This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2011-04-13
Product Windows Server 2008 Last view 2021-01-12
Version r2 Type Os
Update sp1  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware x64  
Other *  
 
CPE Product cpe:2.3:o:microsoft:windows_server_2008

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
7.8 2021-01-12 CVE-2021-1709

Windows Win32k Elevation of Privilege Vulnerability

5.7 2021-01-12 CVE-2021-1708

Windows GDI+ Information Disclosure Vulnerability

8.8 2021-01-12 CVE-2021-1706

Windows LUAFV Elevation of Privilege Vulnerability

7.8 2021-01-12 CVE-2021-1704

Windows Hyper-V Elevation of Privilege Vulnerability

7.8 2021-01-12 CVE-2021-1702

Windows Remote Procedure Call Runtime Elevation of Privilege Vulnerability

8.8 2021-01-12 CVE-2021-1701

Remote Procedure Call Runtime Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-1658, CVE-2021-1660, CVE-2021-1664, CVE-2021-1666, CVE-2021-1667, CVE-2021-1671, CVE-2021-1673, CVE-2021-1700.

8.8 2021-01-12 CVE-2021-1700

Remote Procedure Call Runtime Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-1658, CVE-2021-1660, CVE-2021-1664, CVE-2021-1666, CVE-2021-1667, CVE-2021-1671, CVE-2021-1673, CVE-2021-1701.

5.5 2021-01-12 CVE-2021-1699

Windows (modem.sys) Information Disclosure Vulnerability

5.5 2021-01-12 CVE-2021-1696

Windows Graphics Component Information Disclosure Vulnerability

7.8 2021-01-12 CVE-2021-1695

Windows Print Spooler Elevation of Privilege Vulnerability

9.8 2021-01-12 CVE-2021-1694

Windows Update Stack Elevation of Privilege Vulnerability

7.8 2021-01-12 CVE-2021-1693

Windows CSC Service Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-1652, CVE-2021-1653, CVE-2021-1654, CVE-2021-1655, CVE-2021-1659, CVE-2021-1688.

7.8 2021-01-12 CVE-2021-1688

Windows CSC Service Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-1652, CVE-2021-1653, CVE-2021-1654, CVE-2021-1655, CVE-2021-1659, CVE-2021-1693.

6.5 2021-01-12 CVE-2021-1679

Windows CryptoAPI Denial of Service Vulnerability

7.5 2021-01-12 CVE-2021-1678

NTLM Security Feature Bypass Vulnerability

5.5 2021-01-12 CVE-2021-1676

Windows NT Lan Manager Datagram Receiver Driver Information Disclosure Vulnerability

8.8 2021-01-12 CVE-2021-1674

Windows Remote Desktop Protocol Core Security Feature Bypass Vulnerability

8.8 2021-01-12 CVE-2021-1673

Remote Procedure Call Runtime Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-1658, CVE-2021-1660, CVE-2021-1664, CVE-2021-1666, CVE-2021-1667, CVE-2021-1671, CVE-2021-1700, CVE-2021-1701.

8.8 2021-01-12 CVE-2021-1671

Remote Procedure Call Runtime Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-1658, CVE-2021-1660, CVE-2021-1664, CVE-2021-1666, CVE-2021-1667, CVE-2021-1673, CVE-2021-1700, CVE-2021-1701.

7.8 2021-01-12 CVE-2021-1668

Microsoft DTV-DVD Video Decoder Remote Code Execution Vulnerability

8.8 2021-01-12 CVE-2021-1667

Remote Procedure Call Runtime Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-1658, CVE-2021-1660, CVE-2021-1664, CVE-2021-1666, CVE-2021-1671, CVE-2021-1673, CVE-2021-1700, CVE-2021-1701.

8.8 2021-01-12 CVE-2021-1666

Remote Procedure Call Runtime Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-1658, CVE-2021-1660, CVE-2021-1664, CVE-2021-1667, CVE-2021-1671, CVE-2021-1673, CVE-2021-1700, CVE-2021-1701.

7.8 2021-01-12 CVE-2021-1665

GDI+ Remote Code Execution Vulnerability

8.8 2021-01-12 CVE-2021-1664

Remote Procedure Call Runtime Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-1658, CVE-2021-1660, CVE-2021-1666, CVE-2021-1667, CVE-2021-1671, CVE-2021-1673, CVE-2021-1700, CVE-2021-1701.

