Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2011-04-13 |
Product | Windows Server 2008 | Last view | 2022-06-15 |
Version | r2 | Type | Os |
Update | sp1 | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | x64 | ||
Other | * | ||
CPE Product | cpe:2.3:o:microsoft:windows_server_2008 |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.8 | 2022-06-15 | CVE-2022-30166 | Local Security Authority Subsystem Service Elevation of Privilege Vulnerability. |
7.8 | 2022-06-15 | CVE-2022-30164 | Kerberos AppContainer Security Feature Bypass Vulnerability. |
8.5 | 2022-06-15 | CVE-2022-30163 | Windows Hyper-V Remote Code Execution Vulnerability. |
8.8 | 2022-06-15 | CVE-2022-30161 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30143, CVE-2022-30146, CVE-2022-30149, CVE-2022-30153. |
7.8 | 2022-06-15 | CVE-2022-30160 | Windows Advanced Local Procedure Call Elevation of Privilege Vulnerability. |
5.5 | 2022-06-15 | CVE-2022-30155 | Windows Kernel Denial of Service Vulnerability. |
8.8 | 2022-06-15 | CVE-2022-30153 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30143, CVE-2022-30146, CVE-2022-30149, CVE-2022-30161. |
7.5 | 2022-06-15 | CVE-2022-30152 | Windows Network Address Translation (NAT) Denial of Service Vulnerability. |
7 | 2022-06-15 | CVE-2022-30151 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability. |
7.5 | 2022-06-15 | CVE-2022-30149 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30143, CVE-2022-30146, CVE-2022-30153, CVE-2022-30161. |
7.8 | 2022-06-15 | CVE-2022-30147 | Windows Installer Elevation of Privilege Vulnerability. |
7.5 | 2022-06-15 | CVE-2022-30146 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30143, CVE-2022-30149, CVE-2022-30153, CVE-2022-30161. |
7.5 | 2022-06-15 | CVE-2022-30143 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30146, CVE-2022-30149, CVE-2022-30153, CVE-2022-30161. |
7.5 | 2022-06-15 | CVE-2022-30142 | Windows File History Remote Code Execution Vulnerability. |
8.1 | 2022-06-15 | CVE-2022-30141 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30143, CVE-2022-30146, CVE-2022-30149, CVE-2022-30153, CVE-2022-30161. |
7.5 | 2022-06-15 | CVE-2022-30140 | Windows iSCSI Discovery Service Remote Code Execution Vulnerability. |
7.8 | 2022-06-15 | CVE-2022-30135 | Windows Media Center Elevation of Privilege Vulnerability. |
7.8 | 2022-05-18 | CVE-2022-30138 | Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-29104, CVE-2022-29132. |
8.8 | 2022-05-10 | CVE-2022-29141 | Windows LDAP Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22012, CVE-2022-22013, CVE-2022-22014, CVE-2022-29128, CVE-2022-29129, CVE-2022-29130, CVE-2022-29131, CVE-2022-29137, CVE-2022-29139. |
8.8 | 2022-05-10 | CVE-2022-29139 | Windows LDAP Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22012, CVE-2022-22013, CVE-2022-22014, CVE-2022-29128, CVE-2022-29129, CVE-2022-29130, CVE-2022-29131, CVE-2022-29137, CVE-2022-29141. |
8.8 | 2022-05-10 | CVE-2022-29137 | Windows LDAP Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22012, CVE-2022-22013, CVE-2022-22014, CVE-2022-29128, CVE-2022-29129, CVE-2022-29130, CVE-2022-29131, CVE-2022-29139, CVE-2022-29141. |
7.8 | 2022-05-10 | CVE-2022-29132 | Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-29104. |
8.8 | 2022-05-10 | CVE-2022-29131 | Windows LDAP Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22012, CVE-2022-22013, CVE-2022-22014, CVE-2022-29128, CVE-2022-29129, CVE-2022-29130, CVE-2022-29137, CVE-2022-29139, CVE-2022-29141. |
9.8 | 2022-05-10 | CVE-2022-29130 | Windows LDAP Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22012, CVE-2022-22013, CVE-2022-22014, CVE-2022-29128, CVE-2022-29129, CVE-2022-29131, CVE-2022-29137, CVE-2022-29139, CVE-2022-29141. |
