Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2011-04-13 |
Product | Windows Server 2008 | Last view | 2020-07-14 |
Version | r2 | Type | Os |
Update | sp1 | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | itanium | ||
Other | * | ||
CPE Product | cpe:2.3:o:microsoft:windows_server_2008 |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.8 | 2020-07-14 | CVE-2020-1438 | An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1373, CVE-2020-1390, CVE-2020-1427, CVE-2020-1428. |
7.8 | 2020-07-14 | CVE-2020-1428 | An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1373, CVE-2020-1390, CVE-2020-1427, CVE-2020-1438. |
7.8 | 2020-07-14 | CVE-2020-1427 | An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1373, CVE-2020-1390, CVE-2020-1428, CVE-2020-1438. |
7.8 | 2020-07-14 | CVE-2020-1399 | An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1249, CVE-2020-1353, CVE-2020-1370, CVE-2020-1404, CVE-2020-1413, CVE-2020-1414, CVE-2020-1415, CVE-2020-1422. |
7.8 | 2020-07-14 | CVE-2020-1390 | An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1373, CVE-2020-1427, CVE-2020-1428, CVE-2020-1438. |
7.8 | 2020-07-14 | CVE-2020-1373 | An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1390, CVE-2020-1427, CVE-2020-1428, CVE-2020-1438. |
7.8 | 2020-07-14 | CVE-2020-1085 | An elevation of privilege vulnerability exists in the way that the Windows Function Discovery Service handles objects in memory, aka 'Windows Function Discovery Service Elevation of Privilege Vulnerability'. |
6.5 | 2020-06-09 | CVE-2020-1348 | An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'. |
8.8 | 2020-06-09 | CVE-2020-1317 | An elevation of privilege vulnerability exists when Group Policy improperly checks access, aka 'Group Policy Elevation of Privilege Vulnerability'. |
7.8 | 2020-06-09 | CVE-2020-1314 | An elevation of privilege vulnerability exists in Windows Text Service Framework (TSF) when the TSF server fails to properly handle messages sent from TSF clients, aka 'Windows Text Service Framework Elevation of Privilege Vulnerability'. |
7.8 | 2020-06-09 | CVE-2020-1311 | An elevation of privilege vulnerability exists when Component Object Model (COM) client uses special case IIDs, aka 'Component Object Model Elevation of Privilege Vulnerability'. |
7.8 | 2020-06-09 | CVE-2020-1302 | An elevation of privilege vulnerability exists in Windows Installer because of the way Windows Installer handles certain filesystem operations.To exploit the vulnerability, an attacker would require unprivileged execution on the victim system, aka 'Windows Installer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1272, CVE-2020-1277, CVE-2020-1312. |
8.8 | 2020-06-09 | CVE-2020-1301 | A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 1.0 (SMBv1) server handles certain requests, aka 'Windows SMB Remote Code Execution Vulnerability'. |
8.8 | 2020-06-09 | CVE-2020-1300 | A remote code execution vulnerability exists when Microsoft Windows fails to properly handle cabinet files.To exploit the vulnerability, an attacker would have to convince a user to either open a specially crafted cabinet file or spoof a network printer and trick a user into installing a malicious cabinet file disguised as a printer driver.The update addresses the vulnerability by correcting how Windows handles cabinet files., aka 'Windows Remote Code Execution Vulnerability'. |
8.8 | 2020-06-09 | CVE-2020-1299 | A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed.An attacker who successfully exploited this vulnerability could gain the same user rights as the local user, aka 'LNK Remote Code Execution Vulnerability'. |
7.8 | 2020-06-09 | CVE-2020-1291 | An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'. |
7.8 | 2020-06-09 | CVE-2020-1287 | An elevation of privilege vulnerability exists in the way that the Windows WalletService handles objects in memory, aka 'Windows WalletService Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1294. |
8.8 | 2020-06-09 | CVE-2020-1281 | A remote code execution vulnerability exists when Microsoft Windows OLE fails to properly validate user input, aka 'Windows OLE Remote Code Execution Vulnerability'. |
