Search Results (Refine Search)
- Keyword (text search): cpe:2.3:o:microsoft:windows_server_2016:-:-:*:*:standard:*:x64:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-36424 |
Windows Common Log File System Driver Elevation of Privilege Vulnerability Published: November 14, 2023; 1:15:45 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-36423 |
Microsoft Remote Registry Service Remote Code Execution Vulnerability Published: November 14, 2023; 1:15:45 PM -0500 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-36408 |
Windows Hyper-V Elevation of Privilege Vulnerability Published: November 14, 2023; 1:15:43 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-36405 |
Windows Kernel Elevation of Privilege Vulnerability Published: November 14, 2023; 1:15:42 PM -0500 |
V4.0:(not available) V3.1: 7.0 HIGH V2.0:(not available) |
CVE-2023-36404 |
Windows Kernel Information Disclosure Vulnerability Published: November 14, 2023; 1:15:42 PM -0500 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2023-36403 |
Windows Kernel Elevation of Privilege Vulnerability Published: November 14, 2023; 1:15:41 PM -0500 |
V4.0:(not available) V3.1: 7.0 HIGH V2.0:(not available) |
CVE-2023-36402 |
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability Published: November 14, 2023; 1:15:41 PM -0500 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-36401 |
Microsoft Remote Registry Service Remote Code Execution Vulnerability Published: November 14, 2023; 1:15:41 PM -0500 |
V4.0:(not available) V3.1: 7.2 HIGH V2.0:(not available) |
CVE-2023-36400 |
Windows HMAC Key Derivation Elevation of Privilege Vulnerability Published: November 14, 2023; 1:15:40 PM -0500 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-36398 |
Windows NTFS Information Disclosure Vulnerability Published: November 14, 2023; 1:15:39 PM -0500 |
V4.0:(not available) V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2023-36397 |
Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability Published: November 14, 2023; 1:15:39 PM -0500 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-36395 |
Windows Deployment Services Denial of Service Vulnerability Published: November 14, 2023; 1:15:38 PM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-36394 |
Windows Search Service Elevation of Privilege Vulnerability Published: November 14, 2023; 1:15:38 PM -0500 |
V4.0:(not available) V3.1: 7.0 HIGH V2.0:(not available) |
CVE-2023-36393 |
Windows User Interface Application Core Remote Code Execution Vulnerability Published: November 14, 2023; 1:15:37 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-36392 |
DHCP Server Service Denial of Service Vulnerability Published: November 14, 2023; 1:15:37 PM -0500 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-36036 |
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Published: November 14, 2023; 1:15:33 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-36033 |
Windows DWM Core Library Elevation of Privilege Vulnerability Published: November 14, 2023; 1:15:32 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-36028 |
Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability Published: November 14, 2023; 1:15:32 PM -0500 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-36025 |
Windows SmartScreen Security Feature Bypass Vulnerability Published: November 14, 2023; 1:15:31 PM -0500 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-36017 |
Windows Scripting Engine Memory Corruption Vulnerability Published: November 14, 2023; 1:15:31 PM -0500 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0:(not available) |