U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:standard_without_hyper-v:*:itanium:*
  • CPE Name Search: true
There are 2,200 matching records.
Displaying matches 121 through 140.
Vuln ID Summary CVSS Severity
CVE-2023-35296

Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability

Published: July 11, 2023; 2:15:16 PM -0400
V3.1: 6.5 MEDIUM
V2.0:(not available)
CVE-2023-33174

Windows Cryptographic Information Disclosure Vulnerability

Published: July 11, 2023; 2:15:15 PM -0400
V3.1: 5.5 MEDIUM
V2.0:(not available)
CVE-2023-33173

Remote Procedure Call Runtime Denial of Service Vulnerability

Published: July 11, 2023; 2:15:15 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-33172

Remote Procedure Call Runtime Denial of Service Vulnerability

Published: July 11, 2023; 2:15:15 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-33169

Remote Procedure Call Runtime Denial of Service Vulnerability

Published: July 11, 2023; 2:15:15 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-33168

Remote Procedure Call Runtime Denial of Service Vulnerability

Published: July 11, 2023; 2:15:15 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-33167

Remote Procedure Call Runtime Denial of Service Vulnerability

Published: July 11, 2023; 2:15:15 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-33166

Remote Procedure Call Runtime Denial of Service Vulnerability

Published: July 11, 2023; 2:15:15 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-33164

Remote Procedure Call Runtime Denial of Service Vulnerability

Published: July 11, 2023; 2:15:15 PM -0400
V3.1: 6.5 MEDIUM
V2.0:(not available)
CVE-2023-33154

Windows Partition Management Driver Elevation of Privilege Vulnerability

Published: July 11, 2023; 2:15:14 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-32057

Microsoft Message Queuing Remote Code Execution Vulnerability

Published: July 11, 2023; 2:15:13 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-32055

Active Template Library Elevation of Privilege Vulnerability

Published: July 11, 2023; 2:15:13 PM -0400
V3.1: 6.7 MEDIUM
V2.0:(not available)
CVE-2023-32050

Windows Installer Elevation of Privilege Vulnerability

Published: July 11, 2023; 2:15:13 PM -0400
V3.1: 7.0 HIGH
V2.0:(not available)
CVE-2023-32046

Windows MSHTML Platform Elevation of Privilege Vulnerability

Published: July 11, 2023; 2:15:13 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-32045

Microsoft Message Queuing Denial of Service Vulnerability

Published: July 11, 2023; 2:15:13 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-32044

Microsoft Message Queuing Denial of Service Vulnerability

Published: July 11, 2023; 2:15:13 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-32043

Windows Remote Desktop Security Feature Bypass Vulnerability

Published: July 11, 2023; 2:15:13 PM -0400
V3.1: 6.8 MEDIUM
V2.0:(not available)
CVE-2023-32042

OLE Automation Information Disclosure Vulnerability

Published: July 11, 2023; 2:15:13 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-32038

Microsoft ODBC Driver Remote Code Execution Vulnerability

Published: July 11, 2023; 2:15:12 PM -0400
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2023-32035

Remote Procedure Call Runtime Denial of Service Vulnerability

Published: July 11, 2023; 2:15:12 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)