CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  What's the CVSS score of your company?
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Microsoft » Windows Server 2008 : Security Vulnerabilities

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2014-4114 20 3 Exec Code 2014-10-15 2018-10-12
9.3
None Remote Medium Not required Complete Complete Complete
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted OLE object in an Office document, as exploited in the wild with a "Sandworm" attack in June through October 2014, aka "Windows OLE Remote Code Execution Vulnerability."
2 CVE-2008-4037 287 2 Exec Code 2008-11-12 2018-10-30
9.3
None Remote Medium Not required Complete Complete Complete
Microsoft Windows 2000 Gold through SP4, XP Gold through SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote SMB servers to execute arbitrary code on a client machine by replaying the NTLM credentials of a client user, as demonstrated by backrush, aka "SMB Credential Reflection Vulnerability." NOTE: some reliable sources report that this vulnerability exists because of an insufficient fix for CVE-2000-0834.
3 CVE-2015-0016 22 1 +Priv Dir. Trav. 2015-01-13 2018-10-12
9.3
None Remote Medium Not required Complete Complete Complete
Directory traversal vulnerability in the TS WebProxy (aka TSWbPrxy) component in Microsoft Windows Vista SP2, Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to gain privileges via a crafted pathname in an executable file, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "Directory Traversal Elevation of Privilege Vulnerability."
4 CVE-2014-4113 264 1 +Priv 2014-10-15 2018-10-12
7.2
None Local Low Not required Complete Complete Complete
win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, as exploited in the wild in October 2014, aka "Win32k.sys Elevation of Privilege Vulnerability."
5 CVE-2013-3906 94 1 Exec Code 2013-11-06 2018-10-12
9.3
None Remote Medium Not required Complete Complete Complete
GDI+ in Microsoft Windows Vista SP2 and Server 2008 SP2; Office 2003 SP3, 2007 SP3, and 2010 SP1 and SP2; Office Compatibility Pack SP3; and Lync 2010, 2010 Attendee, 2013, and Basic 2013 allows remote attackers to execute arbitrary code via a crafted TIFF image, as demonstrated by an image in a Word document, and exploited in the wild in October and November 2013.
6 CVE-2013-3661 22 1 DoS Dir. Trav. 2013-05-24 2013-06-06
4.9
None Local Low Not required None None Complete
The EPATHOBJ::bFlatten function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not check whether linked-list traversal is continually accessing the same list member, which allows local users to cause a denial of service (infinite traversal) via vectors that trigger a crafted PATHRECORD chain.
7 CVE-2013-3660 119 1 Overflow +Priv 2013-05-24 2018-10-12
6.9
None Local Medium Not required Complete Complete Complete
The EPATHOBJ::pprFlattenRec function in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, and Windows Server 2012 does not properly initialize a pointer for the next object in a certain list, which allows local users to obtain write access to the PATHRECORD chain, and consequently gain privileges, by triggering excessive consumption of paged memory and then making many FlattenPath function calls, aka "Win32k Read AV Vulnerability."
8 CVE-2013-1300 264 1 +Priv 2013-07-10 2020-09-28
7.2
None Local Low Not required Complete Complete Complete
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Memory Allocation Vulnerability."
9 CVE-2013-0008 264 1 +Priv 2013-01-09 2020-09-28
7.2
None Local Low Not required Complete Complete Complete
win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle window broadcast messages, which allows local users to gain privileges via a crafted application, aka "Win32k Improper Message Handling Vulnerability."
10 CVE-2011-5046 20 1 DoS Exec Code Mem. Corr. 2011-12-30 2018-10-12
9.3
None Remote Medium Not required Complete Complete Complete
The Graphics Device Interface (GDI) in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly validate user-mode input, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted data, as demonstrated by a large height attribute of an IFRAME element rendered by Safari, aka "GDI Access Violation Vulnerability."
11 CVE-2011-0096 79 1 XSS 2011-01-31 2019-02-26
4.3
None Remote Medium Not required None Partial None
The MHTML protocol handler in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle a MIME format in a request for content blocks in a document, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site that is visited in Internet Explorer, aka "MHTML Mime-Formatted Request Vulnerability."
12 CVE-2010-4398 119 1 Overflow +Priv Bypass 2010-12-06 2018-10-12
7.2
None Local Low Not required Complete Complete Complete
Stack-based buffer overflow in the RtlQueryRegistryValues function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to gain privileges, and bypass the User Account Control (UAC) feature, via a crafted REG_BINARY value for a SystemDefaultEUDCFont registry key, aka "Driver Improper Interaction with Windows Kernel Vulnerability."
