U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Keyword (text search): cpe:2.3:o:microsoft:windows_server_2008:r2:sp2:*:*:enterprise:*:x64:*
  • CPE Name Search: true
There are 546 matching records.
Displaying matches 81 through 100.
Vuln ID Summary CVSS Severity
CVE-2022-21833

Virtual Machine IDE Drive Elevation of Privilege Vulnerability

Published: January 11, 2022; 4:15:09 PM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0: 7.2 HIGH
CVE-2021-43893

Windows Encrypting File System (EFS) Elevation of Privilege Vulnerability

Published: December 15, 2021; 10:15:11 AM -0500
V4.0:(not available)
V3.1: 7.5 HIGH
V2.0: 6.0 MEDIUM
CVE-2021-43883

Windows Installer Elevation of Privilege Vulnerability

Published: December 15, 2021; 10:15:11 AM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2021-43248

Windows Digital Media Receiver Elevation of Privilege Vulnerability

Published: December 15, 2021; 10:15:10 AM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2021-43236

Microsoft Message Queuing Information Disclosure Vulnerability

Published: December 15, 2021; 10:15:10 AM -0500
V4.0:(not available)
V3.1: 7.5 HIGH
V2.0: 5.0 MEDIUM
CVE-2021-43234

Windows Fax Service Remote Code Execution Vulnerability

Published: December 15, 2021; 10:15:10 AM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0: 6.8 MEDIUM
CVE-2021-43230

Windows NTFS Elevation of Privilege Vulnerability

Published: December 15, 2021; 10:15:09 AM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2021-43229

Windows NTFS Elevation of Privilege Vulnerability

Published: December 15, 2021; 10:15:09 AM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2021-43222

Microsoft Message Queuing Information Disclosure Vulnerability

Published: December 15, 2021; 10:15:09 AM -0500
V4.0:(not available)
V3.1: 7.5 HIGH
V2.0: 5.0 MEDIUM
CVE-2021-43216

Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability

Published: December 15, 2021; 10:15:09 AM -0500
V4.0:(not available)
V3.1: 6.5 MEDIUM
V2.0: 6.8 MEDIUM
CVE-2021-43215

iSNS Server Memory Corruption Vulnerability Can Lead to Remote Code Execution

Published: December 15, 2021; 10:15:09 AM -0500
V4.0:(not available)
V3.1: 9.8 CRITICAL
V2.0: 6.8 MEDIUM
CVE-2021-43207

Windows Common Log File System Driver Elevation of Privilege Vulnerability

Published: December 15, 2021; 10:15:09 AM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2021-27077

Windows Win32k Elevation of Privilege Vulnerability

Published: March 11, 2021; 11:15:18 AM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2021-26872

Windows Event Tracing Elevation of Privilege Vulnerability

Published: March 11, 2021; 11:15:14 AM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2021-26869

Windows ActiveX Installer Service Information Disclosure Vulnerability

Published: March 11, 2021; 11:15:14 AM -0500
V4.0:(not available)
V3.1: 5.5 MEDIUM
V2.0: 2.1 LOW
CVE-2021-1706

Windows LUAFV Elevation of Privilege Vulnerability

Published: January 12, 2021; 3:15:34 PM -0500
V4.0:(not available)
V3.1: 7.3 HIGH
V2.0: 9.0 HIGH
CVE-2020-17087

Windows Kernel Local Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:18 AM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0: 7.2 HIGH
CVE-2020-17043

Windows Remote Access Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:16 AM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0: 6.8 MEDIUM
CVE-2020-1476

An elevation of privilege vulnerability exists when ASP.NET or .NET web applications running on IIS improperly allow access to cached files. An attacker who successfully exploited this vulnerability could gain access to restricted files. To exploit this vulnerability, an attacker would need to send a specially crafted request to an affected server. The update addresses the vulnerability by changing how ASP.NET and .NET handle requests.

Published: August 17, 2020; 3:15:15 PM -0400
V4.0:(not available)
V3.1: 5.5 MEDIUM
V2.0: 2.1 LOW
CVE-2020-1043

A remote code execution vulnerability exists when Hyper-V RemoteFX vGPU on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Hyper-V RemoteFX vGPU Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1032, CVE-2020-1036, CVE-2020-1040, CVE-2020-1041, CVE-2020-1042.

Published: July 14, 2020; 7:15:11 PM -0400
V4.0:(not available)
V3.1: 9.0 CRITICAL
V2.0: 7.7 HIGH