U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:essential_server_solutions_without_hyper-v:*:x64:*
  • CPE Name Search: true
There are 2,267 matching records.
Displaying matches 141 through 160.
Vuln ID Summary CVSS Severity
CVE-2023-21556

Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability

Published: January 10, 2023; 5:15:15 PM -0500
V3.1: 8.1 HIGH
V2.0:(not available)
CVE-2023-21555

Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability

Published: January 10, 2023; 5:15:15 PM -0500
V3.1: 8.1 HIGH
V2.0:(not available)
CVE-2023-21552

Windows GDI Elevation of Privilege Vulnerability

Published: January 10, 2023; 5:15:15 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-21548

Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability

Published: January 10, 2023; 5:15:15 PM -0500
V3.1: 8.1 HIGH
V2.0:(not available)
CVE-2023-21546

Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability

Published: January 10, 2023; 5:15:15 PM -0500
V3.1: 8.1 HIGH
V2.0:(not available)
CVE-2023-21543

Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability

Published: January 10, 2023; 5:15:15 PM -0500
V3.1: 8.1 HIGH
V2.0:(not available)
CVE-2023-21542

Windows Installer Elevation of Privilege Vulnerability

Published: January 10, 2023; 5:15:15 PM -0500
V3.1: 7.0 HIGH
V2.0:(not available)
CVE-2023-21541

Windows Task Scheduler Elevation of Privilege Vulnerability

Published: January 10, 2023; 5:15:15 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-21537

Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability

Published: January 10, 2023; 5:15:14 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-21535

Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability

Published: January 10, 2023; 5:15:14 PM -0500
V3.1: 8.1 HIGH
V2.0:(not available)
CVE-2023-21532

Windows GDI Elevation of Privilege Vulnerability

Published: January 10, 2023; 5:15:14 PM -0500
V3.1: 7.0 HIGH
V2.0:(not available)
CVE-2023-21527

Windows iSCSI Service Denial of Service Vulnerability

Published: January 10, 2023; 5:15:14 PM -0500
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-21525

Remote Procedure Call Runtime Denial of Service Vulnerability

Published: January 10, 2023; 5:15:14 PM -0500
V3.1: 5.3 MEDIUM
V2.0:(not available)
CVE-2022-44697

Windows Graphics Component Elevation of Privilege Vulnerability

Published: December 13, 2022; 2:15:14 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2022-44681

Windows Print Spooler Elevation of Privilege Vulnerability

Published: December 13, 2022; 2:15:13 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2022-44678

Windows Print Spooler Elevation of Privilege Vulnerability

Published: December 13, 2022; 2:15:13 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2022-44676

Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability

Published: December 13, 2022; 2:15:13 PM -0500
V3.1: 8.1 HIGH
V2.0:(not available)
CVE-2022-44670

Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability

Published: December 13, 2022; 2:15:12 PM -0500
V3.1: 8.1 HIGH
V2.0:(not available)
CVE-2022-44666

Windows Contacts Remote Code Execution Vulnerability

Published: December 13, 2022; 2:15:12 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2022-41121

Windows Graphics Component Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-44671, CVE-2022-44680, CVE-2022-44697.

Published: December 13, 2022; 2:15:12 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)