Msrc Windows Server 2008 R2 vulnerabilities
2,474 known vulnerabilities affecting msrc/windows_server_2008_r2.
Total CVEs
2,474
CISA KEV
111
actively exploited
Public exploits
175
Exploited in wild
107
Severity breakdown
CRITICAL55HIGH1697MEDIUM701LOW21
Vulnerabilities
Page 55 of 124
CVE-2022-30166HIGHCVSS 7.82022-06-14
CVE-2022-30166 [HIGH] Local Security Authority Subsystem Service Elevation of Privilege Vulnerability
Local Security Authority Subsystem Service Elevation of Privilege Vulnerability
Windows Local Security Authority Subsystem Service (LSASS): Windows Local Security Authority Subsystem Service (LSASS)
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Softwa
msrc
CVE-2022-21125HIGHCVSS 5.52022-06-14
CVE-2022-21125 [MEDIUM] Intel: CVE-2022-21125 Shared Buffers Data Sampling (SBDS)
Intel: CVE-2022-21125 Shared Buffers Data Sampling (SBDS)
FAQ: Why is this Intel CVE included in the Security Update Guide?
The vulnerability assigned to this CVE is in certain processor models offered by Intel. The mitigation for this vulnerability requires a firmware update, and a corresponding Windows updates enables the mitigation. This CVE is being documented in the Security Update Guide to announce that the
msrc
CVE-2022-30149HIGHCVSS 7.52022-06-14
CVE-2022-30149 [HIGH] Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.
FAQ: According to the CVSS metric, the attack ve
msrc
CVE-2022-21127HIGHCVSS 5.52022-06-14
CVE-2022-21127 [MEDIUM] Intel: CVE-2022-21127 Special Register Buffer Data Sampling Update (SRBDS Update)
Intel: CVE-2022-21127 Special Register Buffer Data Sampling Update (SRBDS Update)
FAQ: Why is this Intel CVE included in the Security Update Guide?
The vulnerability assigned to this CVE is in certain processor models offered by Intel. The mitigation for this vulnerability requires a firmware update, and a corresponding Windows updates enables the mitigation. This CVE is being documented in
msrc
CVE-2022-30151HIGHCVSS 7.02022-06-14
CVE-2022-30151 [HIGH] Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
Windows Ancillary Function Driver for WinSock: Windows Ancillary Function Driver for WinSock
Microso
msrc
CVE-2022-30142HIGHCVSS 7.52022-06-14
CVE-2022-30142 [HIGH] Windows File History Remote Code Execution Vulnerability
Windows File History Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to
msrc
CVE-2022-30143HIGHCVSS 7.52022-06-14
CVE-2022-30143 [HIGH] Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
FAQ: Are there any special conditions necessary for this vulnerability to be exploitable?
Yes. This vulnerability is only exploitable if the MaxReceiveBuffer LDAP policy is set to a value higher than the default value. Systems with the default value of this policy would not be vulnerable.
For more
msrc
CVE-2022-21166HIGHCVSS 5.52022-06-14
CVE-2022-21166 [MEDIUM] Intel: CVE-2022-21166 Device Register Partial Write (DRPW)
Intel: CVE-2022-21166 Device Register Partial Write (DRPW)
FAQ: Why is this Intel CVE included in the Security Update Guide?
The vulnerability assigned to this CVE is in certain processor models offered by Intel. The mitigation for this vulnerability requires a firmware update, and a corresponding Windows updates enables the mitigation. This CVE is being documented in the Security Update Guide to announce that th
msrc
CVE-2022-21123HIGHCVSS 5.52022-06-14
CVE-2022-21123 [MEDIUM] Intel: CVE-2022-21123 Shared Buffers Data Read (SBDR)
Intel: CVE-2022-21123 Shared Buffers Data Read (SBDR)
FAQ: Why is this Intel CVE included in the Security Update Guide?
