U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Keyword (text search): cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:enterprise_without_hyper-v:*:x64:*
  • CPE Name Search: true
There are 2,487 matching records.
Displaying matches 161 through 180.
Vuln ID Summary CVSS Severity
CVE-2023-35310

Windows DNS Server Remote Code Execution Vulnerability

Published: July 11, 2023; 2:15:17 PM -0400
V3.1: 6.6 MEDIUM
V2.0:(not available)
CVE-2023-35309

Microsoft Message Queuing Remote Code Execution Vulnerability

Published: July 11, 2023; 2:15:17 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-35303

USB Audio Class System Driver Remote Code Execution Vulnerability

Published: July 11, 2023; 2:15:16 PM -0400
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2023-35300

Remote Procedure Call Runtime Remote Code Execution Vulnerability

Published: July 11, 2023; 2:15:16 PM -0400
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2023-35299

Windows Common Log File System Driver Elevation of Privilege Vulnerability

Published: July 11, 2023; 2:15:16 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-35297

Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability

Published: July 11, 2023; 2:15:16 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-35296

Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability

Published: July 11, 2023; 2:15:16 PM -0400
V3.1: 6.5 MEDIUM
V2.0:(not available)
CVE-2023-33174

Windows Cryptographic Information Disclosure Vulnerability

Published: July 11, 2023; 2:15:15 PM -0400
V3.1: 5.5 MEDIUM
V2.0:(not available)
CVE-2023-33173

Remote Procedure Call Runtime Denial of Service Vulnerability

Published: July 11, 2023; 2:15:15 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-33172

Remote Procedure Call Runtime Denial of Service Vulnerability

Published: July 11, 2023; 2:15:15 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-33169

Remote Procedure Call Runtime Denial of Service Vulnerability

Published: July 11, 2023; 2:15:15 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-33168

Remote Procedure Call Runtime Denial of Service Vulnerability

Published: July 11, 2023; 2:15:15 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-33167

Remote Procedure Call Runtime Denial of Service Vulnerability

Published: July 11, 2023; 2:15:15 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-33166

Remote Procedure Call Runtime Denial of Service Vulnerability

Published: July 11, 2023; 2:15:15 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-33164

Remote Procedure Call Runtime Denial of Service Vulnerability

Published: July 11, 2023; 2:15:15 PM -0400
V3.1: 6.5 MEDIUM
V2.0:(not available)
CVE-2023-33154

Windows Partition Management Driver Elevation of Privilege Vulnerability

Published: July 11, 2023; 2:15:14 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-32057

Microsoft Message Queuing Remote Code Execution Vulnerability

Published: July 11, 2023; 2:15:13 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-32055

Active Template Library Elevation of Privilege Vulnerability

Published: July 11, 2023; 2:15:13 PM -0400
V3.1: 6.7 MEDIUM
V2.0:(not available)
CVE-2023-32050

Windows Installer Elevation of Privilege Vulnerability

Published: July 11, 2023; 2:15:13 PM -0400
V3.1: 7.0 HIGH
V2.0:(not available)
CVE-2023-32046

Windows MSHTML Platform Elevation of Privilege Vulnerability

Published: July 11, 2023; 2:15:13 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)