Msrc Windows Server 2008 vulnerabilities
2,227 known vulnerabilities affecting msrc/windows_server_2008.
Total CVEs
2,227
CISA KEV
105
actively exploited
Public exploits
168
Exploited in wild
102
Severity breakdown
CRITICAL51HIGH1525MEDIUM632LOW19
Vulnerabilities
Page 41 of 112
CVE-2023-21678HIGHCVSS 7.82023-01-10
CVE-2023-21678 [HIGH] CWE-59 Windows Print Spooler Elevation of Privilege Vulnerability
Windows Print Spooler Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Print Spooler Components: Windows Print Spooler Components
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Sta
msrc
CVE-2023-21679HIGHCVSS 8.12023-01-10
CVE-2023-21679 [HIGH] CWE-416 Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a specially crafted protocol message to a Routing and Remote Access Service (RRAS) server, which could lead to remote code execution (RCE) on the RAS server machine.
FAQ: According to the CVSS metric, the attack comple
msrc
CVE-2023-21552HIGHCVSS 7.82023-01-10
CVE-2023-21552 [HIGH] CWE-416 Windows GDI Elevation of Privilege Vulnerability
Windows GDI Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;
msrc
CVE-2023-21537HIGHCVSS 7.82023-01-10
CVE-2023-21537 [HIGH] CWE-367 Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Message Queuing: Windows Message Queuing
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploi
msrc
CVE-2023-21757HIGHCVSS 7.52023-01-10
CVE-2023-21757 [HIGH] CWE-476 Windows Layer 2 Tunneling Protocol (L2TP) Denial of Service Vulnerability
Windows Layer 2 Tunneling Protocol (L2TP) Denial of Service Vulnerability
Windows Remote Access Service L2TP Driver: Windows Remote Access Service L2TP Driver
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
msrc
CVE-2023-21556HIGHCVSS 8.12023-01-10
CVE-2023-21556 [HIGH] CWE-191 Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a specially crafted protocol message to a Routing and Remote Access Service (RRAS) server, which could lead to remote code execution (RCE) on the RAS server machine.
FAQ: According to the CVSS metric, the attack comple
msrc
CVE-2023-21726HIGHCVSS 7.82023-01-10
CVE-2023-21726 [HIGH] CWE-257 Windows Credential Manager User Interface Elevation of Privilege Vulnerability
Windows Credential Manager User Interface Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Credential Manager: Windows Credential Manager
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevat
msrc
CVE-2023-21546HIGHCVSS 8.12023-01-10
CVE-2023-21546 [HIGH] CWE-591 Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a special
msrc
CVE-2023-21754HIGHCVSS 7.82023-01-10
CVE-2023-21754 [HIGH] CWE-190 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Management Instrumentation: Windows Management Instrumentation
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publ
msrc
CVE-2023-21730HIGHCVSS 7.82023-01-10
CVE-2023-21730 [HIGH] CWE-190 Microsoft Cryptographic Services Elevation of Privilege Vulnerability
Microsoft Cryptographic Services Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Cryptographic Services: Windows Cryptographic Services
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Pri
msrc
CVE-2023-21747HIGHCVSS 7.82023-01-10
CVE-2023-21747 [HIGH] CWE-416 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Virtual Registry Provider: Windows Virtual Registry Provider
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Public
msrc
CVE-2023-21728HIGHCVSS 7.52023-01-10
CVE-2023-21728 [HIGH] CWE-400 Windows Netlogon Denial of Service Vulnerability
Windows Netlogon Denial of Service Vulnerability
Microsoft Local Security Authority Server (lsasrv): Microsoft Local Security Authority Server (lsasrv)
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.upd
msrc
CVE-2023-21543HIGHCVSS 8.12023-01-10
CVE-2023-21543 [HIGH] CWE-400 Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a specially crafted protocol message to a Routing and Remote Access Service (RRAS) server, which could lead to remote code execution (RCE) on the RAS server machine.
FAQ: According to the CVSS metric, the attack comple
msrc
CVE-2023-21750HIGHCVSS 7.12023-01-10
CVE-2023-21750 [HIGH] CWE-284 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N) but have major impact on integrity (I:H) and on availability (A:H). What does that mean for this vulnerability?
This vulnerability does not allow disclosure of any confidential information, but could allow an attacker to delete data tha
msrc
CVE-2023-21749HIGHCVSS 7.82023-01-10
CVE-2023-21749 [HIGH] CWE-20 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Virtual Registry Provider: Windows Virtual Registry Provider
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicl
msrc
CVE-2023-21542HIGHCVSS 7.02023-01-10
CVE-2023-21542 [HIGH] CWE-59 Windows Installer Elevation of Privilege Vulnerability
Windows Installer Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnera
msrc
CVE-2023-21555HIGHCVSS 8.12023-01-10
CVE-2023-21555 [HIGH] CWE-367 Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a specially crafted protocol message to a Routing and Remote Access Service (RRAS) server, which could lead to remote code execution (RCE) on the RAS server machine.
FAQ: According to the CVSS metric, the attack comple
msrc
CVE-2023-21681HIGHCVSS 8.82023-01-10
CVE-2023-21681 [HIGH] CWE-191 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to e
msrc
CVE-2023-21548HIGHCVSS 8.12023-01-10
CVE-2023-21548 [HIGH] CWE-591 Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
FAQ: How could an attacker exploit the vulnerability?
To exploit this vulnerability, an attacker would need to send a specially crafted malicious SSTP packet to a SSTP server. This could result in remote code execution on the server side.
FAQ: According to the CVSS metric, the attack complexity is h
msrc
CVE-2023-21773HIGHCVSS 7.82023-01-10
CVE-2023-21773 [HIGH] CWE-416 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Virtual Registry Provider: Windows Virtual Registry Provider
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Public
msrc