Microsoft Windows Server 2008 Service Pack 2 vulnerabilities
1,672 known vulnerabilities affecting microsoft/windows_server_2008_service_pack_2.
Total CVEs
1,672
CISA KEV
66
actively exploited
Public exploits
37
Exploited in wild
58
Severity breakdown
CRITICAL68HIGH1214MEDIUM387LOW3
Vulnerabilities
Page 80 of 84
CVE-2020-1467HIGHCVSS 7.8≥ 6.0.0, < publication2020-08-17
CVE-2020-1467 [HIGH] CVE-2020-1467: An elevation of privilege vulnerability exists when Windows improperly handles hard links. An attack
An elevation of privilege vulnerability exists when Windows improperly handles hard links. An attacker who successfully exploited this vulnerability could overwrite a targeted file leading to an elevated status.
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that co
nvd
CVE-2020-1587HIGHCVSS 7.8≥ 6.0.0, < publication2020-08-17
CVE-2020-1587 [HIGH] CVE-2020-1587: An elevation of privilege vulnerability exists when the Windows Ancillary Function Driver for WinSoc
An elevation of privilege vulnerability exists when the Windows Ancillary Function Driver for WinSock improperly handles memory.
To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.
The security update addresses the vulnerability by c
nvd
CVE-2020-1377HIGHCVSS 7.8≥ 6.0.0, < publication2020-08-17
CVE-2020-1377 [HIGH] CVE-2020-1377: An elevation of privilege vulnerability exists when the Windows Kernel API improperly handles regist
An elevation of privilege vulnerability exists when the Windows Kernel API improperly handles registry objects in memory. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system.
A locally authenticated attacker could exploit this vulnerability by running a specially crafted application.
The security update a
nvd
CVE-2020-1537HIGHCVSS 7.8≥ 6.0.0, < publication2020-08-17
CVE-2020-1537 [HIGH] CVE-2020-1537: An elevation of privilege vulnerability exists when the Windows Remote Access improperly handles fil
An elevation of privilege vulnerability exists when the Windows Remote Access improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges.
To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a specially crafted application.
The s
nvd
CVE-2020-1519HIGHCVSS 7.8≥ 6.0.0, < publication2020-08-17
CVE-2020-1519 [HIGH] CVE-2020-1519: An elevation of privilege vulnerability exists when the Windows UPnP Device Host improperly handles
An elevation of privilege vulnerability exists when the Windows UPnP Device Host improperly handles memory.
To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.
The security update addresses the vulnerability by correcting how the Wind
nvd
CVE-2020-1558HIGHCVSS 7.8≥ 6.0.0, < publication2020-08-17
CVE-2020-1558 [HIGH] CVE-2020-1558: A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.
An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.
The update addresses the vulnerabili
nvd
CVE-2020-1557HIGHCVSS 7.8≥ 6.0.0, < publication2020-08-17
CVE-2020-1557 [HIGH] CVE-2020-1557: A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.
An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.
The update addresses the vulnerabili
nvd
CVE-2020-1337HIGHCVSS 7.8PoC≥ 6.0.0, < publication2020-08-17
CVE-2020-1337 [HIGH] CWE-367 CVE-2020-1337: An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly all
An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts wit
nvd
CVE-2020-1379HIGHCVSS 7.8≥ 6.0.0, < publication2020-08-17
CVE-2020-1379 [HIGH] CWE-787 CVE-2020-1379: A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights.
There are multiple ways an attacker could exploit the vulnerability, such as by convincin
nvd
CVE-2020-1515HIGHCVSS 7.8≥ 6.0.0, < publication2020-08-17
CVE-2020-1515 [HIGH] CVE-2020-1515: An elevation of privilege vulnerability exists when the Windows Telephony Server improperly handles
An elevation of privilege vulnerability exists when the Windows Telephony Server improperly handles memory.
To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.