7.8 | 2020-06-09 | CVE-2020-1272 | An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior.A locally authenticated attacker could run arbitrary code with elevated system privileges, aka 'Windows Installer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1277, CVE-2020-1302, CVE-2020-1312. |
7.8 | 2020-06-09 | CVE-2020-1271 | An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Backup Service Elevation of Privilege Vulnerability'. |
7.8 | 2020-06-09 | CVE-2020-1270 | An elevation of privilege vulnerability exists in the way that the wlansvc.dll handles objects in memory, aka 'Windows WLAN Service Elevation of Privilege Vulnerability'. |
7.8 | 2020-06-09 | CVE-2020-1269 | An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0986, CVE-2020-1237, CVE-2020-1246, CVE-2020-1262, CVE-2020-1264, CVE-2020-1266, CVE-2020-1273, CVE-2020-1274, CVE-2020-1275, CVE-2020-1276, CVE-2020-1307, CVE-2020-1316. |
5.5 | 2020-06-09 | CVE-2020-1263 | An information disclosure vulnerability exists in the way Windows Error Reporting (WER) handles objects in memory, aka 'Windows Error Reporting Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-1261. |
7.8 | 2020-06-09 | CVE-2020-1262 | An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0986, CVE-2020-1237, CVE-2020-1246, CVE-2020-1264, CVE-2020-1266, CVE-2020-1269, CVE-2020-1273, CVE-2020-1274, CVE-2020-1275, CVE-2020-1276, CVE-2020-1307, CVE-2020-1316. |
8.8 | 2020-06-09 | CVE-2020-1255 | An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) IIS module improperly handles uploaded content, aka 'Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability'. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
29% (104) | CWE-200 | Information Exposure |
12% (42) | CWE-264 | Permissions, Privileges, and Access Controls |
7% (26) | CWE-787 | Out-of-bounds Write |
6% (22) | CWE-20 | Improper Input Validation |
5% (20) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
4% (14) | CWE-416 | Use After Free |
3% (11) | CWE-269 | Improper Privilege Management |
3% (11) | CWE-125 | Out-of-bounds Read |
2% (10) | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
2% (9) | CWE-665 | Improper Initialization |
2% (9) | CWE-611 | Information Leak Through XML External Entity File Disclosure |
2% (8) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
2% (7) | CWE-19 | Data Handling |
1% (5) | CWE-404 | Improper Resource Shutdown or Release |
1% (4) | CWE-476 | NULL Pointer Dereference |
1% (4) | CWE-426 | Untrusted Search Path |
1% (4) | CWE-254 | Security Features |
0% (3) | CWE-310 | Cryptographic Issues |
0% (3) | CWE-287 | Improper Authentication |
0% (3) | CWE-190 | Integer Overflow or Wraparound |
0% (2) | CWE-755 | Improper Handling of Exceptional Conditions |
0% (2) | CWE-732 | Incorrect Permission Assignment for Critical Resource |
0% (2) | CWE-522 | Insufficiently Protected Credentials |
0% (2) | CWE-502 | Deserialization of Untrusted Data |
0% (2) | CWE-399 | Resource Management Errors |
SAINT Exploits
Description | Link |
---|---|
Windows OLE Automation Array command execution | More info here |
Windows RRAS Service Remote Code Execution Vulnerability | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
71735 | Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Loc... |
ExploitDB Exploits
id | Description |
---|---|
35230 | Internet Explorer < 11 - OLE Automation Array Remote Code Execution (MSF) |
35229 | Internet Explorer <11 - OLE Automation Array Remote Code Execution |
30397 | Windows Kernel win32k.sys - Integer Overflow (MS13-101) |
OpenVAS Exploits
id | Description |
---|---|
2011-04-13 | Name : Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (2506223) File : nvt/secpod_ms11-034.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0215 | Multiple Vulnerabilities in Microsoft Windows Task Management (MS15-102) Severity: Category II - VMSKEY: V0061391 |
2015-A-0212 | Multiple Vulnerabilities in Microsoft Graphics Component (MS15-097) Severity: Category II - VMSKEY: V0061385 |
2015-A-0197 | Microsoft Command Line Parameter Information Disclosure Vulnerability (MS15-088) Severity: Category II - VMSKEY: V0061313 |
2015-A-0196 | Multiple Vulnerabilities in Microsoft Graphics Component (MS15-080) Severity: Category II - VMSKEY: V0061311 |
