Msrc Windows Server 2008 vulnerabilities
2,227 known vulnerabilities affecting msrc/windows_server_2008.
Total CVEs
2,227
CISA KEV
105
actively exploited
Public exploits
168
Exploited in wild
102
Severity breakdown
CRITICAL51HIGH1525MEDIUM632LOW19
Vulnerabilities
Page 27 of 112
CVE-2024-21347HIGHCVSS 7.52024-02-13
CVE-2024-21347 [HIGH] CWE-122 Microsoft ODBC Driver Remote Code Execution Vulnerability
Microsoft ODBC Driver Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user
msrc
CVE-2024-21354HIGHCVSS 7.82024-02-13
CVE-2024-21354 [HIGH] CWE-122 Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Message Queuing: Windows Message Queuing
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploi
msrc
CVE-2024-21361HIGHCVSS 8.82024-02-13
CVE-2024-21361 [HIGH] CWE-122 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using th
msrc
CVE-2024-21375HIGHCVSS 8.82024-02-13
CVE-2024-21375 [HIGH] CWE-416 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using th
msrc
CVE-2024-21368HIGHCVSS 8.82024-02-13
CVE-2024-21368 [HIGH] CWE-122 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using th
msrc
CVE-2024-21357HIGHCVSS 8.12024-02-13
CVE-2024-21357 [HIGH] CWE-843 Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.
FAQ: According to the CVSS score, the attack
msrc
CVE-2024-21352HIGHCVSS 8.82024-02-13
CVE-2024-21352 [HIGH] CWE-197 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using th
msrc
CVE-2024-21349HIGHCVSS 8.82024-02-13
CVE-2024-21349 [HIGH] CWE-122 Microsoft ActiveX Data Objects Remote Code Execution Vulnerability
Microsoft ActiveX Data Objects Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. Af
msrc
CVE-2024-21369HIGHCVSS 8.82024-02-13
CVE-2024-21369 [HIGH] CWE-122 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using th
msrc
CVE-2024-21420HIGHCVSS 8.82024-02-13
CVE-2024-21420 [HIGH] CWE-190 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using th
msrc
CVE-2024-21370HIGHCVSS 8.82024-02-13
CVE-2024-21370 [HIGH] CWE-122 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using th
msrc
CVE-2024-21391HIGHCVSS 8.82024-02-13
CVE-2024-21391 [HIGH] CWE-197 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using th
msrc
CVE-2024-21372HIGHCVSS 8.82024-02-13
CVE-2024-21372 [HIGH] CWE-190 Windows OLE Remote Code Execution Vulnerability
Windows OLE Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server
msrc
CVE-2024-21355HIGHCVSS 7.02024-02-13
CVE-2024-21355 [HIGH] CWE-591 Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who succ
msrc
CVE-2024-21359HIGHCVSS 8.82024-02-13
CVE-2024-21359 [HIGH] CWE-122 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using th
msrc
CVE-2024-21405HIGHCVSS 7.02024-02-13
CVE-2024-21405 [HIGH] CWE-591 Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation
msrc
CVE-2024-21367HIGHCVSS 8.82024-02-13
CVE-2024-21367 [HIGH] CWE-122 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using th
msrc
CVE-2024-21360HIGHCVSS 8.82024-02-13
CVE-2024-21360 [HIGH] CWE-122 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using th
msrc
CVE-2024-21358HIGHCVSS 8.82024-02-13
CVE-2024-21358 [HIGH] CWE-122 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using th
msrc
CVE-2024-21356MEDIUMCVSS 6.52024-02-13
CVE-2024-21356 [MEDIUM] CWE-476 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
Windows LDAP - Lightweight Directory Access Protocol: Windows LDAP - Lightweight Directory Access Protocol
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A
msrc