Vulnerabilities > Microsoft > Windows 10 1607
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-04-11 | CVE-2023-24928 | Unspecified vulnerability in Microsoft products Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | 8.8 |
2023-04-11 | CVE-2023-28269 | Unspecified vulnerability in Microsoft products Windows Boot Manager Security Feature Bypass Vulnerability low complexity microsoft | 6.8 |
2023-04-11 | CVE-2023-24885 | Unspecified vulnerability in Microsoft products Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | 8.8 |
2023-03-14 | CVE-2023-23413 | Unspecified vulnerability in Microsoft products Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | 8.8 |
2023-03-14 | CVE-2023-24857 | Unspecified vulnerability in Microsoft products Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | 6.5 |
2023-02-28 | CVE-2023-1017 | Out-of-bounds Write vulnerability in multiple products An out-of-bounds write vulnerability exists in TPM2.0's Module Library allowing writing of a 2-byte data past the end of TPM2.0 command in the CryptParameterDecryption routine. | 7.8 |
2023-02-28 | CVE-2023-1018 | Out-of-bounds Read vulnerability in multiple products An out-of-bounds read vulnerability exists in TPM2.0's Module Library allowing a 2-byte read past the end of a TPM2.0 command in the CryptParameterDecryption routine. | 5.5 |
2023-02-14 | CVE-2023-21695 | Unspecified vulnerability in Microsoft products Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability | 8.8 |
2023-02-14 | CVE-2023-21697 | Unspecified vulnerability in Microsoft products Windows Internet Storage Name Service (iSNS) Server Information Disclosure Vulnerability | 5.5 |
2023-02-12 | CVE-2022-38396 | Unspecified vulnerability in Microsoft products HP Factory Preinstalled Images on certain systems that shipped with Windows 10 versions 20H2 and earlier OS versions might allow escalation of privilege via execution of certain files outside the restricted path. | 7.8 |