U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:datacenter:*:x86:*
  • CPE Name Search: true
There are 772 matching records.
Displaying matches 61 through 80.
Vuln ID Summary CVSS Severity
CVE-2022-24503

Remote Desktop Protocol Client Information Disclosure Vulnerability

Published: March 09, 2022; 12:15:15 PM -0500
V3.1: 5.4 MEDIUM
V2.0: 5.0 MEDIUM
CVE-2022-24502

Windows HTML Platforms Security Feature Bypass Vulnerability

Published: March 09, 2022; 12:15:14 PM -0500
V3.1: 4.3 MEDIUM
V2.0: 4.3 MEDIUM
CVE-2022-23283

Windows ALPC Elevation of Privilege Vulnerability

Published: March 09, 2022; 12:15:11 PM -0500
V3.1: 7.0 HIGH
V2.0: 4.4 MEDIUM
CVE-2022-23253

Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability

Published: March 09, 2022; 12:15:10 PM -0500
V3.1: 6.5 MEDIUM
V2.0: 4.0 MEDIUM
CVE-2022-21880

Windows GDI+ Information Disclosure Vulnerability

Published: January 11, 2022; 4:15:11 PM -0500
V3.1: 7.5 HIGH
V2.0: 7.8 HIGH
CVE-2021-38663

Windows exFAT File System Information Disclosure Vulnerability

Published: October 12, 2021; 9:15:09 PM -0400
V3.1: 5.5 MEDIUM
V2.0: 2.1 LOW
CVE-2021-36953

Windows TCP/IP Denial of Service Vulnerability

Published: October 12, 2021; 9:15:09 PM -0400
V3.1: 7.5 HIGH
V2.0: 5.0 MEDIUM
CVE-2021-26414

Windows DCOM Server Security Feature Bypass

Published: June 08, 2021; 7:15:08 PM -0400
V3.1: 4.8 MEDIUM
V2.0: 4.3 MEDIUM
CVE-2021-1656

TPM Device Driver Information Disclosure Vulnerability

Published: January 12, 2021; 3:15:31 PM -0500
V3.1: 5.5 MEDIUM
V2.0: 2.1 LOW
CVE-2020-17088

Windows Common Log File System Driver Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:19 AM -0500
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-17052

Scripting Engine Memory Corruption Vulnerability

Published: November 11, 2020; 2:15:16 AM -0500
V3.1: 7.5 HIGH
V2.0: 6.8 MEDIUM
CVE-2020-17051

Windows Network File System Remote Code Execution Vulnerability

Published: November 11, 2020; 2:15:16 AM -0500
V3.1: 9.8 CRITICAL
V2.0: 10.0 HIGH
CVE-2020-17047

Windows Network File System Denial of Service Vulnerability

Published: November 11, 2020; 2:15:16 AM -0500
V3.1: 7.5 HIGH
V2.0: 7.8 HIGH
CVE-2020-17045

Windows KernelStream Information Disclosure Vulnerability

Published: November 11, 2020; 2:15:16 AM -0500
V3.1: 5.5 MEDIUM
V2.0: 4.9 MEDIUM
CVE-2020-17042

Windows Print Spooler Remote Code Execution Vulnerability

Published: November 11, 2020; 2:15:16 AM -0500
V3.1: 8.8 HIGH
V2.0: 9.3 HIGH
CVE-2020-17038

Win32k Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:15 AM -0500
V3.1: 7.8 HIGH
V2.0: 7.2 HIGH
CVE-2020-17036

Windows Function Discovery SSDP Provider Information Disclosure Vulnerability

Published: November 11, 2020; 2:15:15 AM -0500
V3.1: 5.5 MEDIUM
V2.0: 4.9 MEDIUM
CVE-2020-17029

Windows Canonical Display Driver Information Disclosure Vulnerability

Published: November 11, 2020; 2:15:15 AM -0500
V3.1: 5.5 MEDIUM
V2.0: 4.9 MEDIUM
CVE-2020-16937

<p>An information disclosure vulnerability exists when the .NET Framework improperly handles objects in memory. An attacker who successfully exploited the vulnerability could disclose contents of an affected system's memory.</p> <p>To exploit the vulnerability, an authenticated attacker would need to run a specially crafted application.</p> <p>The update addresses the vulnerability by correcting how the .NET Framework handles objects in memory.</p>

Published: October 16, 2020; 7:15:15 PM -0400
V3.1: 4.7 MEDIUM
V2.0: 4.3 MEDIUM
CVE-2020-16902

<p>An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior.</p> <p>A locally authenticated attacker could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>The security update addresses the vulnerability by correcting the input sanitization error to preclude unintended elevation.</p>

Published: October 16, 2020; 7:15:13 PM -0400
V3.1: 7.8 HIGH
V2.0: 7.2 HIGH