Msrc Windows Server 2008 R2 vulnerabilities
2,474 known vulnerabilities affecting msrc/windows_server_2008_r2.
Total CVEs
2,474
CISA KEV
111
actively exploited
Public exploits
175
Exploited in wild
107
Severity breakdown
CRITICAL55HIGH1697MEDIUM701LOW21
Vulnerabilities
Page 72 of 124
CVE-2021-26869MEDIUMCVSS 5.52021-03-09
CVE-2021-26869 [MEDIUM] Windows ActiveX Installer Service Information Disclosure Vulnerability
Windows ActiveX Installer Service Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is unauthorized file system access - reading from the file system.
Microsoft ActiveX: Microsoft ActiveX
Microsoft: Microsoft
Impact: Information Disclosu
msrc
CVE-2021-24074CRITICALCVSS 9.82021-02-09
CVE-2021-24074 [CRITICAL] Windows TCP/IP Remote Code Execution Vulnerability
Windows TCP/IP Remote Code Execution Vulnerability
FAQ: Where can I find more information about this vulnerability?
Please see MSRC Blog regarding the TCP/IP vulnerabilities discussed in CVE-2021-24074, CVE-2021-24086, and CVE-2021-24094.
Windows TCP/IP: Windows TCP/IP
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Like
msrc
CVE-2021-24077CRITICALCVSS 9.82021-02-09
CVE-2021-24077 [CRITICAL] Windows Fax Service Remote Code Execution Vulnerability
Windows Fax Service Remote Code Execution Vulnerability
FAQ: In what scenarios is my computer vulnerable?
For Windows 11 and Windows 10 the FAX service is not installed by default. For the vulnerability to be exploitable, the Windows Fax and Scan feature needs to be enabled, and the Fax service needs to be running. Systems that do not have the Fax service running are not vulnerable.
How can I verify whether the Fa
msrc
CVE-2021-24094CRITICALCVSS 9.82021-02-09
CVE-2021-24094 [CRITICAL] Windows TCP/IP Remote Code Execution Vulnerability
Windows TCP/IP Remote Code Execution Vulnerability
FAQ: Where can I find more information about this vulnerability?
Please see MSRC Blog regarding the TCP/IP vulnerabilities discussed in CVE-2021-24074, CVE-2021-24086, and CVE-2021-24094.
Windows TCP/IP: Windows TCP/IP
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Like
msrc
CVE-2021-1722HIGHCVSS 8.12021-02-09
CVE-2021-1722 [HIGH] Windows Fax Service Remote Code Execution Vulnerability
Windows Fax Service Remote Code Execution Vulnerability
FAQ: In what scenarios is my computer vulnerable?
For Windows 11 and Windows 10 the FAX service is not installed by default. For the vulnerability to be exploitable, the Windows Fax and Scan feature needs to be enabled, and the Fax service needs to be running. Systems that do not have the Fax service running are not vulnerable.
How can I verify whether the Fax ser
msrc
CVE-2021-24083HIGHCVSS 7.82021-02-09
CVE-2021-24083 [HIGH] Windows Address Book Remote Code Execution Vulnerability
Windows Address Book Remote Code Execution Vulnerability
Windows Address Book: Windows Address Book
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4601354
Reference: https://catalog.u
msrc
CVE-2021-24102HIGHCVSS 7.82021-02-09
CVE-2021-24102 [HIGH] Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing: Windows Event Tracing
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4601354
Reference: https://ca
msrc
CVE-2021-25195HIGHCVSS 7.82021-02-09
CVE-2021-25195 [HIGH] Windows PKU2U Elevation of Privilege Vulnerability
Windows PKU2U Elevation of Privilege Vulnerability
FAQ: What is PKU2U?
PKU2U is a peer-to-peer authentication protocol. This setting prevents online identities from authenticating to domain-joined systems. Authentication will be centrally managed with Windows user accounts.
How do I know if my servers are exploitable by this vulnerability?
