U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): cpe:2.3:o:microsoft:windows_server_2016:-:-:*:*:essentials:*:x64:*
  • CPE Name Search: true
There are 3,518 matching records.
Displaying matches 41 through 60.
Vuln ID Summary CVSS Severity
CVE-2024-20692

Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability

Published: January 09, 2024; 1:15:52 PM -0500
V3.1: 5.7 MEDIUM
V2.0:(not available)
CVE-2024-20691

Windows Themes Information Disclosure Vulnerability

Published: January 09, 2024; 1:15:52 PM -0500
V3.1: 4.7 MEDIUM
V2.0:(not available)
CVE-2024-20687

Microsoft AllJoyn API Denial of Service Vulnerability

Published: January 09, 2024; 1:15:52 PM -0500
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2024-20683

Win32k Elevation of Privilege Vulnerability

Published: January 09, 2024; 1:15:51 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2024-20682

Windows Cryptographic Services Remote Code Execution Vulnerability

Published: January 09, 2024; 1:15:51 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2024-20680

Windows Message Queuing Client (MSMQC) Information Disclosure

Published: January 09, 2024; 1:15:51 PM -0500
V3.1: 6.5 MEDIUM
V2.0:(not available)
CVE-2024-20674

Windows Kerberos Security Feature Bypass Vulnerability

Published: January 09, 2024; 1:15:50 PM -0500
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2024-20666

BitLocker Security Feature Bypass Vulnerability

Published: January 09, 2024; 1:15:50 PM -0500
V3.1: 6.6 MEDIUM
V2.0:(not available)
CVE-2024-20664

Microsoft Message Queuing Information Disclosure Vulnerability

Published: January 09, 2024; 1:15:49 PM -0500
V3.1: 6.5 MEDIUM
V2.0:(not available)
CVE-2024-20663

Windows Message Queuing Client (MSMQC) Information Disclosure

Published: January 09, 2024; 1:15:49 PM -0500
V3.1: 6.5 MEDIUM
V2.0:(not available)
CVE-2024-20662

Windows Online Certificate Status Protocol (OCSP) Information Disclosure Vulnerability

Published: January 09, 2024; 1:15:49 PM -0500
V3.1: 4.9 MEDIUM
V2.0:(not available)
CVE-2024-20661

Microsoft Message Queuing Denial of Service Vulnerability

Published: January 09, 2024; 1:15:49 PM -0500
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2024-20660

Microsoft Message Queuing Information Disclosure Vulnerability

Published: January 09, 2024; 1:15:49 PM -0500
V3.1: 6.5 MEDIUM
V2.0:(not available)
CVE-2024-20658

Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability

Published: January 09, 2024; 1:15:48 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2024-20657

Windows Group Policy Elevation of Privilege Vulnerability

Published: January 09, 2024; 1:15:48 PM -0500
V3.1: 7.0 HIGH
V2.0:(not available)
CVE-2024-20655

Microsoft Online Certificate Status Protocol (OCSP) Remote Code Execution Vulnerability

Published: January 09, 2024; 1:15:48 PM -0500
V3.1: 6.6 MEDIUM
V2.0:(not available)
CVE-2024-20654

Microsoft ODBC Driver Remote Code Execution Vulnerability

Published: January 09, 2024; 1:15:48 PM -0500
V3.1: 8.0 HIGH
V2.0:(not available)
CVE-2024-20653

Microsoft Common Log File System Elevation of Privilege Vulnerability

Published: January 09, 2024; 1:15:47 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2024-20652

Windows HTML Platforms Security Feature Bypass Vulnerability

Published: January 09, 2024; 1:15:47 PM -0500
V3.1: 8.1 HIGH
V2.0:(not available)
CVE-2024-0057

NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability

Published: January 09, 2024; 1:15:46 PM -0500
V3.1: 9.8 CRITICAL
V2.0:(not available)