7.8 2021-01-12 CVE-2021-1661

Windows Installer Elevation of Privilege Vulnerability

CWE : Common Weakness Enumeration

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
29% (190) CWE-269 Improper Privilege Management
22% (149) CWE-200 Information Exposure
11% (74) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
7% (46) CWE-20 Improper Input Validation
6% (43) CWE-264 Permissions, Privileges, and Access Controls
2% (19) CWE-787 Out-of-bounds Write
2% (18) CWE-94 Failure to Control Generation of Code ('Code Injection')
1% (10) CWE-416 Use After Free
1% (10) CWE-125 Out-of-bounds Read
1% (9) CWE-665 Improper Initialization
1% (9) CWE-611 Information Leak Through XML External Entity File Disclosure
1% (8) CWE-59 Improper Link Resolution Before File Access ('Link Following')
0% (6) CWE-19 Data Handling
0% (5) CWE-404 Improper Resource Shutdown or Release
0% (4) CWE-426 Untrusted Search Path
0% (4) CWE-310 Cryptographic Issues
0% (4) CWE-254 Security Features
0% (3) CWE-476 NULL Pointer Dereference
0% (3) CWE-287 Improper Authentication
0% (3) CWE-190 Integer Overflow or Wraparound
0% (2) CWE-755 Improper Handling of Exceptional Conditions
0% (2) CWE-522 Insufficiently Protected Credentials
0% (2) CWE-502 Deserialization of Untrusted Data
0% (2) CWE-434 Unrestricted Upload of File with Dangerous Type
0% (2) CWE-399 Resource Management Errors

SAINT Exploits

Description Link
Windows OLE Automation Array command execution More info here
Windows RRAS Service Remote Code Execution Vulnerability More info here

Open Source Vulnerability Database (OSVDB)

id Description
71735 Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Loc...

ExploitDB Exploits

id Description
35230 Internet Explorer < 11 - OLE Automation Array Remote Code Execution (MSF)
35229 Internet Explorer <11 - OLE Automation Array Remote Code Execution
30397 Windows Kernel win32k.sys - Integer Overflow (MS13-101)

OpenVAS Exploits

id Description
2011-04-13 Name : Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (2506223)
File : nvt/secpod_ms11-034.nasl

Information Assurance Vulnerability Management (IAVM)

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2015-A-0216 Multiple Vulnerabilities in Microsoft Windows Journal (MS15-098)
Severity: Category II - VMSKEY: V0061393
2015-A-0215 Multiple Vulnerabilities in Microsoft Windows Task Management (MS15-102)
Severity: Category II - VMSKEY: V0061391
2015-A-0212 Multiple Vulnerabilities in Microsoft Graphics Component (MS15-097)
Severity: Category II - VMSKEY: V0061385
2015-A-0197 Microsoft Command Line Parameter Information Disclosure Vulnerability (MS15-088)
Severity: Category II - VMSKEY: V0061313
2015-A-0196 Multiple Vulnerabilities in Microsoft Graphics Component (MS15-080)
Severity: Category II - VMSKEY: V0061311
2015-A-0194 Multiple Vulnerabilities in Microsoft Office (MS15-081)
Severity: Category II - VMSKEY: V0061307
2015-A-0193 Multiple Privilege Escalation Vulnerabilities in Microsoft Windows (MS15-090)
Severity: Category II - VMSKEY: V0061305
2015-A-0192 Microsoft Windows Mount Manager Privilege Escalation Vulnerability (MS15-085)
Severity: Category I - VMSKEY: V0061303
2015-A-0190 Multiple Vulnerabilities in Microsoft Remote Desktop Protocol (RDP) (MS15-082)
Severity: Category II - VMSKEY: V0061299
2015-A-0188 Cumulative Security Update for Microsoft Internet Explorer (MS15-079)
Severity: Category I - VMSKEY: V0061297
2015-B-0096 Microsoft WebDAV Information Disclosure Vulnerability (MS15-089)
Severity: Category II - VMSKEY: V0061285
2015-A-0125 Microsoft Common Controls Could Allow Remote Code Execution Vulnerability (MS...
Severity: Category II - VMSKEY: V0060943
2015-A-0111 Microsoft SChannel Information Disclosure Vulnerability (MS15-055)
Severity: Category I - VMSKEY: V0060659
2015-A-0107 Microsoft Service Control Manager Privilege Escalation Vulnerability (MS15-050)
Severity: Category II - VMSKEY: V0060651
2015-A-0108 Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-051)
Severity: Category II - VMSKEY: V0060653
2015-A-0092 Microsoft Windows HTTP stack Remote Code Execution Vulnerability (MS15-034)
Severity: Category I - VMSKEY: V0059899
2015-A-0091 Multiple Vulnerabilities in Microsoft Windows (MS15-038)
Severity: Category II - VMSKEY: V0059897
2015-B-0037 Microsoft Windows Task Scheduler Security Feature Bypass Vulnerability (MS15-...
Severity: Category II - VMSKEY: V0059023
2015-B-0036 Microsoft Windows Information Disclosure Vulnerability (MS15-024)
Severity: Category II - VMSKEY: V0059021
2015-B-0034 Microsoft Windows Photo Decoder Component Information Disclosure Vulnerabilit...
Severity: Category II - VMSKEY: V0059017
2015-A-0053 Multiple Vulnerabilities in Microsoft Windows (MS15-020)
Severity: Category II - VMSKEY: V0059001
2015-A-0048 Multiple Vulnerabilities in Windows Kernel (MS15-025)
Severity: Category II - VMSKEY: V0058995
2015-B-0017 Microsoft Group Policy Security Feature Bypass Vulnerability (MS15-014)
Severity: Category I - VMSKEY: V0058755
2015-A-0035 Microsoft Windows Privilege Escalation Vulnerability (MS15-015)
Severity: Category II - VMSKEY: V0058747
2015-A-0033 Microsoft Group Policy Remote Code Execution (MS15-011)
Severity: Category I - VMSKEY: V0058743

