Last updated on Dec 13, 2024
S.No Vulnerability Name Severity
Storage Spaces Controller Elevation of Privilege Vulnerability for Windows Server 2016 for x64-based Systems (KB5006669) (CVE-2021-40449) (CVE-2021-40469) (CVE-2021-41335) (CVE-2021-41338)Critical
Windows Desktop Bridge Elevation of Privilege Vulnerability for Windows Server 2016 for x64-based Systems (KB5007192)Critical
Windows Print Spooler Elevation of Privilege Vulnerability for Windows Server 2016 for x64-based Systems (KB5008207)Critical
Virtual Machine IDE Drive Elevation of Privilege Vulnerability for Windows Server 2016 for x64-based Systems (KB5009546)Critical
Roaming Security Rights Management Services Remote Code Execution Vulnerability for Windows Server 2016 for x64-based Systems (KB5010359) (CVE-2022-21989)Critical
2022-03 Cumulative Update for Windows Server 2016 for x64-based Systems (KB5011495)Critical
Win32 Stream Enumeration Remote Code Execution Vulnerability for Windows Server 2016 for x64-based Systems (KB5012596) (CVE-2022-26904) (CVE-2022-24521)Critical
Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability for Windows Server 2016 for x64-based Systems (KB5013952)Critical
AD authentication failures VulnerabilityModerate
AD Authentication failure Vulnerability in Windows Server 2016 for x64-based Systems (KB5015019)Moderate
Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability for Windows Server 2016 for x64-based Systems (KB5014702)Critical
Windows Kernel Information Disclosure Vulnerability for Windows Server 2016 for x64-based Systems (KB5015808) (CVE-2022-22047)Critical
Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability for Windows Server 2016 for x64-based Systems (KB5016622) (CVE-2022-34713)Critical
Windows Bluetooth Driver Elevation of Privilege Vulnerability for Windows Server 2016 for x64-based Systems (KB5012170)Important
Windows Photo Import API Elevation of Privilege Vulnerability for Windows Server 2016 for x64-based Systems (KB5017305)Critical
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability for Windows Server 2016 for x64-based Systems (KB5018411)Critical
Windows Kerberos RC4-HMAC Elevation of Privilege for Windows Server 2016 for x64-based Systems (KB5019964)Critical
Hyper-V RemoteFX vGPU Remote Code Execution Vulnerability Windows Server 2016 for x64-based Systems (KB4565511)Important
Windows Graphics Component Information Disclosure Vulnerability for Windows Server 2016 for x64-based Systems (KB5021235)Critical
Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability for Windows Server 2016 for x64-based Systems (KB5022289)Critical
Microsoft PostScript Printer Driver Remote Code Execution Vulnerability for Windows Server 2016 for x64-based Systems (KB5022838)Critical
CERT/CC: CVE-2023-1017 TPM2.0 Module Library Elevation of Privilege Vulnerability for Windows Server 2016 for x64-based Systems (KB5023697)Critical
Microsoft Message Queuing Remote Code Execution Vulnerability for Windows Server 2016 for x64-based Systems (KB5025228)Critical
Windows NTLM Security Support Provider Information Disclosure Vulnerability for Windows Server 2016 for x64-based Systems (KB5026363)Critical
.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability for Windows Server 2016 for x64-based Systems (KB5027219)Critical
Windows Netlogon Information Disclosure Vulnerability for Windows Server 2016 for x64-based Systems (KB5028169)Critical
Windows Kernel Elevation of Privilege Vulnerability for Windows Server 2016 for x64-based Systems (KB5029242)Critical
DHCP Server Service Information Disclosure Vulnerability for Windows Server 2016 for x64-based Systems (KB5030213)Critical
Windows Remote Desktop Gateway (RD Gateway) Information Disclosure Vulnerability for Windows Server 2016 for x64-based Systems (KB5031362)Critical
Windows Scripting Engine Memory Corruption Vulnerability for Windows Server 2016 for x64-based Systems (KB5032197)Critical
Windows Media Remote Code Execution Vulnerability for Windows Server 2016 for x64-based Systems (KB5033373)Critical
Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability for Windows Server 2016 for x64-based Systems (KB5034119)Critical
Windows Kernel Information Disclosure Vulnerability for Windows Server 2016 for x64-based Systems (KB5034767)Critical
Windows Hyper-V Remote Code Execution Vulnerability for Windows Server 2016 for x64-based Systems (KB5035855)Critical
BitLocker Security Feature Bypass Vulnerability for Windows Server 2016 for x64-based Systems (KB5036899)Critical
Windows Common Log File System Driver Elevation of Privilege Vulnerability for Windows Server 2016 for x64-based Systems (KB5037763)Critical
MITRE: CVE-2023-50868 NSEC3 closest encloser proof can exhaust CPU for Windows Server 2016 for x64-based Systems (KB5039214)Critical
Secure Boot Security Feature Bypass Vulnerability for Windows Server 2016 for x64-based Systems (KB5040434)Critical
Windows Update Stack Elevation of Privilege VulnerabilityImportant
Windows Secure Kernel Mode Elevation of Privilege VulnerabilityImportant
Windows Kernel Elevation of Privilege Vulnerability for Windows Server 2016 for x64-based Systems (KB5041773)Critical
Windows Security Zone Mapping Security Feature Bypass Vulnerability for Windows Server 2016 for x64-based Systems (KB5043051)Critical
Windows Hyper-V Remote Code Execution Vulnerability for Windows Server 2016 for x64-based Systems (KB5044293)Critical
Windows Package Library Manager Information Disclosure Vulnerability for Windows Server 2016 for x64-based Systems (KB5046612)Critical
Windows Task Scheduler Elevation of Privilege Vulnerability for Windows Server 2016 for x64-based Systems (KB5048671)Critical

Disclaimer: This webpage is intended to provide you information about vulnerability announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.