Msrc Windows Server 2008 vulnerabilities
2,227 known vulnerabilities affecting msrc/windows_server_2008.
Total CVEs
2,227
CISA KEV
105
actively exploited
Public exploits
168
Exploited in wild
102
Severity breakdown
CRITICAL51HIGH1525MEDIUM632LOW19
Vulnerabilities
Page 2 of 112
CVE-2026-20927MEDIUMCVSS 5.32026-01-13
CVE-2026-20927 [MEDIUM] CWE-362 Windows SMB Server Denial of Service Vulnerability
Windows SMB Server Denial of Service Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to deny service over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an
msrc
CVE-2026-20821MEDIUMCVSS 6.22026-01-13
CVE-2026-20821 [MEDIUM] CWE-200 Remote Procedure Call Information Disclosure Vulnerability
Remote Procedure Call Information Disclosure Vulnerability
Description: Exposure of sensitive information to an unauthorized actor in Windows Remote Procedure Call allows an unauthorized attacker to disclose information locally.
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability i
msrc
CVE-2026-20834MEDIUMCVSS 4.62026-01-13
CVE-2026-20834 [MEDIUM] CWE-36 Windows Spoofing Vulnerability
Windows Spoofing Vulnerability
Description: Absolute path traversal in Windows Shell allows an unauthorized attacker to perform spoofing with a physical attack.
Windows Shell: Windows Shell
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Spoofing
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5
msrc
CVE-2026-20936MEDIUMCVSS 4.32026-01-13
CVE-2026-20936 [MEDIUM] CWE-125 Windows NDIS Information Disclosure Vulnerability
Windows NDIS Information Disclosure Vulnerability
Description: Out-of-bounds read in Windows NDIS allows an authorized attacker to disclose information with a physical attack.
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of certain kernel memory content.
Windows NDIS: Windows NDIS
Microsoft: Microsoft
Customer Action Required:
msrc
CVE-2025-62571HIGHCVSS 7.82025-12-09
CVE-2025-62571 [HIGH] CWE-20 Windows Installer Elevation of Privilege Vulnerability
Windows Installer Elevation of Privilege Vulnerability
Description: Improper input validation in Windows Installer allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Installer: Windows Installer
Microsoft: M
msrc
CVE-2025-62455HIGHCVSS 7.82025-12-09
CVE-2025-62455 [HIGH] CWE-20 Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
Description: Improper input validation in Windows Message Queuing allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Messag
msrc
CVE-2025-62466HIGHCVSS 7.82025-12-09
CVE-2025-62466 [HIGH] CWE-476 Windows Client-Side Caching Elevation of Privilege Vulnerability
Windows Client-Side Caching Elevation of Privilege Vulnerability
Description: Null pointer dereference in Windows Client-Side Caching (CSC) Service allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Window
msrc
CVE-2025-62472HIGHCVSS 7.82025-12-09
CVE-2025-62472 [HIGH] CWE-908 Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
Description: Use of uninitialized resource in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could g
msrc
CVE-2025-62549HIGHCVSS 8.82025-12-09
CVE-2025-62549 [HIGH] CWE-822 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Description: Untrusted pointer dereference in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are no
msrc
CVE-2025-62470HIGHCVSS 7.82025-12-09
CVE-2025-62470 [HIGH] CWE-122 Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM p
msrc
CVE-2025-64678HIGHCVSS 8.82025-12-09
CVE-2025-64678 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
FAQ: How could an attacker exploit this vulnerability?
An attacker authenticated on the domain could exploit this vulnerability by tricking a
msrc
CVE-2025-54100HIGHCVSS 7.82025-12-09
CVE-2025-54100 [HIGH] CWE-77 PowerShell Remote Code Execution Vulnerability
PowerShell Remote Code Execution Vulnerability
Description: Improper neutralization of special elements used in a command ('command injection') in Windows PowerShell allows an unauthorized attacker to execute code locally.
FAQ: Is there more information I need to know after I install the Security Updates to address this vulnerability?
After you install the updates, when you use the Invoke-WebRequest command you will se
msrc
CVE-2025-62473MEDIUMCVSS 6.52025-12-09
CVE-2025-62473 [MEDIUM] CWE-126 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Description: Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could pote
msrc
CVE-2025-60724CRITICALCVSS 9.82025-11-11
CVE-2025-60724 [CRITICAL] CWE-122 GDI+ Remote Code Execution Vulnerability
GDI+ Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Microsoft Graphics Component allows an unauthorized attacker to execute code over a network.
FAQ: Is the Preview Pane an attack vector for this vulnerability?
No, the Preview Pane is not an attack vector.
FAQ: According to the CVSS metric, the attack vector is network (AV:N). How could an attacker exploit the vulnerability?
An attacker
msrc
CVE-2025-59514HIGHCVSS 7.82025-11-11
CVE-2025-59514 [HIGH] CWE-269 Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability
Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability
Description: Improper privilege management in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Mic
msrc
CVE-2025-62217HIGHCVSS 7.02025-11-11
CVE-2025-62217 [HIGH] CWE-362 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Description: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that
msrc
CVE-2025-60709HIGHCVSS 7.82025-11-11
CVE-2025-60709 [HIGH] CWE-125 Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Description: Out-of-bounds read in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privilege
msrc
CVE-2025-60705HIGHCVSS 7.82025-11-11
CVE-2025-60705 [HIGH] CWE-284 Windows Client-Side Caching Elevation of Privilege Vulnerability
Windows Client-Side Caching Elevation of Privilege Vulnerability
Description: Improper access control in Windows Client-Side Caching (CSC) Service allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could gain administrator privileges.
W
msrc
CVE-2025-62452HIGHCVSS 8.02025-11-11
CVE-2025-62452 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (P
msrc
CVE-2025-60715HIGHCVSS 8.02025-11-11
CVE-2025-60715 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are low (PR
msrc