U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Keyword (text search): cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:standard_without_hyper-v:*:x86:*
  • CPE Name Search: true
There are 2,467 matching records.
Displaying matches 241 through 260.
Vuln ID Summary CVSS Severity
CVE-2023-28298

Windows Kernel Denial of Service Vulnerability

Published: April 11, 2023; 5:15:27 PM -0400
V3.1: 5.5 MEDIUM
V2.0:(not available)
CVE-2023-28293

Windows Kernel Elevation of Privilege Vulnerability

Published: April 11, 2023; 5:15:27 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-28278

Windows DNS Server Remote Code Execution Vulnerability

Published: April 11, 2023; 5:15:26 PM -0400
V3.1: 6.6 MEDIUM
V2.0:(not available)
CVE-2023-28276

Windows Group Policy Security Feature Bypass Vulnerability

Published: April 11, 2023; 5:15:26 PM -0400
V3.1: 4.4 MEDIUM
V2.0:(not available)
CVE-2023-28275

Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

Published: April 11, 2023; 5:15:26 PM -0400
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2023-28272

Windows Kernel Elevation of Privilege Vulnerability

Published: April 11, 2023; 5:15:26 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-28271

Windows Kernel Memory Information Disclosure Vulnerability

Published: April 11, 2023; 5:15:26 PM -0400
V3.1: 5.5 MEDIUM
V2.0:(not available)
CVE-2023-28268

Netlogon RPC Elevation of Privilege Vulnerability

Published: April 11, 2023; 5:15:25 PM -0400
V3.1: 8.1 HIGH
V2.0:(not available)
CVE-2023-28267

Remote Desktop Protocol Client Information Disclosure Vulnerability

Published: April 11, 2023; 5:15:25 PM -0400
V3.1: 6.5 MEDIUM
V2.0:(not available)
CVE-2023-28266

Windows Common Log File System Driver Information Disclosure Vulnerability

Published: April 11, 2023; 5:15:25 PM -0400
V3.1: 5.5 MEDIUM
V2.0:(not available)
CVE-2023-28256

Windows DNS Server Remote Code Execution Vulnerability

Published: April 11, 2023; 5:15:25 PM -0400
V3.1: 6.6 MEDIUM
V2.0:(not available)
CVE-2023-28255

Windows DNS Server Remote Code Execution Vulnerability

Published: April 11, 2023; 5:15:25 PM -0400
V3.1: 6.6 MEDIUM
V2.0:(not available)
CVE-2023-28254

Windows DNS Server Remote Code Execution Vulnerability

Published: April 11, 2023; 5:15:25 PM -0400
V3.1: 7.2 HIGH
V2.0:(not available)
CVE-2023-28253

Windows Kernel Information Disclosure Vulnerability

Published: April 11, 2023; 5:15:25 PM -0400
V3.1: 5.5 MEDIUM
V2.0:(not available)
CVE-2023-28252

Windows Common Log File System Driver Elevation of Privilege Vulnerability

Published: April 11, 2023; 5:15:25 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-28250

Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability

Published: April 11, 2023; 5:15:24 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-28244

Windows Kerberos Elevation of Privilege Vulnerability

Published: April 11, 2023; 5:15:24 PM -0400
V3.1: 8.1 HIGH
V2.0:(not available)
CVE-2023-28241

Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability

Published: April 11, 2023; 5:15:24 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-28240

Windows Network Load Balancing Remote Code Execution Vulnerability

Published: April 11, 2023; 5:15:24 PM -0400
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2023-28232

Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability

Published: April 11, 2023; 5:15:23 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)