8.8 | 2022-05-10 | CVE-2022-29129 | Windows LDAP Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22012, CVE-2022-22013, CVE-2022-22014, CVE-2022-29128, CVE-2022-29130, CVE-2022-29131, CVE-2022-29137, CVE-2022-29139, CVE-2022-29141. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
22% (129) | CWE-269 | Improper Privilege Management |
19% (108) | CWE-200 | Information Exposure |
7% (43) | CWE-264 | Permissions, Privileges, and Access Controls |
6% (39) | CWE-20 | Improper Input Validation |
6% (37) | CWE-787 | Out-of-bounds Write |
3% (22) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
3% (22) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
2% (15) | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
2% (14) | CWE-416 | Use After Free |
2% (13) | CWE-668 | Exposure of Resource to Wrong Sphere |
2% (13) | CWE-125 | Out-of-bounds Read |
1% (10) | CWE-665 | Improper Initialization |
1% (10) | CWE-362 | Race Condition |
1% (9) | CWE-611 | Information Leak Through XML External Entity File Disclosure |
1% (6) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
1% (6) | CWE-19 | Data Handling |
0% (5) | CWE-404 | Improper Resource Shutdown or Release |
0% (5) | CWE-190 | Integer Overflow or Wraparound |
0% (4) | CWE-476 | NULL Pointer Dereference |
0% (4) | CWE-426 | Untrusted Search Path |
0% (4) | CWE-310 | Cryptographic Issues |
0% (4) | CWE-254 | Security Features |
0% (3) | CWE-755 | Improper Handling of Exceptional Conditions |
0% (3) | CWE-290 | Authentication Bypass by Spoofing |
0% (3) | CWE-287 | Improper Authentication |
SAINT Exploits
Description | Link |
---|---|
Windows OLE Automation Array command execution | More info here |
Windows RRAS Service Remote Code Execution Vulnerability | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
71735 | Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Loc... |
ExploitDB Exploits
id | Description |
---|---|
35230 | Internet Explorer < 11 - OLE Automation Array Remote Code Execution (MSF) |
35229 | Internet Explorer <11 - OLE Automation Array Remote Code Execution |
30397 | Windows Kernel win32k.sys - Integer Overflow (MS13-101) |
OpenVAS Exploits
id | Description |
---|---|
2011-04-13 | Name : Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (2506223) File : nvt/secpod_ms11-034.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0216 | Multiple Vulnerabilities in Microsoft Windows Journal (MS15-098) Severity: Category II - VMSKEY: V0061393 |
2015-A-0215 | Multiple Vulnerabilities in Microsoft Windows Task Management (MS15-102) Severity: Category II - VMSKEY: V0061391 |
2015-A-0212 | Multiple Vulnerabilities in Microsoft Graphics Component (MS15-097) Severity: Category II - VMSKEY: V0061385 |
2015-A-0197 | Microsoft Command Line Parameter Information Disclosure Vulnerability (MS15-088) Severity: Category II - VMSKEY: V0061313 |
2015-A-0196 | Multiple Vulnerabilities in Microsoft Graphics Component (MS15-080) Severity: Category II - VMSKEY: V0061311 |
2015-A-0194 | Multiple Vulnerabilities in Microsoft Office (MS15-081) Severity: Category II - VMSKEY: V0061307 |
2015-A-0193 | Multiple Privilege Escalation Vulnerabilities in Microsoft Windows (MS15-090) Severity: Category II - VMSKEY: V0061305 |
2015-A-0192 | Microsoft Windows Mount Manager Privilege Escalation Vulnerability (MS15-085) Severity: Category I - VMSKEY: V0061303 |
2015-A-0190 | Multiple Vulnerabilities in Microsoft Remote Desktop Protocol (RDP) (MS15-082) Severity: Category II - VMSKEY: V0061299 |
2015-A-0188 | Cumulative Security Update for Microsoft Internet Explorer (MS15-079) Severity: Category I - VMSKEY: V0061297 |
2015-B-0096 | Microsoft WebDAV Information Disclosure Vulnerability (MS15-089) Severity: Category II - VMSKEY: V0061285 |
