Search Results (Refine Search)
- Keyword (text search): cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:arm64:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-21548 |
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability Published: January 10, 2023; 5:15:15 PM -0500 |
V4.0:(not available) V3.1: 8.1 HIGH V2.0:(not available) |
CVE-2023-21546 |
Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability Published: January 10, 2023; 5:15:15 PM -0500 |
V4.0:(not available) V3.1: 8.1 HIGH V2.0:(not available) |
CVE-2023-21543 |
Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability Published: January 10, 2023; 5:15:15 PM -0500 |
V4.0:(not available) V3.1: 8.1 HIGH V2.0:(not available) |
CVE-2023-21541 |
Windows Task Scheduler Elevation of Privilege Vulnerability Published: January 10, 2023; 5:15:15 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-21540 |
Windows Cryptographic Information Disclosure Vulnerability Published: January 10, 2023; 5:15:14 PM -0500 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2023-21539 |
Windows Authentication Remote Code Execution Vulnerability Published: January 10, 2023; 5:15:14 PM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-21537 |
Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability Published: January 10, 2023; 5:15:14 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-21536 |
Event Tracing for Windows Information Disclosure Vulnerability Published: January 10, 2023; 5:15:14 PM -0500 |
V4.0:(not available) V3.1: 4.7 MEDIUM V2.0:(not available) |
CVE-2023-21535 |
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability Published: January 10, 2023; 5:15:14 PM -0500 |
V4.0:(not available) V3.1: 8.1 HIGH V2.0:(not available) |
CVE-2023-21532 |
Windows GDI Elevation of Privilege Vulnerability Published: January 10, 2023; 5:15:14 PM -0500 |
V4.0:(not available) V3.1: 7.0 HIGH V2.0:(not available) |
CVE-2023-21527 |
Windows iSCSI Service Denial of Service Vulnerability Published: January 10, 2023; 5:15:14 PM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-21525 |
Remote Procedure Call Runtime Denial of Service Vulnerability Published: January 10, 2023; 5:15:14 PM -0500 |
V4.0:(not available) V3.1: 5.3 MEDIUM V2.0:(not available) |
CVE-2023-21524 |
Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability Published: January 10, 2023; 5:15:14 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2022-44698 |
Windows SmartScreen Security Feature Bypass Vulnerability Published: December 13, 2022; 2:15:14 PM -0500 |
V4.0:(not available) V3.1: 5.4 MEDIUM V2.0:(not available) |
CVE-2022-41128 |
Windows Scripting Languages Remote Code Execution Vulnerability Published: November 09, 2022; 5:15:25 PM -0500 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2022-41125 |
Windows CNG Key Isolation Service Elevation of Privilege Vulnerability Published: November 09, 2022; 5:15:25 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2022-41091 |
Windows Mark of the Web Security Feature Bypass Vulnerability Published: November 09, 2022; 5:15:22 PM -0500 |
V4.0:(not available) V3.1: 5.4 MEDIUM V2.0:(not available) |
CVE-2022-41073 |
Windows Print Spooler Elevation of Privilege Vulnerability Published: November 09, 2022; 5:15:21 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2022-41049 |
Windows Mark of the Web Security Feature Bypass Vulnerability Published: November 09, 2022; 5:15:19 PM -0500 |
V4.0:(not available) V3.1: 5.4 MEDIUM V2.0:(not available) |
CVE-2022-41033 |
Windows COM+ Event System Service Elevation of Privilege Vulnerability Published: October 11, 2022; 3:15:20 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |