foundation Remote Code Execution Vulnerability

Published: March 11, 2021; 11:15:15 AM -0500
V4.0:(not available)
V3.1: 7.5 HIGH
V2.0: 6.5 MEDIUM
CVE-2021-26880

Storage Spaces Controller Elevation of Privilege Vulnerability

Published: March 11, 2021; 11:15:15 AM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2021-26879

Windows Network Address Translation (NAT) Denial of Service Vulnerability

Published: March 11, 2021; 11:15:15 AM -0500
V4.0:(not available)
V3.1: 7.5 HIGH
V2.0: 5.0 MEDIUM
CVE-2021-26878

Windows Print Spooler Elevation of Privilege Vulnerability

Published: March 11, 2021; 11:15:15 AM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2021-26877

Windows DNS Server Remote Code Execution Vulnerability

Published: March 11, 2021; 11:15:15 AM -0500
V4.0:(not available)
V3.1: 9.8 CRITICAL
V2.0: 7.5 HIGH
CVE-2021-26876

OpenType Font Parsing Remote Code Execution Vulnerability

Published: March 11, 2021; 11:15:15 AM -0500
V4.0:(not available)
V3.1: 8.8 HIGH
V2.0: 6.8 MEDIUM
CVE-2021-26875

Windows Win32k Elevation of Privilege Vulnerability

Published: March 11, 2021; 11:15:15 AM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2021-26874

Windows Overlay Filter Elevation of Privilege Vulnerability

Published: March 11, 2021; 11:15:14 AM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2021-26873

Windows User Profile Service Elevation of Privilege Vulnerability

Published: March 11, 2021; 11:15:14 AM -0500
V4.0:(not available)
V3.1: 7.0 HIGH
V2.0: 4.6 MEDIUM