Search Results (Refine Search)
- Keyword (text search): cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1697:*:*:*:*:*:x64:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-36578 |
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:13 PM -0400 |
V4.0:(not available) V3.1: 7.3 HIGH V2.0:(not available) |
CVE-2023-36577 |
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:13 PM -0400 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-36576 |
Windows Kernel Information Disclosure Vulnerability Published: October 10, 2023; 2:15:13 PM -0400 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2023-36575 |
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:13 PM -0400 |
V4.0:(not available) V3.1: 7.3 HIGH V2.0:(not available) |
CVE-2023-36574 |
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:13 PM -0400 |
V4.0:(not available) V3.1: 7.3 HIGH V2.0:(not available) |
CVE-2023-36573 |
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:13 PM -0400 |
V4.0:(not available) V3.1: 7.3 HIGH V2.0:(not available) |
CVE-2023-36572 |
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:13 PM -0400 |
V4.0:(not available) V3.1: 7.3 HIGH V2.0:(not available) |
CVE-2023-36571 |
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:13 PM -0400 |
V4.0:(not available) V3.1: 7.3 HIGH V2.0:(not available) |
CVE-2023-36570 |
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:13 PM -0400 |
V4.0:(not available) V3.1: 7.3 HIGH V2.0:(not available) |
CVE-2023-36567 |
Windows Deployment Services Information Disclosure Vulnerability Published: October 10, 2023; 2:15:13 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-36564 |
Windows Search Security Feature Bypass Vulnerability Published: October 10, 2023; 2:15:13 PM -0400 |
V4.0:(not available) V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2023-36563 |
Microsoft WordPad Information Disclosure Vulnerability Published: October 10, 2023; 2:15:13 PM -0400 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2023-36557 |
PrintHTML API Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:12 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-36438 |
Windows TCP/IP Information Disclosure Vulnerability Published: October 10, 2023; 2:15:12 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-36436 |
Windows MSHTML Platform Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:12 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-36434 |
Windows IIS Server Elevation of Privilege Vulnerability Published: October 10, 2023; 2:15:12 PM -0400 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-36431 |
Microsoft Message Queuing Denial of Service Vulnerability Published: October 10, 2023; 2:15:12 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-35349 |
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:11 PM -0400 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-44487 |
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. Published: October 10, 2023; 10:15:10 AM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-38039 |
When curl retrieves an HTTP response, it stores the incoming headers so that they can be accessed later via the libcurl headers API. However, curl did not have a limit in how many or how large headers it would accept in a response, allowing a malicious server to stream an endless series of headers and eventually cause curl to run out of heap memory. Published: September 15, 2023; 12:15:10 AM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |