Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Windows_server_2008
(Microsoft)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 3024 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-09-15 | CVE-2021-40444 | <p>Microsoft is investigating reports of a remote code execution vulnerability in MSHTML that affects Microsoft Windows. Microsoft is aware of targeted attacks that attempt to exploit this vulnerability by using specially-crafted Microsoft Office documents.</p> <p>An attacker could craft a malicious ActiveX control to be used by a Microsoft Office document that hosts the browser rendering engine. The attacker would then have to convince the user to open the malicious document. Users whose... | Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_1909, Windows_10_2004, Windows_10_20h2, Windows_10_21h1, Windows_7, Windows_8\.1, Windows_rt_8\.1, Windows_server_2004, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_20h2 | 8.8 | ||
2021-08-12 | CVE-2021-36942 | Windows LSA Spoofing Vulnerability | Windows_server_2004, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_20h2 | 7.5 | ||
2020-08-17 | CVE-2020-1464 | A spoofing vulnerability exists when Windows incorrectly validates file signatures. An attacker who successfully exploited this vulnerability could bypass security features and load improperly signed files. In an attack scenario, an attacker could bypass security features intended to prevent improperly signed files from being loaded. The update addresses the vulnerability by correcting how Windows validates file signatures. | Windows_10_1507, Windows_10_1607, Windows_10_1709, Windows_10_1803, Windows_10_1809, Windows_10_1903, Windows_10_1909, Windows_10_2004, Windows_7, Windows_8\.1, Windows_rt_8\.1, Windows_server_1903, Windows_server_1909, Windows_server_2004, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019 | 7.8 | ||
2021-07-14 | CVE-2021-31979 | Windows Kernel Elevation of Privilege Vulnerability | Windows_10, Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_1909, Windows_10_2004, Windows_10_20h2, Windows_10_21h1, Windows_7, Windows_8\.1, Windows_rt_8\.1, Windows_server_2004, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_20h2 | 7.8 | ||
2021-07-14 | CVE-2021-33771 | Windows Kernel Elevation of Privilege Vulnerability | Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_1909, Windows_10_2004, Windows_10_20h2, Windows_10_21h1, Windows_8\.1, Windows_rt_8\.1, Windows_server_2004, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_20h2 | 7.8 | ||
2021-07-16 | CVE-2021-34448 | Scripting Engine Memory Corruption Vulnerability | Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_1909, Windows_10_2004, Windows_10_20h2, Windows_10_21h1, Windows_7, Windows_8\.1, Windows_rt_8\.1, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019 | 6.8 | ||
2016-11-10 | CVE-2016-7255 | The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." | Windows_10_1507, Windows_10_1511, Windows_10_1607, Windows_7, Windows_8\.1, Windows_rt_8\.1, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_vista | 7.8 | ||
2019-04-09 | CVE-2019-0808 | An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0797. | Windows_7, Windows_server_2008 | 7.8 | ||
2019-05-16 | CVE-2019-0708 | A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'. | Agile_controller\-Campus_firmware, Bh620_v2_firmware, Bh621_v2_firmware, Bh622_v2_firmware, Bh640_v2_firmware, Ch121_firmware, Ch140_firmware, Ch220_firmware, Ch221_firmware, Ch222_firmware, Ch240_firmware, Ch242_firmware, Ch242_v3_firmware, E6000_chassis_firmware, E6000_firmware, Elog_firmware, Espace_ecs_firmware, Gtsoftx3000_firmware, Oceanstor_18500_firmware, Oceanstor_18800_firmware, Oceanstor_18800f_firmware, Oceanstor_hvs85t_firmware, Oceanstor_hvs88t_firmware, Rh1288_v2_firmware, Rh1288a_v2_firmware, Rh2265_v2_firmware, Rh2268_v2_firmware, Rh2285_v2_firmware, Rh2285h_v2_firmware, Rh2288_v2_firmware, Rh2288a_v2_firmware, Rh2288e_v2_firmware, Rh2288h_v2_firmware, Rh2485_v2_firmware, Rh5885_v2_firmware, Rh5885_v3_firmware, Seco_vsm_firmware, Smc2\.0_firmware, Uma_firmware, X6000_firmware, X8000_firmware, Windows_7, Windows_server_2008, Aptio_firmware, Atellica_solution_firmware, Axiom_multix_m_firmware, Axiom_vertix_md_trauma_firmware, Axiom_vertix_solitaire_m_firmware, Centralink_firmware, Lantis_firmware, Mobilett_xp_digital_firmware, Multix_pro_acss_firmware, Multix_pro_acss_p_firmware, Multix_pro_firmware, Multix_pro_navy_firmware, Multix_pro_p_firmware, Multix_swing_firmware, Multix_top_acss_firmware, Multix_top_acss_p_firmware, Multix_top_firmware, Multix_top_p_firmware, Rapidpoint_500_firmware, Streamlab_firmware, Syngo_lab_process_manager, Vertix_solitaire_firmware, Viva_e_firmware, Viva_twin_firmware | 9.8 | ||
2013-11-06 | CVE-2013-3906 | GDI+ in Microsoft Windows Vista SP2 and Server 2008 SP2; Office 2003 SP3, 2007 SP3, and 2010 SP1 and SP2; Office Compatibility Pack SP3; and Lync 2010, 2010 Attendee, 2013, and Basic 2013 allows remote attackers to execute arbitrary code via a crafted TIFF image, as demonstrated by an image in a Word document, and exploited in the wild in October and November 2013. | Excel_viewer, Lync, Office, Office_compatibility_pack, Powerpoint_viewer, Windows_server_2008, Windows_vista, Word_viewer | 7.8 |