Vulnerabilities (CVE)

Filtered by vendor Microsoft Subscribe
Filtered by product Windows Server 2008
Total 3385 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-37975 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2023-12-20 N/A 8.8 HIGH
Windows Group Policy Elevation of Privilege Vulnerability
CVE-2022-35770 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2023-12-20 N/A 6.5 MEDIUM
Windows NTLM Spoofing Vulnerability
CVE-2022-34689 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2023-12-20 N/A 7.5 HIGH
Windows CryptoAPI Spoofing Vulnerability
CVE-2022-33645 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2023-12-20 N/A 7.5 HIGH
Windows TCP/IP Driver Denial of Service Vulnerability
CVE-2022-33635 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2023-12-20 N/A 7.8 HIGH
Windows GDI+ Remote Code Execution Vulnerability
CVE-2022-33634 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2023-12-20 N/A 8.1 HIGH
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
CVE-2022-30198 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2023-12-20 N/A 8.1 HIGH
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
CVE-2022-26929 1 Microsoft 11 .net Framework, Windows 10, Windows 11 and 8 more 2023-12-20 N/A 7.8 HIGH
.NET Framework Remote Code Execution Vulnerability
CVE-2022-24504 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2023-12-20 N/A 8.1 HIGH
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
CVE-2022-22035 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2023-12-20 N/A 8.1 HIGH
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
CVE-2023-35622 1 Microsoft 6 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 3 more 2023-12-14 N/A 7.5 HIGH
Windows DNS Spoofing Vulnerability
CVE-2011-1236 1 Microsoft 6 Windows 2003 Server, Windows 7, Windows Server 2003 and 3 more 2023-12-07 7.2 HIGH N/A
Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
CVE-2011-3415 1 Microsoft 5 Windows 7, Windows Server 2003, Windows Server 2008 and 2 more 2023-12-07 6.8 MEDIUM N/A
Open redirect vulnerability in the Forms Authentication feature in the ASP.NET subsystem in Microsoft .NET Framework 2.0 SP2, 3.5 SP1, 3.5.1, and 4.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a crafted return URL, aka "Insecure Redirect in .NET Form Authentication Vulnerability."
CVE-2013-1273 1 Microsoft 5 Windows 7, Windows Server 2003, Windows Server 2008 and 2 more 2023-12-07 4.9 MEDIUM N/A
Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.
CVE-2009-3103 1 Microsoft 2 Windows Server 2008, Windows Vista 2023-12-07 10.0 HIGH N/A
Array index error in the SMBv2 protocol implementation in srv2.sys in Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, and Windows 7 RC allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via an & (ampersand) character in a Process ID High header field in a NEGOTIATE PROTOCOL REQUEST packet, which triggers an attempted dereference of an out-of-bounds memory location, aka "SMBv2 Negotiation Vulnerability." NOTE: some of these details are obtained from third party information.
CVE-2012-1880 1 Microsoft 7 Internet Explorer, Windows 2003 Server, Windows 7 and 4 more 2023-12-07 9.3 HIGH N/A
Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "insertRow Remote Code Execution Vulnerability."
CVE-2013-0089 1 Microsoft 9 Internet Explorer, Windows 7, Windows 8 and 6 more 2023-12-07 9.3 HIGH N/A
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CMarkupBehaviorContext Use After Free Vulnerability."
CVE-2009-2511 1 Microsoft 6 Windows 2000, Windows 7, Windows Server 2003 and 3 more 2023-12-07 7.5 HIGH N/A
Integer overflow in the CryptoAPI component in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows man-in-the-middle attackers to spoof arbitrary SSL servers and other entities via an X.509 certificate that has a malformed ASN.1 Object Identifier (OID) and was issued by a legitimate Certification Authority, aka "Integer Overflow in X.509 Object Identifiers Vulnerability."
CVE-2011-1238 1 Microsoft 6 Windows 2003 Server, Windows 7, Windows Server 2003 and 3 more 2023-12-07 7.2 HIGH N/A
Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
CVE-2012-1870 1 Microsoft 5 Windows 7, Windows Server 2003, Windows Server 2008 and 2 more 2023-12-07 4.3 MEDIUM N/A
The CBC mode in the TLS protocol, as used in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and other products, allows remote web servers to obtain plaintext data by triggering multiple requests to a third-party HTTPS server and sniffing the network during the resulting HTTPS session, aka "TLS Protocol Vulnerability."