2015-A-0194 | Multiple Vulnerabilities in Microsoft Office (MS15-081) Severity: Category II - VMSKEY: V0061307 |
2015-A-0193 | Multiple Privilege Escalation Vulnerabilities in Microsoft Windows (MS15-090) Severity: Category II - VMSKEY: V0061305 |
2015-A-0192 | Microsoft Windows Mount Manager Privilege Escalation Vulnerability (MS15-085) Severity: Category I - VMSKEY: V0061303 |
2015-A-0190 | Multiple Vulnerabilities in Microsoft Remote Desktop Protocol (RDP) (MS15-082) Severity: Category II - VMSKEY: V0061299 |
2015-A-0188 | Cumulative Security Update for Microsoft Internet Explorer (MS15-079) Severity: Category I - VMSKEY: V0061297 |
2015-A-0125 | Microsoft Common Controls Could Allow Remote Code Execution Vulnerability (MS... Severity: Category II - VMSKEY: V0060943 |
2015-A-0108 | Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-051) Severity: Category II - VMSKEY: V0060653 |
2015-A-0107 | Microsoft Service Control Manager Privilege Escalation Vulnerability (MS15-050) Severity: Category II - VMSKEY: V0060651 |
2015-A-0111 | Microsoft SChannel Information Disclosure Vulnerability (MS15-055) Severity: Category I - VMSKEY: V0060659 |
2015-A-0092 | Microsoft Windows HTTP stack Remote Code Execution Vulnerability (MS15-034) Severity: Category I - VMSKEY: V0059899 |
2015-A-0091 | Multiple Vulnerabilities in Microsoft Windows (MS15-038) Severity: Category II - VMSKEY: V0059897 |
2015-B-0037 | Microsoft Windows Task Scheduler Security Feature Bypass Vulnerability (MS15-... Severity: Category II - VMSKEY: V0059023 |
2015-B-0036 | Microsoft Windows Information Disclosure Vulnerability (MS15-024) Severity: Category II - VMSKEY: V0059021 |
2015-B-0034 | Microsoft Windows Photo Decoder Component Information Disclosure Vulnerabilit... Severity: Category II - VMSKEY: V0059017 |
2015-A-0053 | Multiple Vulnerabilities in Microsoft Windows (MS15-020) Severity: Category II - VMSKEY: V0059001 |
2015-A-0048 | Multiple Vulnerabilities in Windows Kernel (MS15-025) Severity: Category II - VMSKEY: V0058995 |
2015-B-0017 | Microsoft Group Policy Security Feature Bypass Vulnerability (MS15-014) Severity: Category I - VMSKEY: V0058755 |
2015-A-0035 | Microsoft Windows Privilege Escalation Vulnerability (MS15-015) Severity: Category II - VMSKEY: V0058747 |
2015-A-0033 | Microsoft Group Policy Remote Code Execution (MS15-011) Severity: Category I - VMSKEY: V0058743 |
2014-A-0179 | Microsoft Input Method Editor (IME) Privilege Escalation Vulnerability Severity: Category I - VMSKEY: V0057395 |
2014-A-0176 | Microsoft Secure Channel Remote Code Execution Vulnerability (MS14-066) Severity: Category I - VMSKEY: V0057389 |
Snort® IPS/IDS
Date | Description |
---|---|
2021-01-28 | Cisco RV Series Routers stack buffer overflow attempt RuleID : 56843 - Type : SERVER-WEBAPP - Revision : 2 |
2020-10-01 | Microsoft Windows Win32k local privilege escalation attempt RuleID : 54919 - Type : OS-WINDOWS - Revision : 1 |
2020-10-01 | Microsoft Windows Win32k local privilege escalation attempt RuleID : 54918 - Type : OS-WINDOWS - Revision : 1 |
2020-08-13 | Microsoft Windows null pointer dereference attempt RuleID : 54535 - Type : OS-WINDOWS - Revision : 1 |
2020-08-13 | Microsoft Windows null pointer dereference attempt RuleID : 54534 - Type : OS-WINDOWS - Revision : 1 |
2020-08-13 | Microsoft Windows CAB file szName directory traversal attempt RuleID : 54527 - Type : FILE-OTHER - Revision : 1 |
2020-08-13 | Microsoft Windows CAB file szName directory traversal attempt RuleID : 54526 - Type : FILE-OTHER - Revision : 1 |
2020-07-09 | Microsoft Windows win32k.sys remote code execution attempt RuleID : 54248 - Type : OS-WINDOWS - Revision : 1 |
2020-07-09 | Microsoft Windows win32k.sys remote code execution attempt RuleID : 54247 - Type : OS-WINDOWS - Revision : 1 |
2020-07-09 | Microsoft Windows CreateDIBitmap privilege escalation attempt RuleID : 54242 - Type : OS-WINDOWS - Revision : 1 |
2020-07-09 | Microsoft Windows CreateDIBitmap privilege escalation attempt RuleID : 54241 - Type : OS-WINDOWS - Revision : 1 |
2020-07-09 | Microsoft Windows SMBv1 remote code execution attempt RuleID : 54240 - Type : OS-WINDOWS - Revision : 1 |
