U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • CPE Product Version: cpe:/o:microsoft:windows_rt_8.1:-
There are 2,003 matching records.
Displaying matches 81 through 100.
Vuln ID Summary CVSS Severity
CVE-2022-41074

Windows Graphics Component Information Disclosure Vulnerability

Published: December 13, 2022; 2:15:11 PM -0500
V3.1: 5.5 MEDIUM
V2.0:(not available)
CVE-2022-41097

Network Policy Server (NPS) RADIUS Protocol Information Disclosure Vulnerability

Published: November 09, 2022; 5:15:22 PM -0500
V3.1: 6.5 MEDIUM
V2.0:(not available)
CVE-2022-41064

.NET Framework Information Disclosure Vulnerability

Published: November 09, 2022; 5:15:20 PM -0500
V3.1: 5.8 MEDIUM
V2.0:(not available)
CVE-2022-41048

Microsoft ODBC Driver Remote Code Execution Vulnerability

Published: November 09, 2022; 5:15:19 PM -0500
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2022-41047

Microsoft ODBC Driver Remote Code Execution Vulnerability

Published: November 09, 2022; 5:15:19 PM -0500
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2022-41045

Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability

Published: November 09, 2022; 5:15:19 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2022-41039

Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability

Published: November 09, 2022; 5:15:19 PM -0500
V3.1: 8.1 HIGH
V2.0:(not available)
CVE-2022-37992

Windows Group Policy Elevation of Privilege Vulnerability

Published: November 09, 2022; 5:15:15 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2022-41081

Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability

Published: October 11, 2022; 3:15:21 PM -0400
V3.1: 8.1 HIGH
V2.0:(not available)
CVE-2022-41033

Windows COM+ Event System Service Elevation of Privilege Vulnerability

Published: October 11, 2022; 3:15:20 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2022-38051

Windows Graphics Component Elevation of Privilege Vulnerability

Published: October 11, 2022; 3:15:20 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2022-38047

Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability

Published: October 11, 2022; 3:15:19 PM -0400
V3.1: 8.1 HIGH
V2.0:(not available)
CVE-2022-38045

Windows Server Service Elevation of Privilege Vulnerability

Published: October 11, 2022; 3:15:19 PM -0400
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2022-38044

Windows CD-ROM File System Driver Remote Code Execution Vulnerability

Published: October 11, 2022; 3:15:18 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2022-38043

Windows Security Support Provider Interface Information Disclosure Vulnerability

Published: October 11, 2022; 3:15:18 PM -0400
V3.1: 5.5 MEDIUM
V2.0:(not available)
CVE-2022-38042

Active Directory Domain Services Elevation of Privilege Vulnerability

Published: October 11, 2022; 3:15:18 PM -0400
V3.1: 7.1 HIGH
V2.0:(not available)
CVE-2022-38041

Windows Secure Channel Denial of Service Vulnerability

Published: October 11, 2022; 3:15:17 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2022-38040

Microsoft ODBC Driver Remote Code Execution Vulnerability

Published: October 11, 2022; 3:15:17 PM -0400
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2022-38038

Windows Kernel Elevation of Privilege Vulnerability

Published: October 11, 2022; 3:15:16 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2022-38037

Windows Kernel Elevation of Privilege Vulnerability

Published: October 11, 2022; 3:15:16 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)