Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Windows_server_2016
(Microsoft)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 3982 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2022-08-09 | CVE-2022-35767 | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | Windows_10, Windows_11, Windows_7, Windows_8\.1, Windows_rt_8\.1, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022 | N/A | ||
2022-08-09 | CVE-2022-35768 | Windows Kernel Elevation of Privilege Vulnerability | Windows_10, Windows_11, Windows_7, Windows_8\.1, Windows_rt_8\.1, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022 | N/A | ||
2022-08-09 | CVE-2022-35769 | Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability | Windows_10, Windows_11, Windows_7, Windows_8\.1, Windows_rt_8\.1, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022 | N/A | ||
2022-08-09 | CVE-2022-35771 | Windows Defender Credential Guard Elevation of Privilege Vulnerability | Windows_10, Windows_11, Windows_server_2016, Windows_server_2019, Windows_server_2022 | N/A | ||
2025-03-11 | CVE-2025-24054 | External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network. | Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_21h2, Windows_10_22h2, Windows_11_22h2, Windows_11_23h2, Windows_11_24h2, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_2022_23h2, Windows_server_2025 | 5.4 | ||
2025-03-11 | CVE-2025-24985 | Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally. | Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_21h2, Windows_10_22h2, Windows_11_22h2, Windows_11_23h2, Windows_11_24h2, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_2022_23h2, Windows_server_2025 | N/A | ||
2025-05-13 | CVE-2025-30397 | Access of resource using incompatible type ('type confusion') in Microsoft Scripting Engine allows an unauthorized attacker to execute code over a network. | Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_21h2, Windows_10_22h2, Windows_11_22h2, Windows_11_23h2, Windows_11_24h2, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_2022_23h2, Windows_server_2025 | N/A | ||
2023-05-09 | CVE-2023-29336 | Win32k Elevation of Privilege Vulnerability | Windows_10_1507, Windows_10_1607, Windows_server_2008, Windows_server_2012, Windows_server_2016 | N/A | ||
2023-12-12 | CVE-2023-35622 | Windows DNS Spoofing Vulnerability | Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_2022_23h2 | N/A | ||
2019-06-12 | CVE-2019-1069 | An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations. An attacker who successfully exploited the vulnerability could gain elevated privileges on a victim system. To exploit the vulnerability, an attacker would require unprivileged code execution on a victim system. The security update addresses the vulnerability by correctly validating file operations. | Windows_10_1507, Windows_10_1607, Windows_10_1703, Windows_10_1709, Windows_10_1803, Windows_10_1809, Windows_10_1903, Windows_server_1803, Windows_server_1903, Windows_server_2016, Windows_server_2019 | 7.8 |