2020-07-07 | Microsoft Windows win32k type confusion attempt RuleID : 54216 - Type : OS-WINDOWS - Revision : 1 |
2020-07-07 | Microsoft Windows win32k type confusion attempt RuleID : 54215 - Type : OS-WINDOWS - Revision : 1 |
2020-06-13 | Windows print spooler elevation of privilege attempt RuleID : 53984 - Type : OS-WINDOWS - Revision : 1 |
2020-06-13 | Windows print spooler elevation of privilege attempt RuleID : 53983 - Type : OS-WINDOWS - Revision : 1 |
2020-06-11 | Microsoft Windows fontdrvhost remote code execution attempt RuleID : 53951 - Type : OS-WINDOWS - Revision : 1 |
2020-06-11 | Microsoft Windows fontdrvhost remote code execution attempt RuleID : 53950 - Type : OS-WINDOWS - Revision : 1 |
2020-06-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 53917 - Type : OS-WINDOWS - Revision : 1 |
2020-06-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 53916 - Type : OS-WINDOWS - Revision : 1 |
2020-05-14 | Microsoft Windows 10 Win32k driver elevation of privileges attempt RuleID : 53655 - Type : OS-WINDOWS - Revision : 1 |
2020-05-14 | Microsoft Windows 10 Win32k driver elevation of privileges attempt RuleID : 53654 - Type : OS-WINDOWS - Revision : 1 |
2020-05-14 | Microsoft Windows CF_PALETTE privilege escalation attempt RuleID : 53653 - Type : OS-WINDOWS - Revision : 1 |
2020-05-14 | Microsoft Windows CF_PALETTE privilege escalation attempt RuleID : 53652 - Type : OS-WINDOWS - Revision : 1 |
2020-05-14 | Microsoft Windows Kernel CSRSS privilege escalation attempt RuleID : 53630 - Type : OS-WINDOWS - Revision : 1 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2017-12-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_dec_4053578.nasl - Type: ACT_GATHER_INFO |
2017-12-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_dec_4053579.nasl - Type: ACT_GATHER_INFO |
2017-12-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_dec_4053580.nasl - Type: ACT_GATHER_INFO |
2017-12-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_dec_4053581.nasl - Type: ACT_GATHER_INFO |
2017-12-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_dec_4054517.nasl - Type: ACT_GATHER_INFO |
2017-12-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_dec_4054518.nasl - Type: ACT_GATHER_INFO |
2017-12-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_dec_4054519.nasl - Type: ACT_GATHER_INFO |
2017-12-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_dec_4054520.nasl - Type: ACT_GATHER_INFO |
2017-12-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_dec_win2008.nasl - Type: ACT_GATHER_INFO |
2017-11-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_nov_4048952.nasl - Type: ACT_GATHER_INFO |
2017-11-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_nov_4048953.nasl - Type: ACT_GATHER_INFO |
2017-11-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_nov_4048954.nasl - Type: ACT_GATHER_INFO |
2017-11-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_nov_4048955.nasl - Type: ACT_GATHER_INFO |
2017-11-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_nov_4048956.nasl - Type: ACT_GATHER_INFO |
2017-11-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_nov_4048957.nasl - Type: ACT_GATHER_INFO |
2017-11-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_nov_4048958.nasl - Type: ACT_GATHER_INFO |
2017-11-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_nov_4048959.nasl - Type: ACT_GATHER_INFO |
2017-11-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_nov_win2008.nasl - Type: ACT_GATHER_INFO |
2017-11-03 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_aug_4034668.nasl - Type: ACT_GATHER_INFO |
2017-11-03 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_jul_4025338.nasl - Type: ACT_GATHER_INFO |
2017-11-03 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_oct_4042895.nasl - Type: ACT_GATHER_INFO |
2017-11-03 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_sep_4038781.nasl - Type: ACT_GATHER_INFO |
2017-10-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_oct_win2008.nasl - Type: ACT_GATHER_INFO |
2017-10-10 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_oct_4041676.nasl - Type: ACT_GATHER_INFO |
2017-10-10 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_oct_4041681.nasl - Type: ACT_GATHER_INFO |