U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
There are 3,172 matching records.
Displaying matches 261 through 280.
Vuln ID Summary CVSS Severity
CVE-2023-20569

A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.

Published: August 08, 2023; 2:15:11 PM -0400
V3.1: 4.7 MEDIUM
V2.0:(not available)
CVE-2023-36884

Windows Search Remote Code Execution Vulnerability

Published: July 11, 2023; 3:15:09 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-36874

Windows Error Reporting Service Elevation of Privilege Vulnerability

Published: July 11, 2023; 2:15:20 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-36871

Azure Active Directory Security Feature Bypass Vulnerability

Published: July 11, 2023; 2:15:20 PM -0400
V3.1: 6.5 MEDIUM
V2.0:(not available)
CVE-2023-35367

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

Published: July 11, 2023; 2:15:19 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-35366

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

Published: July 11, 2023; 2:15:19 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-35365

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

Published: July 11, 2023; 2:15:19 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-35364

Windows Kernel Elevation of Privilege Vulnerability

Published: July 11, 2023; 2:15:19 PM -0400
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2023-35363

Windows Kernel Elevation of Privilege Vulnerability

Published: July 11, 2023; 2:15:19 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-35362

Windows Clip Service Elevation of Privilege Vulnerability

Published: July 11, 2023; 2:15:19 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-35361

Windows Kernel Elevation of Privilege Vulnerability

Published: July 11, 2023; 2:15:19 PM -0400
V3.1: 7.0 HIGH
V2.0:(not available)
CVE-2023-35360

Windows Kernel Elevation of Privilege Vulnerability

Published: July 11, 2023; 2:15:19 PM -0400
V3.1: 7.0 HIGH
V2.0:(not available)
CVE-2023-35358

Windows Kernel Elevation of Privilege Vulnerability

Published: July 11, 2023; 2:15:19 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-35357

Windows Kernel Elevation of Privilege Vulnerability

Published: July 11, 2023; 2:15:19 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-35356

Windows Kernel Elevation of Privilege Vulnerability

Published: July 11, 2023; 2:15:19 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-35353

Connected User Experiences and Telemetry Elevation of Privilege Vulnerability

Published: July 11, 2023; 2:15:19 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-35352

Windows Remote Desktop Security Feature Bypass Vulnerability

Published: July 11, 2023; 2:15:19 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-35351

Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability

Published: July 11, 2023; 2:15:19 PM -0400
V3.1: 6.6 MEDIUM
V2.0:(not available)
CVE-2023-35350

Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability

Published: July 11, 2023; 2:15:19 PM -0400
V3.1: 7.2 HIGH
V2.0:(not available)
CVE-2023-35348

Active Directory Federation Service Security Feature Bypass Vulnerability

Published: July 11, 2023; 2:15:19 PM -0400
V3.1: 6.5 MEDIUM
V2.0:(not available)