U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • CPE Product Version: cpe:/o:microsoft:windows_rt_8.1:-
There are 2,004 matching records.
Displaying matches 41 through 60.
Vuln ID Summary CVSS Severity
CVE-2023-21679

Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability

Published: January 10, 2023; 5:15:16 PM -0500
V3.1: 8.1 HIGH
V2.0:(not available)
CVE-2023-21678

Windows Print Spooler Elevation of Privilege Vulnerability

Published: January 10, 2023; 5:15:16 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-21675

Windows Kernel Elevation of Privilege Vulnerability

Published: January 10, 2023; 5:15:16 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-21563

BitLocker Security Feature Bypass Vulnerability

Published: January 10, 2023; 5:15:16 PM -0500
V3.1: 6.8 MEDIUM
V2.0:(not available)
CVE-2023-21561

Microsoft Cryptographic Services Elevation of Privilege Vulnerability

Published: January 10, 2023; 5:15:16 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-21560

Windows Boot Manager Security Feature Bypass Vulnerability

Published: January 10, 2023; 5:15:16 PM -0500
V3.1: 6.6 MEDIUM
V2.0:(not available)
CVE-2023-21558

Windows Error Reporting Service Elevation of Privilege Vulnerability

Published: January 10, 2023; 5:15:15 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-21557

Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability

Published: January 10, 2023; 5:15:15 PM -0500
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-21556

Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability

Published: January 10, 2023; 5:15:15 PM -0500
V3.1: 8.1 HIGH
V2.0:(not available)
CVE-2023-21555

Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability

Published: January 10, 2023; 5:15:15 PM -0500
V3.1: 8.1 HIGH
V2.0:(not available)
CVE-2023-21552

Windows GDI Elevation of Privilege Vulnerability

Published: January 10, 2023; 5:15:15 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-21549

Windows SMB Witness Service Elevation of Privilege Vulnerability

Published: January 10, 2023; 5:15:15 PM -0500
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2023-21548

Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability

Published: January 10, 2023; 5:15:15 PM -0500
V3.1: 8.1 HIGH
V2.0:(not available)
CVE-2023-21546

Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability

Published: January 10, 2023; 5:15:15 PM -0500
V3.1: 8.1 HIGH
V2.0:(not available)
CVE-2023-21543

Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability

Published: January 10, 2023; 5:15:15 PM -0500
V3.1: 8.1 HIGH
V2.0:(not available)
CVE-2023-21542

Windows Installer Elevation of Privilege Vulnerability

Published: January 10, 2023; 5:15:15 PM -0500
V3.1: 7.0 HIGH
V2.0:(not available)
CVE-2023-21541

Windows Task Scheduler Elevation of Privilege Vulnerability

Published: January 10, 2023; 5:15:15 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-21537

Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability

Published: January 10, 2023; 5:15:14 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-21535

Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability

Published: January 10, 2023; 5:15:14 PM -0500
V3.1: 8.1 HIGH
V2.0:(not available)
CVE-2023-21532

Windows GDI Elevation of Privilege Vulnerability

Published: January 10, 2023; 5:15:14 PM -0500
V3.1: 7.0 HIGH
V2.0:(not available)