13 CVE-2010-3970 119 1 Exec Code Overflow 2010-12-22 2019-02-26
9.3
None Remote Medium Not required Complete Complete Complete
Stack-based buffer overflow in the CreateSizedDIBSECTION function in shimgvw.dll in the Windows Shell graphics processor (aka graphics rendering engine) in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted .MIC or unspecified Office document containing a thumbnail bitmap with a negative biClrUsed value, as reported by Moti and Xu Hao, aka "Windows Shell Graphics Processing Overrun Vulnerability."
14 CVE-2010-3227 119 1 Exec Code Overflow 2010-10-26 2018-10-30
9.3
None Remote Medium Not required Complete Complete Complete
Stack-based buffer overflow in the UpdateFrameTitleForDocument method in the CFrameWnd class in mfc42.dll in the Microsoft Foundation Class (MFC) Library in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows context-dependent attackers to execute arbitrary code via a long window title that this library attempts to create at the request of an application, as demonstrated by the Trident PowerZip 7.2 Build 4010 application, aka "Windows MFC Document Title Updating Buffer Overflow Vulnerability."
15 CVE-2010-2744 264 1 +Priv 2010-10-13 2019-02-26
7.2
None Local Low Not required Complete Complete Complete
The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 do not properly manage a window class, which allows local users to gain privileges by creating a window, then using (1) the SetWindowLongPtr function to modify the popup menu structure, or (2) the SwitchWndProc function with a switch window information pointer, which is not re-initialized when a WM_NCCREATE message is processed, aka "Win32k Window Class Vulnerability."
16 CVE-2010-2549 399 1 DoS +Priv 2010-07-02 2017-09-19
7.2
None Local Low Not required Complete Complete Complete
Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Vista SP1 and SP2 and Server 2008 Gold and SP2 allows local users to gain privileges or cause a denial of service (system crash) by using a large number of calls to the NtUserCheckAccessForIntegrityLevel function to trigger a failure in the LockProcessByClientId function, leading to deletion of an in-use process object, aka "Win32k Reference Count Vulnerability."
17 CVE-2009-3103 399 1 DoS Exec Code 2009-09-08 2018-10-12
10.0
None Remote Low Not required Complete Complete Complete
Array index error in the SMBv2 protocol implementation in srv2.sys in Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, and Windows 7 RC allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via an & (ampersand) character in a Process ID High header field in a NEGOTIATE PROTOCOL REQUEST packet, which triggers an attempted dereference of an out-of-bounds memory location, aka "SMBv2 Negotiation Vulnerability." NOTE: some of these details are obtained from third party information.
18 CVE-2022-21925 Bypass 2022-01-11 2022-01-21
5.4
None Remote High Not required Complete None None
Windows BackupKey Remote Protocol Security Feature Bypass Vulnerability.
19 CVE-2022-21924 Bypass 2022-01-11 2022-01-21
5.4
None Remote High Not required Complete None None
Workstation Service Remote Protocol Security Feature Bypass Vulnerability.
20 CVE-2022-21922 Exec Code 2022-01-11 2022-01-21
9.0
None Remote Low ??? Complete Complete Complete
Remote Procedure Call Runtime Remote Code Execution Vulnerability.
21 CVE-2022-21920 269 2022-01-11 2022-01-19
9.0
None Remote Low ??? Complete Complete Complete
Windows Kerberos Elevation of Privilege Vulnerability.
22 CVE-2022-21919 269 2022-01-11 2022-01-19
6.9
None Local Medium Not required Complete Complete Complete
Windows User Profile Service Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21895.
23 CVE-2022-21916 269 2022-01-11 2022-01-19
7.2
None Local Low Not required Complete Complete Complete
Windows Common Log File System Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21897.
24 CVE-2022-21915 668 2022-01-11 2022-01-19
4.0
None Remote Low ??? Partial None None
Windows GDI+ Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-21880.
25 CVE-2022-21914 269 2022-01-11 2022-01-19
7.2
None Local Low Not required Complete Complete Complete
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21885.
26 CVE-2022-21913 863 Bypass 2022-01-11 2022-01-19
5.0
None Remote Low Not required Partial None None
Local Security Authority (Domain Policy) Remote Protocol Security Feature Bypass.
27 CVE-2022-21908 269 2022-01-11 2022-01-19
7.2
None Local Low Not required Complete Complete Complete
Windows Installer Elevation of Privilege Vulnerability.
28 CVE-2022-21905 Bypass 2022-01-11 2022-01-19
4.9
None Local Network Medium ??? Partial Partial Partial
Windows Hyper-V Security Feature Bypass Vulnerability. This CVE ID is unique from CVE-2022-21900.
