Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-29325 |
Windows OLE Remote Code Execution Vulnerability Published: May 09, 2023; 2:15:13 PM -0400 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-29324 |
Windows MSHTML Platform Security Feature Bypass Vulnerability Published: May 09, 2023; 2:15:13 PM -0400 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2023-28283 |
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability Published: May 09, 2023; 2:15:13 PM -0400 |
V3.1: 8.1 HIGH V2.0:(not available) |
CVE-2023-28251 |
Windows Driver Revocation List Security Feature Bypass Vulnerability Published: May 09, 2023; 2:15:13 PM -0400 |
V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2023-24954 |
Microsoft SharePoint Server Information Disclosure Vulnerability Published: May 09, 2023; 2:15:13 PM -0400 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2023-23423 |
Windows Kernel Elevation of Privilege Vulnerability Published: March 14, 2023; 1:15:15 PM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-23422 |
Windows Kernel Elevation of Privilege Vulnerability Published: March 14, 2023; 1:15:15 PM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-23421 |
Windows Kernel Elevation of Privilege Vulnerability Published: March 14, 2023; 1:15:15 PM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-23420 |
Windows Kernel Elevation of Privilege Vulnerability Published: March 14, 2023; 1:15:15 PM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2022-41064 |
.NET Framework Information Disclosure Vulnerability Published: November 09, 2022; 5:15:20 PM -0500 |
V3.1: 5.8 MEDIUM V2.0:(not available) |
CVE-2022-30190 |
<p>A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights.</p> <p>Please see the <a href="https://aka.ms/CVE-2022-30190-Guidance">MSRC Blog Entry</a> for important information about steps you can take to protect your system from this vulnerability.</p> Published: June 01, 2022; 4:15:07 PM -0400 |
V3.1: 7.8 HIGH V2.0: 9.3 HIGH |
CVE-2022-24503 |
Remote Desktop Protocol Client Information Disclosure Vulnerability Published: March 09, 2022; 12:15:15 PM -0500 |
V3.1: 5.4 MEDIUM V2.0: 5.0 MEDIUM |
CVE-2022-24502 |
Windows HTML Platforms Security Feature Bypass Vulnerability Published: March 09, 2022; 12:15:14 PM -0500 |
V3.1: 4.3 MEDIUM V2.0: 4.3 MEDIUM |
CVE-2022-23283 |
Windows ALPC Elevation of Privilege Vulnerability Published: March 09, 2022; 12:15:11 PM -0500 |
V3.1: 7.0 HIGH V2.0: 4.4 MEDIUM |
CVE-2022-23253 |
Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability Published: March 09, 2022; 12:15:10 PM -0500 |
V3.1: 6.5 MEDIUM V2.0: 4.0 MEDIUM |
CVE-2021-1656 |
TPM Device Driver Information Disclosure Vulnerability Published: January 12, 2021; 3:15:31 PM -0500 |
V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2020-17088 |
Windows Common Log File System Driver Elevation of Privilege Vulnerability Published: November 11, 2020; 2:15:19 AM -0500 |
V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2020-17052 |
Scripting Engine Memory Corruption Vulnerability Published: November 11, 2020; 2:15:16 AM -0500 |
V3.1: 7.5 HIGH V2.0: 6.8 MEDIUM |
CVE-2020-17051 |
Windows Network File System Remote Code Execution Vulnerability Published: November 11, 2020; 2:15:16 AM -0500 |
V3.1: 9.8 CRITICAL V2.0: 10.0 HIGH |
CVE-2020-17047 |
Windows Network File System Denial of Service Vulnerability Published: November 11, 2020; 2:15:16 AM -0500 |
V3.1: 7.5 HIGH V2.0: 7.8 HIGH |