Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.818318
Category:Windows : Microsoft Bulletins
Title:Microsoft Windows Multiple Vulnerabilities (KB5003646)
Summary:This host is missing a critical security; update according to Microsoft KB5003646
Description:Summary:
This host is missing a critical security
update according to Microsoft KB5003646

Vulnerability Insight:
Multiple flaws exist due to:

- An error in Server for NFS.

- An error in HTML Platform.

- An error in Scripting Engine.

For more information about the vulnerabilities refer to Reference links.

Vulnerability Impact:
Successful exploitation will allow an attacker
to perform remote code execution, gain access to potentially sensitive data,
conduct DoS, bypass security features and elevate privileges.

Affected Software/OS:
- Microsoft Windows 10 Version 1809 for 32-bit Systems

- Microsoft Windows 10 Version 1809 for x64-based Systems

- Microsoft Windows Server 2019

Solution:
The vendor has released updates. Please see
the references for more information.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-1675
VU#383432
https://www.kb.cert.org/vuls/id/383432
http://packetstormsecurity.com/files/163349/Microsoft-PrintNightmare-Proof-Of-Concept.html
http://packetstormsecurity.com/files/163351/PrintNightmare-Windows-Spooler-Service-Remote-Code-Execution.html
http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-Injection.html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1675
Common Vulnerability Exposure (CVE) ID: CVE-2021-26414
http://packetstormsecurity.com/files/163206/Windows-Kerberos-AppContainer-Enterprise-Authentication-Capability-Bypass.html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26414
Common Vulnerability Exposure (CVE) ID: CVE-2021-31199
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31199
Common Vulnerability Exposure (CVE) ID: CVE-2021-31201
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31201
Common Vulnerability Exposure (CVE) ID: CVE-2021-31951
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31951
Common Vulnerability Exposure (CVE) ID: CVE-2021-31952
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31952
Common Vulnerability Exposure (CVE) ID: CVE-2021-31953
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31953
Common Vulnerability Exposure (CVE) ID: CVE-2021-31954
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31954
https://www.zerodayinitiative.com/advisories/ZDI-21-668/
Common Vulnerability Exposure (CVE) ID: CVE-2021-31955
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31955
Common Vulnerability Exposure (CVE) ID: CVE-2021-31956
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31956
Common Vulnerability Exposure (CVE) ID: CVE-2021-31958
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31958
Common Vulnerability Exposure (CVE) ID: CVE-2021-31959
http://packetstormsecurity.com/files/163056/Internet-Explorer-jscript9.dll-Memory-Corruption.html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31959
Common Vulnerability Exposure (CVE) ID: CVE-2021-31962
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31962
Common Vulnerability Exposure (CVE) ID: CVE-2021-31968
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31968
Common Vulnerability Exposure (CVE) ID: CVE-2021-31969
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31969
https://www.zerodayinitiative.com/advisories/ZDI-21-797/
Common Vulnerability Exposure (CVE) ID: CVE-2021-31970
http://packetstormsecurity.com/files/163256/Microsoft-Windows-Filtering-Platform-Token-Access-Check-Privilege-Escalation.html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31970
Common Vulnerability Exposure (CVE) ID: CVE-2021-31971
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31971
Common Vulnerability Exposure (CVE) ID: CVE-2021-31972
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31972
Common Vulnerability Exposure (CVE) ID: CVE-2021-31973
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31973
Common Vulnerability Exposure (CVE) ID: CVE-2021-31974
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31974
Common Vulnerability Exposure (CVE) ID: CVE-2021-31975
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31975
Common Vulnerability Exposure (CVE) ID: CVE-2021-31976
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31976
Common Vulnerability Exposure (CVE) ID: CVE-2021-31977
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31977
Common Vulnerability Exposure (CVE) ID: CVE-2021-33742
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33742
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.