Search Results (Refine Search)
- Keyword (text search): cpe:2.3:o:microsoft:windows_server_2016:-:-:*:*:standard:*:x64:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-36575 |
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:13 PM -0400 |
V4.0:(not available) V3.1: 7.3 HIGH V2.0:(not available) |
CVE-2023-36574 |
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:13 PM -0400 |
V4.0:(not available) V3.1: 7.3 HIGH V2.0:(not available) |
CVE-2023-36573 |
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:13 PM -0400 |
V4.0:(not available) V3.1: 7.3 HIGH V2.0:(not available) |
CVE-2023-36572 |
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:13 PM -0400 |
V4.0:(not available) V3.1: 7.3 HIGH V2.0:(not available) |
CVE-2023-36571 |
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:13 PM -0400 |
V4.0:(not available) V3.1: 7.3 HIGH V2.0:(not available) |
CVE-2023-36570 |
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:13 PM -0400 |
V4.0:(not available) V3.1: 7.3 HIGH V2.0:(not available) |
CVE-2023-36567 |
Windows Deployment Services Information Disclosure Vulnerability Published: October 10, 2023; 2:15:13 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-36564 |
Windows Search Security Feature Bypass Vulnerability Published: October 10, 2023; 2:15:13 PM -0400 |
V4.0:(not available) V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2023-36563 |
Microsoft WordPad Information Disclosure Vulnerability Published: October 10, 2023; 2:15:13 PM -0400 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2023-36557 |
PrintHTML API Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:12 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-36438 |
Windows TCP/IP Information Disclosure Vulnerability Published: October 10, 2023; 2:15:12 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-36436 |
Windows MSHTML Platform Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:12 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-36434 |
Windows IIS Server Elevation of Privilege Vulnerability Published: October 10, 2023; 2:15:12 PM -0400 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-36431 |
Microsoft Message Queuing Denial of Service Vulnerability Published: October 10, 2023; 2:15:12 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-35349 |
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability Published: October 10, 2023; 2:15:11 PM -0400 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-29348 |
Windows Remote Desktop Gateway (RD Gateway) Information Disclosure Vulnerability Published: October 10, 2023; 2:15:11 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-44487 |
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. Published: October 10, 2023; 10:15:10 AM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-38162 |
DHCP Server Service Denial of Service Vulnerability Published: September 12, 2023; 1:15:23 PM -0400 |
V4.0:(not available) V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-38161 |
Windows GDI Elevation of Privilege Vulnerability Published: September 12, 2023; 1:15:22 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-38160 |
Windows TCP/IP Information Disclosure Vulnerability Published: September 12, 2023; 1:15:21 PM -0400 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0:(not available) |