Msrc Windows Server 2012 vulnerabilities
3,255 known vulnerabilities affecting msrc/windows_server_2012.
Total CVEs
3,255
CISA KEV
133
actively exploited
Public exploits
200
Exploited in wild
124
Severity breakdown
CRITICAL83HIGH2162MEDIUM978LOW32
Vulnerabilities
Page 45 of 163
CVE-2024-21349HIGHCVSS 8.82024-02-13
CVE-2024-21349 [HIGH] CWE-122 Microsoft ActiveX Data Objects Remote Code Execution Vulnerability
Microsoft ActiveX Data Objects Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. Af
msrc
CVE-2024-21369HIGHCVSS 8.82024-02-13
CVE-2024-21369 [HIGH] CWE-122 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using th
msrc
CVE-2024-21420HIGHCVSS 8.82024-02-13
CVE-2024-21420 [HIGH] CWE-190 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using th
msrc
CVE-2024-21371HIGHCVSS 7.02024-02-13
CVE-2024-21371 [HIGH] CWE-367 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerabilit
msrc
CVE-2024-21370HIGHCVSS 8.82024-02-13
CVE-2024-21370 [HIGH] CWE-122 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using th
msrc
CVE-2024-21391HIGHCVSS 8.82024-02-13
CVE-2024-21391 [HIGH] CWE-197 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using th
msrc
CVE-2024-21372HIGHCVSS 8.82024-02-13
CVE-2024-21372 [HIGH] CWE-190 Windows OLE Remote Code Execution Vulnerability
Windows OLE Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server
msrc
CVE-2024-21355HIGHCVSS 7.02024-02-13
CVE-2024-21355 [HIGH] CWE-591 Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who succ
msrc
CVE-2024-21359HIGHCVSS 8.82024-02-13
CVE-2024-21359 [HIGH] CWE-122 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using th
msrc
CVE-2024-21405HIGHCVSS 7.02024-02-13
CVE-2024-21405 [HIGH] CWE-591 Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation
msrc
CVE-2024-21367HIGHCVSS 8.82024-02-13
CVE-2024-21367 [HIGH] CWE-122 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using th
msrc
CVE-2024-21360HIGHCVSS 8.82024-02-13
CVE-2024-21360 [HIGH] CWE-122 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using th
msrc
CVE-2024-21406HIGHCVSS 7.52024-02-13
CVE-2024-21406 [HIGH] CWE-319 Windows Printing Service Spoofing Vulnerability
Windows Printing Service Spoofing Vulnerability
FAQ: How could an attacker exploit this vulnerability?
In most situations, an unauthenticated attacker could send a specially crafted packet to a targeted server utilizing the HTTP Protocol Stack (http.sys) to process packets.
Microsoft Windows: Microsoft Windows
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Spoofing
Exploit Status: Publicly Disclosed:N
msrc
CVE-2024-21348HIGHCVSS 7.52024-02-13
CVE-2024-21348 [HIGH] CWE-122 Internet Connection Sharing (ICS) Denial of Service Vulnerability
Internet Connection Sharing (ICS) Denial of Service Vulnerability
Windows Internet Connection Sharing (ICS): Windows Internet Connection Sharing (ICS)
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search
msrc
CVE-2024-21358HIGHCVSS 8.82024-02-13
CVE-2024-21358 [HIGH] CWE-122 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using th
msrc
CVE-2024-21356MEDIUMCVSS 6.52024-02-13
CVE-2024-21356 [MEDIUM] CWE-476 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
Windows LDAP - Lightweight Directory Access Protocol: Windows LDAP - Lightweight Directory Access Protocol
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A
msrc
CVE-2024-21340MEDIUMCVSS 4.62024-02-13
CVE-2024-21340 [MEDIUM] CWE-126 Windows Kernel Information Disclosure Vulnerability
Windows Kernel Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information Disclosure
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Sof
msrc
CVE-2024-20652HIGHCVSS 8.12024-01-09
CVE-2024-20652 [HIGH] CWE-73 Windows HTML Platforms Security Feature Bypass Vulnerability
Windows HTML Platforms Security Feature Bypass Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
The MapURLToZone method could be bypassed by an attacker if the API returned a Zone value of 'Intranet' by passing a URL with a device path to the Lanman redirector device object. The same is true of the WebDav device.
FAQ: According to the CVSS m
msrc
CVE-2024-20682HIGHCVSS 7.82024-01-09
CVE-2024-20682 [HIGH] CWE-822 Windows Cryptographic Services Remote Code Execution Vulnerability
Windows Cryptographic Services Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?
Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate t
msrc
CVE-2024-20654HIGHCVSS 8.02024-01-09
CVE-2024-20654 [HIGH] CWE-190 Microsoft ODBC Driver Remote Code Execution Vulnerability
Microsoft ODBC Driver Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?
Successful exploitation of this vulnerability simply requires the attacker or targeted user to leverage a Microsoft Access application to automatically talk to a SQL Server while utilizing a remote SQL Server address that they control.
FA
msrc