The security update addresses the vulnerability by correcting how the Wind
nvd
CVE-2020-1489HIGHCVSS 7.8≥ 6.0.0, < publication2020-08-17
CVE-2020-1489 [HIGH] CVE-2020-1489: An elevation of privilege vulnerability exists when the Windows CSC Service improperly handles memor
An elevation of privilege vulnerability exists when the Windows CSC Service improperly handles memory.
To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.
The security update addresses the vulnerability by correcting how the Windows
nvd
CVE-2020-1562HIGHCVSS 7.8≥ 6.0.0, < publication2020-08-17
CVE-2020-1562 [HIGH] CVE-2020-1562: A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle ob
A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system.
To exploit the vulnerability, a user would have to open a specially crafted file.
The security update addresses the vulnerability by correct
nvd
CVE-2020-1520HIGHCVSS 7.8≥ 6.0.0, < publication2020-08-17
CVE-2020-1520 [HIGH] CVE-2020-1520: A remote code execution vulnerability exists when the Windows Font Driver Host improperly handles me
A remote code execution vulnerability exists when the Windows Font Driver Host improperly handles memory.
An attacker who successfully exploited the vulnerability would gain execution on a victim system.
The security update addresses the vulnerability by correcting how the Windows Font Driver Host handles memory.
nvd
CVE-2020-1486HIGHCVSS 7.8≥ 6.0.0, < publication2020-08-17
CVE-2020-1486 [HIGH] CVE-2020-1486: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle obje
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, a
nvd
CVE-2020-1464MEDIUMCVSS 5.5KEV≥ 6.0.0, < publication2020-08-17
CVE-2020-1464 [MEDIUM] CWE-347 CVE-2020-1464: A spoofing vulnerability exists when Windows incorrectly validates file signatures. An attacker who
A spoofing vulnerability exists when Windows incorrectly validates file signatures. An attacker who successfully exploited this vulnerability could bypass security features and load improperly signed files.
In an attack scenario, an attacker could bypass security features intended to prevent improperly signed files from being loaded.
The update address
nvd
CVE-2020-1485MEDIUMCVSS 5.5≥ 6.0.0, < publication2020-08-17
CVE-2020-1485 [MEDIUM] CVE-2020-1485: An information disclosure vulnerability exists when the Windows Image Acquisition (WIA) Service impr
An information disclosure vulnerability exists when the Windows Image Acquisition (WIA) Service improperly discloses contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.
To exploit the vulnerability, an authenticated attacker could connect an imaging device (camera,
nvd
CVE-2020-1577MEDIUMCVSS 6.5≥ 6.0.0, < publication2020-08-17
CVE-2020-1577 [MEDIUM] CVE-2020-1577: An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of
An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.
There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted
nvd
CVE-2020-1474MEDIUMCVSS 5.5≥ 6.0.0, < publication2020-08-17
CVE-2020-1474 [MEDIUM] CVE-2020-1474: An information disclosure vulnerability exists when the Windows Image Acquisition (WIA) Service impr
An information disclosure vulnerability exists when the Windows Image Acquisition (WIA) Service improperly discloses contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.
To exploit the vulnerability, an authenticated attacker could connect an imaging device (camera,
nvd
CVE-2019-1125MEDIUMCVSS 5.6PoC≥ 6.0.0, < publication2019-09-03
CVE-2019-1125 [MEDIUM] CVE-2019-1125: An information disclosure vulnerability exists when certain central processing units (CPU) speculati
An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries.
To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The v
nvd
CVE-2019-1213CRITICALCVSS 9.8≥ 6.0.0, < publication2019-08-14
CVE-2019-1213 [CRITICAL] CWE-787 CVE-2019-1213: A memory corruption vulnerability exists in the Windows Server DHCP service when an attacker sends s
A memory corruption vulnerability exists in the Windows Server DHCP service when an attacker sends specially crafted packets to a DHCP server. An attacker who successfully exploited the vulnerability could run arbitrary code on the DHCP server.
To exploit the vulnerability, an attacker could send a specially crafted packet to a DHCP server.
The secu
nvd