Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:datacenter:*:x86:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2022-24503 |
Remote Desktop Protocol Client Information Disclosure Vulnerability Published: March 09, 2022; 12:15:15 PM -0500 |
V3.1: 5.4 MEDIUM V2.0: 5.0 MEDIUM |
CVE-2022-24502 |
Windows HTML Platforms Security Feature Bypass Vulnerability Published: March 09, 2022; 12:15:14 PM -0500 |
V3.1: 4.3 MEDIUM V2.0: 4.3 MEDIUM |
CVE-2022-23283 |
Windows ALPC Elevation of Privilege Vulnerability Published: March 09, 2022; 12:15:11 PM -0500 |
V3.1: 7.0 HIGH V2.0: 4.4 MEDIUM |
CVE-2022-23253 |
Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability Published: March 09, 2022; 12:15:10 PM -0500 |
V3.1: 6.5 MEDIUM V2.0: 4.0 MEDIUM |
CVE-2022-21880 |
Windows GDI+ Information Disclosure Vulnerability Published: January 11, 2022; 4:15:11 PM -0500 |
V3.1: 7.5 HIGH V2.0: 7.8 HIGH |
CVE-2021-38663 |
Windows exFAT File System Information Disclosure Vulnerability Published: October 12, 2021; 9:15:09 PM -0400 |
V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2021-36953 |
Windows TCP/IP Denial of Service Vulnerability Published: October 12, 2021; 9:15:09 PM -0400 |
V3.1: 7.5 HIGH V2.0: 5.0 MEDIUM |
CVE-2021-26414 |
Windows DCOM Server Security Feature Bypass Published: June 08, 2021; 7:15:08 PM -0400 |
V3.1: 4.8 MEDIUM V2.0: 4.3 MEDIUM |
CVE-2021-1656 |
TPM Device Driver Information Disclosure Vulnerability Published: January 12, 2021; 3:15:31 PM -0500 |
V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2020-17088 |
Windows Common Log File System Driver Elevation of Privilege Vulnerability Published: November 11, 2020; 2:15:19 AM -0500 |
V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2020-17052 |
Scripting Engine Memory Corruption Vulnerability Published: November 11, 2020; 2:15:16 AM -0500 |
V3.1: 7.5 HIGH V2.0: 6.8 MEDIUM |
CVE-2020-17051 |
Windows Network File System Remote Code Execution Vulnerability Published: November 11, 2020; 2:15:16 AM -0500 |
V3.1: 9.8 CRITICAL V2.0: 10.0 HIGH |
CVE-2020-17047 |
Windows Network File System Denial of Service Vulnerability Published: November 11, 2020; 2:15:16 AM -0500 |
V3.1: 7.5 HIGH V2.0: 7.8 HIGH |
CVE-2020-17045 |
Windows KernelStream Information Disclosure Vulnerability Published: November 11, 2020; 2:15:16 AM -0500 |
V3.1: 5.5 MEDIUM V2.0: 4.9 MEDIUM |
CVE-2020-17042 |
Windows Print Spooler Remote Code Execution Vulnerability Published: November 11, 2020; 2:15:16 AM -0500 |
V3.1: 8.8 HIGH V2.0: 9.3 HIGH |
CVE-2020-17038 |
Win32k Elevation of Privilege Vulnerability Published: November 11, 2020; 2:15:15 AM -0500 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2020-17036 |
Windows Function Discovery SSDP Provider Information Disclosure Vulnerability Published: November 11, 2020; 2:15:15 AM -0500 |
V3.1: 5.5 MEDIUM V2.0: 4.9 MEDIUM |
CVE-2020-17029 |
Windows Canonical Display Driver Information Disclosure Vulnerability Published: November 11, 2020; 2:15:15 AM -0500 |
V3.1: 5.5 MEDIUM V2.0: 4.9 MEDIUM |
CVE-2020-16937 |
<p>An information disclosure vulnerability exists when the .NET Framework improperly handles objects in memory. An attacker who successfully exploited the vulnerability could disclose contents of an affected system's memory.</p> <p>To exploit the vulnerability, an authenticated attacker would need to run a specially crafted application.</p> <p>The update addresses the vulnerability by correcting how the .NET Framework handles objects in memory.</p> Published: October 16, 2020; 7:15:15 PM -0400 |
V3.1: 4.7 MEDIUM V2.0: 4.3 MEDIUM |
CVE-2020-16902 |
<p>An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior.</p> <p>A locally authenticated attacker could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>The security update addresses the vulnerability by correcting the input sanitization error to preclude unintended elevation.</p> Published: October 16, 2020; 7:15:13 PM -0400 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |