Search Results (Refine Search)
- Keyword (text search): cpe:/o:microsoft:windows_server_2016:-
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-36397 |
Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability Published: November 14, 2023; 1:15:39 PM -0500 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-36395 |
Windows Deployment Services Denial of Service Vulnerability Published: November 14, 2023; 1:15:38 PM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-36394 |
Windows Search Service Elevation of Privilege Vulnerability Published: November 14, 2023; 1:15:38 PM -0500 |
V4.0:(not available) V3.1: 7.0 HIGH V2.0:(not available) |
CVE-2023-36393 |
Windows User Interface Application Core Remote Code Execution Vulnerability Published: November 14, 2023; 1:15:37 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-36392 |
DHCP Server Service Denial of Service Vulnerability Published: November 14, 2023; 1:15:37 PM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-36036 |
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Published: November 14, 2023; 1:15:33 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-36033 |
Windows DWM Core Library Elevation of Privilege Vulnerability Published: November 14, 2023; 1:15:32 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-36028 |
Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability Published: November 14, 2023; 1:15:32 PM -0500 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-36025 |
Windows SmartScreen Security Feature Bypass Vulnerability Published: November 14, 2023; 1:15:31 PM -0500 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-36017 |
Windows Scripting Engine Memory Corruption Vulnerability Published: November 14, 2023; 1:15:31 PM -0500 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-41774 |
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:18 PM -0400 |
V4.0:(not available) V3.1: 8.1 HIGH V2.0:(not available) |
CVE-2023-41773 |
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:18 PM -0400 |
V4.0:(not available) V3.1: 8.1 HIGH V2.0:(not available) |
CVE-2023-41771 |
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:18 PM -0400 |
V4.0:(not available) V3.1: 8.1 HIGH V2.0:(not available) |
CVE-2023-41770 |
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:18 PM -0400 |
V4.0:(not available) V3.1: 8.1 HIGH V2.0:(not available) |
CVE-2023-41769 |
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:18 PM -0400 |
V4.0:(not available) V3.1: 8.1 HIGH V2.0:(not available) |
CVE-2023-41768 |
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:18 PM -0400 |
V4.0:(not available) V3.1: 8.1 HIGH V2.0:(not available) |
CVE-2023-41767 |
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:18 PM -0400 |
V4.0:(not available) V3.1: 8.1 HIGH V2.0:(not available) |
CVE-2023-41766 |
Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability Published: October 10, 2023; 2:15:18 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-41765 |
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:18 PM -0400 |
V4.0:(not available) V3.1: 8.1 HIGH V2.0:(not available) |
CVE-2023-38166 |
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:18 PM -0400 |
V4.0:(not available) V3.1: 8.1 HIGH V2.0:(not available) |