U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • CPE Product Version: cpe:/o:microsoft:windows_server_2016:-
There are 3,207 matching records.
Displaying matches 481 through 500.
Vuln ID Summary CVSS Severity
CVE-2023-23417

Windows Partition Management Driver Elevation of Privilege Vulnerability

Published: March 14, 2023; 1:15:15 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-23416

Windows Cryptographic Services Remote Code Execution Vulnerability

Published: March 14, 2023; 1:15:14 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-23415

Internet Control Message Protocol (ICMP) Remote Code Execution Vulnerability

Published: March 14, 2023; 1:15:14 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-23414

Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability

Published: March 14, 2023; 1:15:14 PM -0400
V3.1: 7.1 HIGH
V2.0:(not available)
CVE-2023-23413

Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability

Published: March 14, 2023; 1:15:14 PM -0400
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2023-23412

Windows Accounts Picture Elevation of Privilege Vulnerability

Published: March 14, 2023; 1:15:14 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-23411

Windows Hyper-V Denial of Service Vulnerability

Published: March 14, 2023; 1:15:14 PM -0400
V3.1: 6.5 MEDIUM
V2.0:(not available)
CVE-2023-23410

Windows HTTP.sys Elevation of Privilege Vulnerability

Published: March 14, 2023; 1:15:14 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-23409

Client Server Run-Time Subsystem (CSRSS) Information Disclosure Vulnerability

Published: March 14, 2023; 1:15:14 PM -0400
V3.1: 5.5 MEDIUM
V2.0:(not available)
CVE-2023-23407

Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability

Published: March 14, 2023; 1:15:14 PM -0400
V3.1: 7.1 HIGH
V2.0:(not available)
CVE-2023-23406

Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability

Published: March 14, 2023; 1:15:14 PM -0400
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2023-23405

Remote Procedure Call Runtime Remote Code Execution Vulnerability

Published: March 14, 2023; 1:15:13 PM -0400
V3.1: 8.1 HIGH
V2.0:(not available)
CVE-2023-23404

Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability

Published: March 14, 2023; 1:15:13 PM -0400
V3.1: 8.1 HIGH
V2.0:(not available)
CVE-2023-23403

Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability

Published: March 14, 2023; 1:15:13 PM -0400
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2023-23402

Windows Media Remote Code Execution Vulnerability

Published: March 14, 2023; 1:15:13 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-23401

Windows Media Remote Code Execution Vulnerability

Published: March 14, 2023; 1:15:13 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-23400

Windows DNS Server Remote Code Execution Vulnerability

Published: March 14, 2023; 1:15:13 PM -0400
V3.1: 7.2 HIGH
V2.0:(not available)
CVE-2023-23394

Client Server Run-Time Subsystem (CSRSS) Information Disclosure Vulnerability

Published: March 14, 2023; 1:15:12 PM -0400
V3.1: 5.5 MEDIUM
V2.0:(not available)
CVE-2023-23388

Windows Bluetooth Driver Elevation of Privilege Vulnerability

Published: March 14, 2023; 1:15:12 PM -0400
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2023-23385

Windows Point-to-Point Protocol over Ethernet (PPPoE) Elevation of Privilege Vulnerability

Published: March 14, 2023; 1:15:12 PM -0400
V3.1: 7.0 HIGH
V2.0:(not available)