29 CVE-2022-21904 668 2022-01-11 2022-01-19
5.0
None Remote Low Not required Partial None None
Windows GDI Information Disclosure Vulnerability.
30 CVE-2022-21903 269 2022-01-11 2022-01-19
7.2
None Local Low Not required Complete Complete Complete
Windows GDI Elevation of Privilege Vulnerability.
31 CVE-2022-21900 Bypass 2022-01-11 2022-01-19
3.8
None Local Network Medium ??? None Partial Partial
Windows Hyper-V Security Feature Bypass Vulnerability. This CVE ID is unique from CVE-2022-21905.
32 CVE-2022-21899 863 Bypass 2022-01-11 2022-01-19
4.9
None Local Low Not required None None Complete
Windows Extensible Firmware Interface Security Feature Bypass Vulnerability.
33 CVE-2022-21897 269 2022-01-11 2022-01-19
7.2
None Local Low Not required Complete Complete Complete
Windows Common Log File System Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21916.
34 CVE-2022-21893 Exec Code 2022-01-11 2022-01-21
8.5
None Remote Medium ??? Complete Complete Complete
Remote Desktop Protocol Remote Code Execution Vulnerability.
35 CVE-2022-21890 DoS 2022-01-11 2022-01-19
4.3
None Remote Medium Not required None None Partial
Windows IKE Extension Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-21843, CVE-2022-21848, CVE-2022-21883, CVE-2022-21889.
36 CVE-2022-21889 DoS 2022-01-11 2022-01-19
4.3
None Remote Medium Not required None None Partial
Windows IKE Extension Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-21843, CVE-2022-21848, CVE-2022-21883, CVE-2022-21890.
37 CVE-2022-21885 269 2022-01-11 2022-01-19
7.2
None Local Low Not required Complete Complete Complete
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21914.
38 CVE-2022-21884 269 2022-01-11 2022-01-19
7.2
None Local Low Not required Complete Complete Complete
Local Security Authority Subsystem Service Elevation of Privilege Vulnerability.
39 CVE-2022-21883 DoS 2022-01-11 2022-01-19
7.1
None Remote Medium Not required None None Complete
Windows IKE Extension Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-21843, CVE-2022-21848, CVE-2022-21889, CVE-2022-21890.
40 CVE-2022-21880 668 2022-01-11 2022-01-18
7.8
None Remote Low Not required Complete None None
Windows GDI+ Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-21915.
41 CVE-2022-21862 269 2022-01-11 2022-01-14
6.9
None Local Medium Not required Complete Complete Complete
Windows Application Model Core API Elevation of Privilege Vulnerability.
42 CVE-2022-21857 269 2022-01-11 2022-01-14
9.0
None Remote Low ??? Complete Complete Complete
Active Directory Domain Services Elevation of Privilege Vulnerability.
43 CVE-2022-21851 Exec Code 2022-01-11 2022-01-14
9.3
None Remote Medium Not required Complete Complete Complete
Remote Desktop Client Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21850.
44 CVE-2022-21850 Exec Code 2022-01-11 2022-01-14
9.3
None Remote Medium Not required Complete Complete Complete
Remote Desktop Client Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21851.
45 CVE-2022-21848 400 DoS 2022-01-11 2022-01-14
7.1
None Remote Medium Not required None None Complete
Windows IKE Extension Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-21843, CVE-2022-21883, CVE-2022-21889, CVE-2022-21890.
46 CVE-2022-21843 400 DoS 2022-01-11 2022-01-14
4.3
None Remote Medium Not required None None Partial
Windows IKE Extension Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-21848, CVE-2022-21883, CVE-2022-21889, CVE-2022-21890.
47 CVE-2022-21838 59 2022-01-11 2022-01-14
7.2
None Local Low Not required Complete Complete Complete
Windows Cleanup Manager Elevation of Privilege Vulnerability.
48 CVE-2022-21836 295 2022-01-11 2022-01-14
7.2
None Local Low Not required Complete Complete Complete
Windows Certificate Spoofing Vulnerability.
49 CVE-2022-21835 269 2022-01-11 2022-01-14
7.2
None Local Low Not required Complete Complete Complete
Microsoft Cryptographic Services Elevation of Privilege Vulnerability.
50 CVE-2022-21834 269 2022-01-11 2022-01-14
7.2
None Local Low Not required Complete Complete Complete
Windows User-mode Driver Framework Reflector Driver Elevation of Privilege Vulnerability.
Total number of vulnerabilities : 2091   Page : 1 (This Page)2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.