2015-A-0125 | Microsoft Common Controls Could Allow Remote Code Execution Vulnerability (MS... Severity: Category II - VMSKEY: V0060943 |
2015-A-0111 | Microsoft SChannel Information Disclosure Vulnerability (MS15-055) Severity: Category I - VMSKEY: V0060659 |
2015-A-0107 | Microsoft Service Control Manager Privilege Escalation Vulnerability (MS15-050) Severity: Category II - VMSKEY: V0060651 |
2015-A-0108 | Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-051) Severity: Category II - VMSKEY: V0060653 |
2015-A-0092 | Microsoft Windows HTTP stack Remote Code Execution Vulnerability (MS15-034) Severity: Category I - VMSKEY: V0059899 |
2015-A-0091 | Multiple Vulnerabilities in Microsoft Windows (MS15-038) Severity: Category II - VMSKEY: V0059897 |
2015-B-0037 | Microsoft Windows Task Scheduler Security Feature Bypass Vulnerability (MS15-... Severity: Category II - VMSKEY: V0059023 |
2015-B-0036 | Microsoft Windows Information Disclosure Vulnerability (MS15-024) Severity: Category II - VMSKEY: V0059021 |
2015-B-0034 | Microsoft Windows Photo Decoder Component Information Disclosure Vulnerabilit... Severity: Category II - VMSKEY: V0059017 |
2015-A-0053 | Multiple Vulnerabilities in Microsoft Windows (MS15-020) Severity: Category II - VMSKEY: V0059001 |
2015-A-0048 | Multiple Vulnerabilities in Windows Kernel (MS15-025) Severity: Category II - VMSKEY: V0058995 |
2015-B-0017 | Microsoft Group Policy Security Feature Bypass Vulnerability (MS15-014) Severity: Category I - VMSKEY: V0058755 |
2015-A-0035 | Microsoft Windows Privilege Escalation Vulnerability (MS15-015) Severity: Category II - VMSKEY: V0058747 |
2015-A-0033 | Microsoft Group Policy Remote Code Execution (MS15-011) Severity: Category I - VMSKEY: V0058743 |
Snort® IPS/IDS
Date | Description |
---|---|
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56856 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56855 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56854 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56853 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56852 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56851 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56850 - Type : OS-WINDOWS - Revision : 1 |
2021-02-11 | Microsoft Windows Win32k kernel driver privilege escalation attempt RuleID : 56849 - Type : OS-WINDOWS - Revision : 1 |
2021-01-28 | Cisco RV Series Routers stack buffer overflow attempt RuleID : 56843 - Type : SERVER-WEBAPP - Revision : 2 |
2021-01-12 | Microsoft Windows SMB2 SET_INFO information disclosure attempt RuleID : 56571 - Type : OS-WINDOWS - Revision : 1 |
2020-12-10 | Microsoft Windows malicious Netlogon NetrServerAuthenticate3 request attempt RuleID : 56290 - Type : OS-WINDOWS - Revision : 6 |
2020-11-12 | Microsoft Windows Remote Desktop information disclosure attempt RuleID : 55994 - Type : OS-WINDOWS - Revision : 1 |
2020-11-12 | Microsoft Windows digital signature spoofing attempt RuleID : 55983 - Type : OS-WINDOWS - Revision : 1 |
2020-11-12 | Microsoft Windows digital signature spoofing attempt RuleID : 55982 - Type : OS-WINDOWS - Revision : 1 |
2020-10-22 | Microsoft Windows NetrServerReqChallenge RPC transport sign and seal disablin... RuleID : 55802 - Type : OS-WINDOWS - Revision : 1 |
2020-10-20 | Microsoft Windows Netlogon crafted NetrServerAuthenticate elevation of privil... RuleID : 55704 - Type : OS-WINDOWS - Revision : 2 |
2020-10-20 | Microsoft Windows Netlogon crafted NetrServerReqChallenge elevation of privil... RuleID : 55703 - Type : OS-WINDOWS - Revision : 2 |
2020-10-06 | Microsoft Windows win32k kernel driver use after free attempt RuleID : 55144 - Type : OS-WINDOWS - Revision : 1 |
2020-10-06 | Microsoft Windows win32k kernel driver use after free attempt RuleID : 55143 - Type : OS-WINDOWS - Revision : 1 |