The vulnerability assigned to this CVE is in certain processor models offered by Intel. The mitigation for this vulnerability requires a firmware update, and a corresponding Windows updates enables the mitigation. This CVE is being documented in the Security Update Guide to announce that the latest b
msrc
CVE-2022-30140HIGHCVSS 7.52022-06-14
CVE-2022-30140 [HIGH] Windows iSCSI Discovery Service Remote Code Execution Vulnerability
Windows iSCSI Discovery Service Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Successful exploitation of this vulnerability requires a user to place a call to trigger the vulnerability.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
msrc
CVE-2022-30152HIGHCVSS 7.52022-06-14
CVE-2022-30152 [HIGH] Windows Network Address Translation (NAT) Denial of Service Vulnerability
Windows Network Address Translation (NAT) Denial of Service Vulnerability
Windows Network Address Translation (NAT): Windows Network Address Translation (NAT)
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Refere
msrc
CVE-2022-30161HIGHCVSS 8.82022-06-14
CVE-2022-30161 [HIGH] Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit the vulnerability by convincing a user to connect a Lightweight Directory Access Protocol (LDAP) client to a malicious LDAP server. When the vulnerability is successfully exploited this could allow the malicious server
msrc
CVE-2022-30163HIGHCVSS 8.52022-06-14
CVE-2022-30163 [HIGH] Windows Hyper-V Remote Code Execution Vulnerability
Windows Hyper-V Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
In this case, a successful attack could be performed from a low privilege Hyper-V guest. The attacker could traverse the guest's security boundary to execute code on the Hyper-V host execution environment.
FAQ: According to the CVS
msrc
CVE-2022-30155MEDIUMCVSS 5.52022-06-14
CVE-2022-30155 [MEDIUM] Windows Kernel Denial of Service Vulnerability
Windows Kernel Denial of Service Vulnerability
FAQ: How could an attacker exploit this vulnerability?
This vulnerability could be exploited if an authenticated user opens a specially crafted file locally or browses to that file on a network share when running an unpatched version of Windows. When the user browses or lists the maliciously crafted file that action could cause a crash of the operating system.
Windows Kernel: W
msrc
CVE-2022-29130CRITICALCVSS 9.82022-05-10
CVE-2022-29130 [CRITICAL] Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
FAQ: Are there any special conditions necessary for this vulnerability to be exploitable?
Yes. This vulnerability is only exploitable if the MaxReceiveBuffer LDAP policy is set to a value higher than the default value. Systems with the default value of this policy would not be vulnerable.
For m
msrc
CVE-2022-22012CRITICALCVSS 9.82022-05-10
CVE-2022-22012 [CRITICAL] Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
FAQ: Are there any special conditions necessary for this vulnerability to be exploitable?
Yes. This vulnerability is only exploitable if the MaxReceiveBuffer LDAP policy is set to a value higher than the default value. Systems with the default value of this policy would not be vulnerable.
For m
msrc
CVE-2022-29139HIGHCVSS 8.82022-05-10
CVE-2022-29139 [HIGH] Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit the vulnerability by convincing a user to connect a Lightweight Directory Access Protocol (LDAP) client to a malicious LDAP server. When the vulnerability is successfully exploited this could allow the malicious server
msrc
CVE-2022-29115HIGHCVSS 7.82022-05-10
CVE-2022-29115 [HIGH] Windows Fax Service Remote Code Execution Vulnerability
Windows Fax Service Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Exploitation of the vulnerability requires that a user import a specially crafted contact record and then send it a FAX.
Role: Windows Fax Service: Role: Windows Fax Service
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code
msrc
CVE-2022-26926HIGHCVSS 7.82022-05-10
CVE-2022-26926 [HIGH] Windows Address Book Remote Code Execution Vulnerability
Windows Address Book Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Exploitation of the vulnerability requires that a user import a specially crafted contact record into the Windows Address Book.
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a r
msrc
CVE-2022-22014HIGHCVSS 8.82022-05-10
CVE-2022-22014 [HIGH] Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Windows LDAP - Lightweight Directory Access Protocol: Windows LDAP - Lightweight Directory Access Protocol
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older S
msrc