Known vulnerabilities in Microsoft Windows Defender on Windows Server 2008

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
[] 
Main › Vulnerability Database › Microsoft › Windows Defender › on Windows Server 2008

Known vulnerabilities in Microsoft Windows Defender on Windows Server 2008

Vendor: Microsoft
Website: https://www.microsoft.com
Total Security Bulletins: 9
1.387.1114.0 - for Windows Server 2019 on Windows Server 2012 on Windows Server 2008 for Windows 10, Windows 10 1511, Windows 10 1607, Windows Server 2016, Windows 10 1703 for Windows RT 8.1 for Windows 8.1 on Windows 7 for 32-bit Systems Service Pack 1

Security bulletins (9)

Secuity bulletin Severity Status Published
SB2021020946: Privilege escalation in Microsoft Defender Low
Patched
09.02.2021
SB2021011213: Remote code execution in Microsoft Defender Critical
Patched Exploited
12.01.2021
SB2020071441: Privilege escalation in Microsoft Defender Low
Patched
14.07.2020
SB2020060936: Multiple vulnerabilities in Microsoft Windows Defender Low
Patched Exploited
09.06.2020
SB2020041415: Privilege escalation in Microsoft Defender Medium
Patched
14.04.2020
SB2019092317: Denial of service in Microsoft Defender Low
Patched
23.09.2019
SB2019081412: Deletion of arbitrary files in Microsoft Defender Low
Patched
14.08.2019
SB2018040403: Remote code execution in Microsoft Malware Protection Engine High
Patched
04.04.2018
SB2017120701: Remote code execution in Microsoft Malware Protection Engine High
Patched
07.12.2017

Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or