Msrc Windows Server 2008 vulnerabilities
2,227 known vulnerabilities affecting msrc/windows_server_2008.
Total CVEs
2,227
CISA KEV
105
actively exploited
Public exploits
168
Exploited in wild
102
Severity breakdown
CRITICAL51HIGH1525MEDIUM632LOW19
Vulnerabilities
Page 45 of 112
CVE-2022-37994HIGHCVSS 7.82022-10-11
CVE-2022-37994 [HIGH] Windows Group Policy Preference Client Elevation of Privilege Vulnerability
Windows Group Policy Preference Client Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Group Policy Preference Client: Windows Group Policy Preference Client
Microsoft: Microsoft
Customer Action Required: Yes
Impa
msrc
CVE-2022-38051HIGHCVSS 7.82022-10-11
CVE-2022-38051 [HIGH] Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status:
msrc
CVE-2022-24504HIGHCVSS 8.12022-10-11
CVE-2022-24504 [HIGH] Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
FAQ: How could an attacker exploit the vulnerability?
To exploit this vulnerability, an attacker would need to send a specially crafted malicious PPTP packet to a PPTP server. This could result in remote code execution on the server side.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What doe
msrc
CVE-2022-37987HIGHCVSS 7.82022-10-11
CVE-2022-37987 [HIGH] Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability
Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Client Server Run-time Subsystem (CSRSS): Client Server Run-time Subsystem (CSRSS)
Microsoft: Microsoft
Customer Ac
msrc
CVE-2022-38040HIGHCVSS 8.82022-10-11
CVE-2022-38040 [HIGH] Microsoft ODBC Driver Remote Code Execution Vulnerability
Microsoft ODBC Driver Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.
Windows ODBC Driver:
msrc
CVE-2022-37981MEDIUMCVSS 4.32022-10-11
CVE-2022-37981 [MEDIUM] Windows Event Logging Service Denial of Service Vulnerability
Windows Event Logging Service Denial of Service Vulnerability
FAQ: According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of availability (A:L)? What does that mean for this vulnerability?
The performance can be interrupted and/or reduced, but the attacker cannot fully deny service.
Windows Event Logging Service: Windows Event Logging Service
Microsoft: Microsoft
msrc
CVE-2022-37985MEDIUMCVSS 5.52022-10-11
CVE-2022-37985 [MEDIUM] Windows Graphics Component Information Disclosure Vulnerability
Windows Graphics Component Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of initialized or uninitialized memory in the process heap.
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information Disclosure
Exploit Stat
msrc
CVE-2022-37977MEDIUMCVSS 6.52022-10-11
CVE-2022-37977 [MEDIUM] Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
Windows Local Security Authority Subsystem Service (LSASS): Windows Local Security Authority Subsystem Service (LSASS)
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Sof
msrc
CVE-2022-38033MEDIUMCVSS 6.52022-10-11
CVE-2022-38033 [MEDIUM] Windows Server Remotely Accessible Registry Keys Information Disclosure Vulnerability
Windows Server Remotely Accessible Registry Keys Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploits this vulnerability would be able to remotely read registry keys under HKLM\SYSTEM\CurrentControlSet\Control\SecurePipeServers\Winreg\AllowedExactPaths\Machine not normally accessible to a norma
msrc
CVE-2022-38032MEDIUMCVSS 6.62022-10-11
CVE-2022-38032 [MEDIUM] Windows Portable Device Enumerator Service Security Feature Bypass Vulnerability
Windows Portable Device Enumerator Service Security Feature Bypass Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An authenticated attacker who successfully exploited this vulnerability could bypass "Deny Read/Write USB devices" Group Policy settings and access USB devices attached to a vulnerable system.
Windows Portable De
msrc
CVE-2022-35770MEDIUMCVSS 6.52022-10-11
CVE-2022-35770 [MEDIUM] Windows NTLM Spoofing Vulnerability
Windows NTLM Spoofing Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
The user would have to access a malicious folder or directory. Users should never open anything that they do not know or trust to be safe.
Windows NTLM: Windows NTLM
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Spoofing
Exploit Status: Publicly Disclosed:No;Exploited:
msrc
CVE-2022-34721CRITICALCVSS 9.8Exploited2022-09-13
CVE-2022-34721 [CRITICAL] Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability
Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a specially crafted IP packet to a target machine that is running Windows and has IPSec enabled, which could enable a remote code execution exploitation.
FAQ: Does this vulnerability affect all
msrc
CVE-2022-34722CRITICALCVSS 9.82022-09-13
CVE-2022-34722 [CRITICAL] Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability
Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a specially crafted IP packet to a target machine that is running Windows and has IPSec enabled, which could enable a remote code execution exploitation.
FAQ: Does this vulnerability affect all
msrc
CVE-2022-34718CRITICALCVSS 9.82022-09-13
CVE-2022-34718 [CRITICAL] Windows TCP/IP Remote Code Execution Vulnerability
Windows TCP/IP Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a specially crafted IPv6 packet to a Windows node where IPSec is enabled, which could enable a remote code execution exploitation on that machine.
Windows TCP/IP: Windows TCP/IP
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Statu
msrc
CVE-2022-35803HIGHCVSS 7.8Exploited2022-09-13
CVE-2022-35803 [HIGH] Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Common Log File System Driver: Windows Common Log File System Driver
Microsoft: Microsoft
Customer Action Required: Yes
Impact:
msrc
CVE-2022-35840HIGHCVSS 8.82022-09-13
CVE-2022-35840 [HIGH] Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute c
msrc
CVE-2022-34720HIGHCVSS 7.52022-09-13
CVE-2022-34720 [HIGH] Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability
Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability
Windows IKE Extension: Windows IKE Extension
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.micr
msrc
CVE-2022-34730HIGHCVSS 8.82022-09-13
CVE-2022-34730 [HIGH] Microsoft ODBC Driver Remote Code Execution Vulnerability
Microsoft ODBC Driver Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.
Windows ODBC Driver:
msrc
CVE-2022-34729HIGHCVSS 7.82022-09-13
CVE-2022-34729 [HIGH] Windows GDI Elevation of Privilege Vulnerability
Windows GDI Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploite
msrc
CVE-2022-34732HIGHCVSS 8.82022-09-13
CVE-2022-34732 [HIGH] Microsoft ODBC Driver Remote Code Execution Vulnerability
Microsoft ODBC Driver Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.
Windows ODBC Driver:
msrc