2020-10-06 | Microsoft Windows CLFS Driver elevation of privilege attempt RuleID : 55142 - Type : FILE-OTHER - Revision : 1 |
2020-10-06 | Microsoft Windows CLFS Driver elevation of privilege attempt RuleID : 55141 - Type : FILE-OTHER - Revision : 1 |
2020-09-19 | Windows print spooler elevation of privilege attempt RuleID : 54820 - Type : OS-WINDOWS - Revision : 1 |
2020-09-19 | Windows print spooler elevation of privilege attempt RuleID : 54819 - Type : OS-WINDOWS - Revision : 1 |
2020-09-19 | Windows Print Spooler elevation of privilege attempt RuleID : 54818 - Type : OS-WINDOWS - Revision : 1 |
2020-09-19 | Windows Print Spooler elevation of privilege attempt RuleID : 54817 - Type : OS-WINDOWS - Revision : 1 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-10 | Name: The remote device is affected by multiple vulnerabilities. File: juniper_space_jsa10917_183R1.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-44f8a7454d.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-527698a904.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-5521156807.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-db0d3e157e.nasl - Type: ACT_GATHER_INFO |
2018-10-31 | Name: The remote host is missing a macOS security update that fixes multiple vulner... File: macosx_SecUpd_10_13_6_2018-002.nasl - Type: ACT_GATHER_INFO |
2018-10-18 | Name: The remote host is missing a macOS update that fixes multiple security vulner... File: macos_10_14.nasl - Type: ACT_GATHER_INFO |
2018-09-18 | Name: The remote EulerOS Virtualization host is missing multiple security updates. File: EulerOS_SA-2018-1265.nasl - Type: ACT_GATHER_INFO |
2018-09-18 | Name: The remote EulerOS Virtualization host is missing a security update. File: EulerOS_SA-2018-1267.nasl - Type: ACT_GATHER_INFO |
2018-09-18 | Name: The remote EulerOS Virtualization host is missing multiple security updates. File: EulerOS_SA-2018-1270.nasl - Type: ACT_GATHER_INFO |
2018-09-18 | Name: The remote EulerOS Virtualization host is missing a security update. File: EulerOS_SA-2018-1271.nasl - Type: ACT_GATHER_INFO |
2018-09-17 | Name: The remote Debian host is missing a security update. File: debian_DLA-1506.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4273.nasl - Type: ACT_GATHER_INFO |
2018-07-30 | Name: The remote Slackware host is missing a security update. File: Slackware_SSA_2018-208-01.nasl - Type: ACT_GATHER_INFO |
2018-07-27 | Name: The remote Debian host is missing a security update. File: debian_DLA-1446.nasl - Type: ACT_GATHER_INFO |
2018-07-26 | Name: The remote Amazon Linux 2 host is missing a security update. File: al2_ALAS-2018-1049.nasl - Type: ACT_GATHER_INFO |
2018-07-24 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-1_0-0151.nasl - Type: ACT_GATHER_INFO |
2018-07-24 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-2_0-0049.nasl - Type: ACT_GATHER_INFO |
2018-07-20 | Name: The remote Debian host is missing a security update. File: debian_DLA-1423.nasl - Type: ACT_GATHER_INFO |
2018-07-18 | Name: The remote Virtuozzo host is missing multiple security updates. File: Virtuozzo_VZA-2018-048.nasl - Type: ACT_GATHER_INFO |
2018-07-16 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2018-2162.nasl - Type: ACT_GATHER_INFO |
2018-07-16 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2018-2164.nasl - Type: ACT_GATHER_INFO |
2018-07-09 | Name: The remote Fedora host is missing a security update. File: fedora_2018-9f02e5ed7b.nasl - Type: ACT_GATHER_INFO |
2018-07-05 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2018-1965.nasl - Type: ACT_GATHER_INFO |
2018-07-05 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2018-1997.nasl - Type: ACT_GATHER_INFO |