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56856 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56855 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56854 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56853 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56852 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56851 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56850 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56849 - Type : OS-WINDOWS - Revision : 1
2021-01-28 Cisco RV Series Routers stack buffer overflow attempt
RuleID : 56843 - Type : SERVER-WEBAPP - Revision : 2
2021-01-12 Microsoft Windows SMB2 SET_INFO information disclosure attempt
RuleID : 56571 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows malicious Netlogon NetrServerAuthenticate3 request attempt
RuleID : 56290 - Type : OS-WINDOWS - Revision : 6
2020-11-12 Microsoft Windows Remote Desktop information disclosure attempt
RuleID : 55994 - Type : OS-WINDOWS - Revision : 1
2020-11-12 Microsoft Windows digital signature spoofing attempt
RuleID : 55983 - Type : OS-WINDOWS - Revision : 1
2020-11-12 Microsoft Windows digital signature spoofing attempt
RuleID : 55982 - Type : OS-WINDOWS - Revision : 1
2020-10-22 Microsoft Windows NetrServerReqChallenge RPC transport sign and seal disablin...
RuleID : 55802 - Type : OS-WINDOWS - Revision : 1
2020-10-20 Microsoft Windows Netlogon crafted NetrServerAuthenticate elevation of privil...
RuleID : 55704 - Type : OS-WINDOWS - Revision : 2
2020-10-20 Microsoft Windows Netlogon crafted NetrServerReqChallenge elevation of privil...
RuleID : 55703 - Type : OS-WINDOWS - Revision : 2
2020-10-06 Microsoft Windows win32k kernel driver use after free attempt
RuleID : 55144 - Type : OS-WINDOWS - Revision : 1
2020-10-06 Microsoft Windows win32k kernel driver use after free attempt
RuleID : 55143 - Type : OS-WINDOWS - Revision : 1
2020-10-06 Microsoft Windows CLFS Driver elevation of privilege attempt
RuleID : 55142 - Type : FILE-OTHER - Revision : 1
2020-10-06 Microsoft Windows CLFS Driver elevation of privilege attempt
RuleID : 55141 - Type : FILE-OTHER - Revision : 1
2020-09-19 Windows print spooler elevation of privilege attempt
RuleID : 54820 - Type : OS-WINDOWS - Revision : 1
2020-09-19 Windows print spooler elevation of privilege attempt
RuleID : 54819 - Type : OS-WINDOWS - Revision : 1
2020-09-19 Windows Print Spooler elevation of privilege attempt
RuleID : 54818 - Type : OS-WINDOWS - Revision : 1
2020-09-19 Windows Print Spooler elevation of privilege attempt
RuleID : 54817 - Type : OS-WINDOWS - Revision : 1

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4053578.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4053579.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4053580.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4053581.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4054517.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4054518.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4054519.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4054520.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_win2008.nasl - Type: ACT_GATHER_INFO
2017-11-03 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_aug_4034668.nasl - Type: ACT_GATHER_INFO
2017-11-03 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_jul_4025338.nasl - Type: ACT_GATHER_INFO
2017-11-03 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_oct_4042895.nasl - Type: ACT_GATHER_INFO
2017-11-03 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_sep_4038781.nasl - Type: ACT_GATHER_INFO
2017-10-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_oct_win2008.nasl - Type: ACT_GATHER_INFO
2017-10-10 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_oct_4041676.nasl - Type: ACT_GATHER_INFO
2017-10-10 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_oct_4041681.nasl - Type: ACT_GATHER_INFO
2017-10-10 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_oct_4041689.nasl - Type: ACT_GATHER_INFO
2017-10-10 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_oct_4041690.nasl - Type: ACT_GATHER_INFO
2017-10-10 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_oct_4041691.nasl - Type: ACT_GATHER_INFO
2017-10-10 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_oct_4041693.nasl - Type: ACT_GATHER_INFO
2017-09-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_sep_4038777.nasl - Type: ACT_GATHER_INFO
2017-09-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_sep_4038782.nasl - Type: ACT_GATHER_INFO
2017-09-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_sep_4038783.nasl - Type: ACT_GATHER_INFO
2017-09-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_sep_4038788.nasl - Type: ACT_GATHER_INFO
2017-09-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_sep_4038792.nasl - Type: ACT_GATHER_INFO