U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • CPE Product Version: cpe:/o:microsoft:windows_server_2016:-
There are 3,199 matching records.
Displaying matches 1,521 through 1,540.
Vuln ID Summary CVSS Severity
CVE-2020-17042

Windows Print Spooler Remote Code Execution Vulnerability

Published: November 11, 2020; 2:15:16 AM -0500
V3.1: 8.8 HIGH
V2.0: 9.3 HIGH
CVE-2020-17041

Windows Print Configuration Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:15 AM -0500
V3.1: 7.8 HIGH
V2.0: 7.2 HIGH
CVE-2020-17040

Windows Hyper-V Security Feature Bypass Vulnerability

Published: November 11, 2020; 2:15:15 AM -0500
V3.1: 6.5 MEDIUM
V2.0: 7.5 HIGH
CVE-2020-17038

Win32k Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:15 AM -0500
V3.1: 7.8 HIGH
V2.0: 7.2 HIGH
CVE-2020-17036

Windows Function Discovery SSDP Provider Information Disclosure Vulnerability

Published: November 11, 2020; 2:15:15 AM -0500
V3.1: 5.5 MEDIUM
V2.0: 4.9 MEDIUM
CVE-2020-17035

Windows Kernel Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:15 AM -0500
V3.1: 7.8 HIGH
V2.0: 7.2 HIGH
CVE-2020-17034

Windows Remote Access Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:15 AM -0500
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-17033

Windows Remote Access Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:15 AM -0500
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-17032

Windows Remote Access Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:15 AM -0500
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-17031

Windows Remote Access Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:15 AM -0500
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-17029

Windows Canonical Display Driver Information Disclosure Vulnerability

Published: November 11, 2020; 2:15:15 AM -0500
V3.1: 5.5 MEDIUM
V2.0: 4.9 MEDIUM
CVE-2020-17028

Windows Remote Access Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:15 AM -0500
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-17027

Windows Remote Access Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:15 AM -0500
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-17026

Windows Remote Access Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:15 AM -0500
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-17025

Windows Remote Access Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:14 AM -0500
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-17024

Windows Client Side Rendering Print Provider Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:14 AM -0500
V3.1: 7.8 HIGH
V2.0: 7.2 HIGH
CVE-2020-17014

Windows Print Spooler Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:14 AM -0500
V3.1: 7.8 HIGH
V2.0: 6.6 MEDIUM
CVE-2020-17013

Win32k Information Disclosure Vulnerability

Published: November 11, 2020; 2:15:14 AM -0500
V3.1: 5.5 MEDIUM
V2.0: 2.1 LOW
CVE-2020-17011

Windows Port Class Library Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:14 AM -0500
V3.1: 7.8 HIGH
V2.0: 7.2 HIGH
CVE-2020-17007

Windows Error Reporting Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:14 AM -0500
V3.1: 7.0 HIGH
V2.0: 4.6 MEDIUM