Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.818810
Category:Windows : Microsoft Bulletins
Title:Microsoft Windows Multiple Vulnerabilities (KB5006669)
Summary:This host is missing a critical security; update according to Microsoft KB5006669
Description:Summary:
This host is missing a critical security
update according to Microsoft KB5006669

Vulnerability Insight:
Multiple flaws exist due to:

- An error in Windows Installer.

- An error in Windows Print Spooler.

- An elevation of privilege vulnerability in Windows AppX Deployment Service.

- An elevation of privilege vulnerability in Windows AppContainer.

For more information about the vulnerabilities refer to Reference links.

Vulnerability Impact:
Successful exploitation will allow an attacker
to disclose sensitive information, perform remote code execution, cause
denial of service condition, conduct spoofing and elevate privileges.

Affected Software/OS:
- Microsoft Windows 10 Version 1607 for 32-bit Systems

- Microsoft Windows 10 Version 1607 for x64-based Systems

- Microsoft Windows Server 2016

Solution:
The vendor has released updates. Please see
the references for more information.

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-38662
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38662
Common Vulnerability Exposure (CVE) ID: CVE-2021-38663
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38663
Common Vulnerability Exposure (CVE) ID: CVE-2021-40443
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40443
Common Vulnerability Exposure (CVE) ID: CVE-2021-40449
http://packetstormsecurity.com/files/164926/Win32k-NtGdiResetDC-Use-After-Free-Local-Privilege-Escalation.html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40449
Common Vulnerability Exposure (CVE) ID: CVE-2021-40454
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40454
Common Vulnerability Exposure (CVE) ID: CVE-2021-40455
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40455
Common Vulnerability Exposure (CVE) ID: CVE-2021-40460
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40460
Common Vulnerability Exposure (CVE) ID: CVE-2021-40463
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40463
Common Vulnerability Exposure (CVE) ID: CVE-2021-40465
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40465
Common Vulnerability Exposure (CVE) ID: CVE-2021-40466
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40466
Common Vulnerability Exposure (CVE) ID: CVE-2021-40467
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40467
Common Vulnerability Exposure (CVE) ID: CVE-2021-40469
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40469
Common Vulnerability Exposure (CVE) ID: CVE-2021-40470
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40470
Common Vulnerability Exposure (CVE) ID: CVE-2021-40476
http://packetstormsecurity.com/files/164942/Microsoft-Windows-WSAQuerySocketSecurity-AppContainer-Privilege-Escalation.html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40476
Common Vulnerability Exposure (CVE) ID: CVE-2021-40477
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40477
Common Vulnerability Exposure (CVE) ID: CVE-2021-40478
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40478
https://www.zerodayinitiative.com/advisories/ZDI-21-1155/
Common Vulnerability Exposure (CVE) ID: CVE-2021-40488
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40488
https://www.zerodayinitiative.com/advisories/ZDI-21-1153/
Common Vulnerability Exposure (CVE) ID: CVE-2021-40489
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40489
https://www.zerodayinitiative.com/advisories/ZDI-21-1156/
Common Vulnerability Exposure (CVE) ID: CVE-2021-41331
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41331
Common Vulnerability Exposure (CVE) ID: CVE-2021-41332
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41332
Common Vulnerability Exposure (CVE) ID: CVE-2021-41335
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41335
Common Vulnerability Exposure (CVE) ID: CVE-2021-41337
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41337
Common Vulnerability Exposure (CVE) ID: CVE-2021-41338
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41338
Common Vulnerability Exposure (CVE) ID: CVE-2021-41340
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41340
Common Vulnerability Exposure (CVE) ID: CVE-2021-41342
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41342
Common Vulnerability Exposure (CVE) ID: CVE-2021-41343
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41343
Common Vulnerability Exposure (CVE) ID: CVE-2021-41345
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41345
https://www.zerodayinitiative.com/advisories/ZDI-21-1154/
Common Vulnerability Exposure (CVE) ID: CVE-2021-41347
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41347
https://www.zerodayinitiative.com/advisories/ZDI-21-1161/
Common Vulnerability Exposure (CVE) ID: CVE-2021-41361
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41361
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.