If your servers are not configured to allow the use of PKU2U authentication, they wo
msrc
CVE-2021-24088HIGHCVSS 8.82021-02-09
CVE-2021-24088 [HIGH] Windows Local Spooler Remote Code Execution Vulnerability
Windows Local Spooler Remote Code Execution Vulnerability
Windows Print Spooler Components: Windows Print Spooler Components
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4601319
Re
msrc
CVE-2021-24103HIGHCVSS 7.82021-02-09
CVE-2021-24103 [HIGH] Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing: Windows Event Tracing
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4601354
Reference: https://ca
msrc
CVE-2021-1727HIGHCVSS 7.82021-02-09
CVE-2021-1727 [HIGH] Windows Installer Elevation of Privilege Vulnerability
Windows Installer Elevation of Privilege Vulnerability
Windows Installer: Windows Installer
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4601354
Reference: https://catalog.update.mic
msrc
CVE-2021-1734HIGHCVSS 7.52021-02-09
CVE-2021-1734 [HIGH] Windows Remote Procedure Call Information Disclosure Vulnerability
Windows Remote Procedure Call Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Windows Remote Procedure Call: Windows Remote Procedu
msrc
CVE-2021-24086HIGHCVSS 7.52021-02-09
CVE-2021-24086 [CRITICAL] Windows TCP/IP Denial of Service Vulnerability
Windows TCP/IP Denial of Service Vulnerability
FAQ: Where can I find more information about this vulnerability?
Please see MSRC Blog regarding the TCP/IP vulnerabilities discussed in CVE-2021-24074, CVE-2021-24086, and CVE-2021-24094.
Windows TCP/IP: Windows TCP/IP
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Sof
msrc
CVE-2021-24080MEDIUMCVSS 6.52021-02-09
CVE-2021-24080 [MEDIUM] Windows Trust Verification API Denial of Service Vulnerability
Windows Trust Verification API Denial of Service Vulnerability
Windows Trust Verification API: Windows Trust Verification API
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4601319
msrc
CVE-2021-1664HIGHCVSS 8.82021-01-12
CVE-2021-1664 [HIGH] Remote Procedure Call Runtime Remote Code Execution Vulnerability
Remote Procedure Call Runtime Remote Code Execution Vulnerability
Windows Remote Procedure Call Runtime: Windows Remote Procedure Call Runtime
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.
msrc
CVE-2021-1673HIGHCVSS 8.82021-01-12
CVE-2021-1673 [HIGH] Remote Procedure Call Runtime Remote Code Execution Vulnerability
Remote Procedure Call Runtime Remote Code Execution Vulnerability
Windows Remote Procedure Call Runtime: Windows Remote Procedure Call Runtime
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.
msrc
CVE-2021-1709HIGHCVSS 7.02021-01-12
CVE-2021-1709 [HIGH] Windows Win32k Elevation of Privilege Vulnerability
Windows Win32k Elevation of Privilege Vulnerability
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB
msrc
CVE-2021-1666HIGHCVSS 8.82021-01-12
CVE-2021-1666 [HIGH] Remote Procedure Call Runtime Remote Code Execution Vulnerability
Remote Procedure Call Runtime Remote Code Execution Vulnerability
Windows Remote Procedure Call Runtime: Windows Remote Procedure Call Runtime
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.
msrc
CVE-2021-1659HIGHCVSS 7.82021-01-12
CVE-2021-1659 [HIGH] Windows CSC Service Elevation of Privilege Vulnerability
Windows CSC Service Elevation of Privilege Vulnerability
Windows CSC Service: Windows CSC Service
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598242
msrc
CVE-2021-1657HIGHCVSS 7.82021-01-12
CVE-2021-1657 [HIGH] Windows Fax Compose Form Remote Code Execution Vulnerability
Windows Fax Compose Form Remote Code Execution Vulnerability
Microsoft Windows: Microsoft Windows
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB45982
msrc