Msrc Windows Server 2016 vulnerabilities
4,120 known vulnerabilities affecting msrc/windows_server_2016.
Total CVEs
4,120
CISA KEV
154
actively exploited
Public exploits
204
Exploited in wild
143
Severity breakdown
CRITICAL86HIGH2734MEDIUM1267LOW33
Vulnerabilities
Page 107 of 206
CVE-2022-23283HIGHCVSS 7.02022-03-08
CVE-2022-23283 [HIGH] Windows ALPC Elevation of Privilege Vulnerability
Windows ALPC Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
Windows ALPC: Windows ALPC
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Lat
msrc
CVE-2022-21990HIGHCVSS 8.82022-03-08
CVE-2022-21990 [HIGH] Remote Desktop Client Remote Code Execution Vulnerability
Remote Desktop Client Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the RDP client machine when a victim connects to the attacking server with the vulnerable Remote Desktop Client.
Windows Remote Desktop: Windows Remote Desktop
M
msrc
CVE-2022-23296HIGHCVSS 7.82022-03-08
CVE-2022-23296 [HIGH] Windows Installer Elevation of Privilege Vulnerability
Windows Installer Elevation of Privilege Vulnerability
Windows Installer: Windows Installer
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011503
Refere
msrc
CVE-2022-23284HIGHCVSS 7.22022-03-08
CVE-2022-23284 [HIGH] Windows Print Spooler Elevation of Privilege Vulnerability
Windows Print Spooler Elevation of Privilege Vulnerability
Windows Print Spooler Components: Windows Print Spooler Components
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v
msrc
CVE-2022-23290HIGHCVSS 7.82022-03-08
CVE-2022-23290 [HIGH] Windows Inking COM Elevation of Privilege Vulnerability
Windows Inking COM Elevation of Privilege Vulnerability
Windows COM: Windows COM
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011503
Reference: https
msrc
CVE-2022-23287HIGHCVSS 7.02022-03-08
CVE-2022-23287 [HIGH] Windows ALPC Elevation of Privilege Vulnerability
Windows ALPC Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
Windows ALPC: Windows ALPC
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Lat
msrc
CVE-2022-23299HIGHCVSS 7.82022-03-08
CVE-2022-23299 [HIGH] Windows PDEV Elevation of Privilege Vulnerability
Windows PDEV Elevation of Privilege Vulnerability
FAQ: What is a Windows PDEV?
A Windows PDEV is a logical representation of the physical device. It is characterized by the type of hardware, logical address, and surfaces that can be supported. As an example of a driver supporting a PDEV characterized by the type of hardware, one driver could support the LaserWhiz, LaserWhiz II, and LaserWhiz Super printers.
For more informa
msrc
CVE-2022-24460HIGHCVSS 7.02022-03-08
CVE-2022-24460 [HIGH] Tablet Windows User Interface Application Elevation of Privilege Vulnerability
Tablet Windows User Interface Application Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
Tablet Windows User Interface: Tablet Windows User Interface
Microsoft: Microsoft
Customer Action Required:
msrc
CVE-2022-24454HIGHCVSS 7.82022-03-08
CVE-2022-24454 [HIGH] Windows Security Support Provider Interface Elevation of Privilege Vulnerability
Windows Security Support Provider Interface Elevation of Privilege Vulnerability
Windows Security Support Provider Interface: Windows Security Support Provider Interface
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less
msrc
CVE-2022-23293HIGHCVSS 7.82022-03-08
CVE-2022-23293 [HIGH] Windows Fast FAT File System Driver Elevation of Privilege Vulnerability
Windows Fast FAT File System Driver Elevation of Privilege Vulnerability
Windows Fast FAT Driver: Windows Fast FAT Driver
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.micro
msrc
CVE-2022-24503MEDIUMCVSS 5.42022-03-08
CVE-2022-24503 [MEDIUM] Remote Desktop Protocol Client Information Disclosure Vulnerability
Remote Desktop Protocol Client Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.
Windows Remote Desktop: Windows Remote Desktop
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information Disclosure
Exploit Status: Publi
msrc
CVE-2022-24502MEDIUMCVSS 4.32022-03-08
CVE-2022-24502 [MEDIUM] Windows HTML Platforms Security Feature Bypass Vulnerability
Windows HTML Platforms Security Feature Bypass Vulnerability
FAQ: The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows. Why are IE Cumulative updates listed for Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows Server 2012, Windows 8.1, and Windows Server 2012 R2?
While Microsoft has announced retirement of the Internet Explorer 11 applic
msrc
CVE-2022-23297MEDIUMCVSS 5.52022-03-08
CVE-2022-23297 [MEDIUM] Windows NT Lan Manager Datagram Receiver Driver Information Disclosure Vulnerability
Windows NT Lan Manager Datagram Receiver Driver Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Windows Kernel
msrc
CVE-2022-23253MEDIUMCVSS 6.52022-03-08
CVE-2022-23253 [MEDIUM] Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability
Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability
Windows Point-to-Point Tunneling Protocol: Windows Point-to-Point Tunneling Protocol
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Refe
msrc
CVE-2022-22010MEDIUMCVSS 4.42022-03-08
CVE-2022-22010 [MEDIUM] Media Foundation Information Disclosure Vulnerability
Media Foundation Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.
Microsoft Windows Codecs Library: Microsoft Windows Codecs Library
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information Disclosure
Exploit Status: Publicly Disc
msrc
CVE-2022-23281MEDIUMCVSS 5.52022-03-08
CVE-2022-23281 [MEDIUM] Windows Common Log File System Driver Information Disclosure Vulnerability
Windows Common Log File System Driver Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Windows Common Log File System Dri
msrc
CVE-2022-21975MEDIUMCVSS 4.72022-03-08
CVE-2022-21975 [MEDIUM] Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
Role: Windows Hyper-V: Role: Windows Hyper-V
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Explo
msrc
CVE-2022-21977LOWCVSS 3.32022-03-08
CVE-2022-21977 [LOW] Media Foundation Information Disclosure Vulnerability
Media Foundation Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.
Microsoft Windows Codecs Library: Microsoft Windows Codecs Library
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Information Disclosure
Exploit Status: Publicly Disclos
msrc
CVE-2022-22718HIGHCVSS 7.8KEV2022-02-08
CVE-2022-22718 [HIGH] Windows Print Spooler Elevation of Privilege Vulnerability
Windows Print Spooler Elevation of Privilege Vulnerability
Windows Print Spooler Components: Windows Print Spooler Components
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v
msrc
CVE-2022-21981HIGHCVSS 7.82022-02-08
CVE-2022-21981 [HIGH] Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver: Windows Common Log File System Driver
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Referen
msrc