Msrc Windows Server 2008 vulnerabilities

2,227 known vulnerabilities affecting msrc/windows_server_2008.

Total CVEs
2,227
CISA KEV
105
actively exploited
Public exploits
168
Exploited in wild
102
Severity breakdown
CRITICAL51HIGH1525MEDIUM632LOW19

Vulnerabilities

Page 12 of 112
CVE-2025-24056HIGHCVSS 8.82025-03-11
CVE-2025-24056 [HIGH] CWE-122 Windows Telephony Service Remote Code Execution Vulnerability Windows Telephony Service Remote Code Execution Vulnerability Description: Heap-based buffer overflow in Windows Telephony Server allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires a client to connec
msrc
CVE-2025-24985HIGHCVSS 7.8KEV2025-03-11
CVE-2025-24985 [HIGH] CWE-190 Windows Fast FAT File System Driver Remote Code Execution Vulnerability Windows Fast FAT File System Driver Remote Code Execution Vulnerability Description: Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of t
msrc
CVE-2025-24072HIGHCVSS 7.82025-03-11
CVE-2025-24072 [HIGH] CWE-416 Microsoft Local Security Authority (LSA) Server Elevation of Privilege Vulnerability Microsoft Local Security Authority (LSA) Server Elevation of Privilege Vulnerability Description: Use after free in Microsoft Local Security Authority Server (lsasrv) allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerabilit
msrc
CVE-2025-24035HIGHCVSS 8.12025-03-11
CVE-2025-24035 [HIGH] CWE-591 Windows Remote Desktop Services Remote Code Execution Vulnerability Windows Remote Desktop Services Remote Code Execution Vulnerability Description: Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requir
msrc
CVE-2025-24059HIGHCVSS 7.82025-03-11
CVE-2025-24059 [HIGH] CWE-681 Windows Common Log File System Driver Elevation of Privilege Vulnerability Windows Common Log File System Driver Elevation of Privilege Vulnerability Description: Incorrect conversion between numeric types in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability cou
msrc
CVE-2025-24051HIGHCVSS 8.82025-03-11
CVE-2025-24051 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Description: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context
msrc
CVE-2025-21180HIGHCVSS 7.82025-03-11
CVE-2025-21180 [HIGH] CWE-122 Windows exFAT File System Remote Code Execution Vulnerability Windows exFAT File System Remote Code Execution Vulnerability Description: Heap-based buffer overflow in Windows exFAT File System allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type
msrc
CVE-2025-24993HIGHCVSS 7.8KEV2025-03-11
CVE-2025-24993 [HIGH] CWE-122 Windows NTFS Remote Code Execution Vulnerability Windows NTFS Remote Code Execution Vulnerability Description: Heap-based buffer overflow in Windows NTFS allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as
msrc
CVE-2025-26633HIGHCVSS 7.0KEVPoC2025-03-11
CVE-2025-26633 [HIGH] CWE-707 Microsoft Management Console Security Feature Bypass Vulnerability Microsoft Management Console Security Feature Bypass Vulnerability Description: Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to take add
msrc
CVE-2025-26645HIGHCVSS 8.82025-03-11
CVE-2025-26645 [HIGH] CWE-23 Remote Desktop Client Remote Code Execution Vulnerability Remote Desktop Client Remote Code Execution Vulnerability Description: Relative path traversal in Remote Desktop Client allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires an admin user on the client to co
msrc
CVE-2024-9157HIGHCVSS 7.82025-03-11
CVE-2024-9157 [HIGH] Synaptics: CVE-2024-9157 Synaptics Service Binaries DLL Loading Vulnerability Synaptics: CVE-2024-9157 Synaptics Service Binaries DLL Loading Vulnerability FAQ: Why is this Synaptics CVE included in the Security Update Guide? The vulnerability assigned to this CVE is Synaptics' Audio Effects component, which is consumed by Microsoft Windows. It is being documented in the Security Update Guide to announce that the latest builds of Windows are no longer vulnerable. Please see
msrc
CVE-2025-24991MEDIUMCVSS 5.5KEV2025-03-11
CVE-2025-24991 [MEDIUM] CWE-125 Windows NTFS Information Disclosure Vulnerability Windows NTFS Information Disclosure Vulnerability Description: Out-of-bounds read in Windows NTFS allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. FAQ: According to the CVSS metric, the attack vector is local (AV:L) w
msrc
CVE-2025-21247MEDIUMCVSS 4.32025-03-11
CVE-2025-21247 [MEDIUM] CWE-41 MapUrlToZone Security Feature Bypass Vulnerability MapUrlToZone Security Feature Bypass Vulnerability Description: Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network. FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L),but lead to no loss of availability (A:N) and integrity (I:N)? What does that me
msrc
CVE-2025-24988MEDIUMCVSS 6.62025-03-11
CVE-2025-24988 [MEDIUM] CWE-125 Windows USB Video Class System Driver Elevation of Privilege Vulnerability Windows USB Video Class System Driver Elevation of Privilege Vulnerability Description: Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to elevate privileges with a physical attack. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privi
msrc
CVE-2025-24055MEDIUMCVSS 4.32025-03-11
CVE-2025-24055 [MEDIUM] CWE-125 Windows USB Video Class System Driver Information Disclosure Vulnerability Windows USB Video Class System Driver Information Disclosure Vulnerability Description: Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to disclose information with a physical attack. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap me
msrc
CVE-2025-24987MEDIUMCVSS 6.62025-03-11
CVE-2025-24987 [MEDIUM] CWE-125 Windows USB Video Class System Driver Elevation of Privilege Vulnerability Windows USB Video Class System Driver Elevation of Privilege Vulnerability Description: Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to elevate privileges with a physical attack. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privi
msrc
CVE-2025-24992MEDIUMCVSS 5.52025-03-11
CVE-2025-24992 [MEDIUM] CWE-126 Windows NTFS Information Disclosure Vulnerability Windows NTFS Information Disclosure Vulnerability Description: Buffer over-read in Windows NTFS allows an unauthorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. FAQ: According to the CVSS metric, the attack vector is local (AV:L) while u
msrc
CVE-2025-21373HIGHCVSS 7.82025-02-11
CVE-2025-21373 [HIGH] CWE-59 Windows Installer Elevation of Privilege Vulnerability Windows Installer Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Installer: Windows Installer Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:N
msrc
CVE-2025-21200HIGHCVSS 8.82025-02-11
CVE-2025-21200 [HIGH] CWE-122 Windows Telephony Service Remote Code Execution Vulnerability Windows Telephony Service Remote Code Execution Vulnerability FAQ: How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. FAQ: According to the CVSS metric, the attack vector is ne
msrc
CVE-2025-21368HIGHCVSS 8.82025-02-11
CVE-2025-21368 [HIGH] CWE-122 Microsoft Digest Authentication Remote Code Execution Vulnerability Microsoft Digest Authentication Remote Code Execution Vulnerability FAQ: How could an attacker exploit this vulnerability? To successfully exploit this remote code execution vulnerability, an attacker could send a malicious logon request to the target domain controller. FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticat
msrc