Common Vulnerabilities and Exposures (CVE) is a critical tool for maintaining software security, providing a standardized way to track and manage vulnerabilities across systems. Organizations should regularly monitor CVE databases, assess the impact of vulnerabilities, and apply patches promptly to reduce the risk of exploitation.
CVE (Common Vulnerabilities and Exposures) is a public database that provides a standardized method for identifying, tracking, and referencing publicly disclosed security vulnerabilities in software and hardware.
Each vulnerability receives a unique identifier called a CVE ID (e.g., CVE-2023-12345), making it easier to reference specific vulnerabilities across different tools and databases.
Total Search Results: 158437
CVE ID | Description | Severity | Published Date | Affected Vendor | Action |
---|---|---|---|---|---|
CVE-2022-2180 | The GREYD.SUITE WordPress theme does not properly validate uploaded custom font packages, and does not perform any authorization or csrf checks, allowing an unauthenticated attacker to upload arbitrary files including php source files, leading to possible remote code execution (RCE). | Unknown | N/A | Unknown | |
CVE-2022-21800 | MMP: All versions prior to v1.0.3, PTP C-series: Device versions prior to v2.8.6.1, and PTMP C-series and A5x: Device versions prior to v2.5.4.1 uses the MD5 algorithm to hash the passwords before storing them but does not salt the hash. As a result, attackers may be able to crack the hashed passwords. | Unknown | N/A | Airspan Networks | |
CVE-2022-21801 | A denial of service vulnerability exists in the netserver recv_command functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted network request can lead to a reboot. An attacker can send a malicious packet to trigger this vulnerability. | Unknown | N/A | n/a | |
CVE-2022-21802 | The package grapesjs before 0.19.5 are vulnerable to Cross-site Scripting (XSS) due to an improper sanitization of the class name in Selector Manager. | Unknown | N/A | n/a | |
CVE-2022-21803 | This affects the package nconf before 0.11.4. When using the memory engine, it is possible to store a nested JSON representation of the configuration. The .set() function, that is responsible for setting the configuration properties, is vulnerable to Prototype Pollution. By providing a crafted property, it is possible to modify the properties on the Object.prototype. | Unknown | N/A | n/a | |
CVE-2022-21804 | Out-of-bounds write in software for the Intel QAT Driver for Windows before version 1.9.0-0008 may allow an authenticated user to potentially enable escalation of privilege via local access. | Unknown | N/A | n/a | |
CVE-2022-21805 | Reflected cross-site scripting vulnerability in the attached file name of php_mailform versions prior to Version 1.40 allows a remote unauthenticated attacker to inject an arbitrary script via unspecified vectors. | Unknown | N/A | econosys system | |
CVE-2022-21806 | A use-after-free vulnerability exists in the mips_collector appsrv_server functionality of Anker Eufy Homebase 2 2.1.8.5h. A specially-crafted set of network packets can lead to remote code execution. The device is exposed to attacks from the network. | Unknown | N/A | Anker | |
CVE-2022-21807 | Uncontrolled search path elements in the Intel(R) VTune(TM) Profiler software before version 2022.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | Unknown | N/A | n/a | |
CVE-2022-21808 | Path traversal vulnerability exists in CAMS for HIS Server contained in the following Yokogawa Electric products: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00. | Unknown | N/A | Yokogawa Electric Corporation | |
CVE-2022-21809 | A file write vulnerability exists in the httpd upload.cgi functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted HTTP request can lead to arbitrary file upload. An attacker can upload a malicious file to trigger this vulnerability. | Unknown | N/A | InHand Networks | |
CVE-2022-2181 | The Advanced WordPress Reset WordPress plugin before 1.6 does not escape some generated URLs before outputting them back in href attributes of admin dashboard pages, leading to Reflected Cross-Site Scripting | Unknown | N/A | Unknown | |
CVE-2022-21810 | All versions of the package smartctl are vulnerable to Command Injection via the info method due to improper input sanitization. | Unknown | N/A | n/a | |
CVE-2022-21812 | Improper access control in the Intel(R) HAXM software before version 7.7.1 may allow an authenticated user to potentially enable escalation of privilege via local access. | Unknown | N/A | n/a | |
CVE-2022-21813 | NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel driver, where improper handling of insufficient permissions or privileges may allow an unprivileged local user limited write access to protected memory, which can lead to denial of service. | Unknown | N/A | NVIDIA | |
CVE-2022-21814 | NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel driver package, where improper handling of insufficient permissions or privileges may allow an unprivileged local user limited write access to protected memory, which can lead to denial of service. | Unknown | N/A | NVIDIA | |
CVE-2022-21815 | NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for private IOCTLs where a NULL pointer dereference in the kernel, created within user mode code, may lead to a denial of service in the form of a system crash. | Unknown | N/A | NVIDIA | |
CVE-2022-21816 | NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (nvidia.ko), where a user in the guest OS can cause a GPU interrupt storm on the hypervisor host, leading to a denial of service. | Unknown | N/A | NVIDIA | |
CVE-2022-21817 | NVIDIA Omniverse Launcher contains a Cross-Origin Resource Sharing (CORS) vulnerability which can allow an unprivileged remote attacker, if they can get user to browse malicious site, to acquire access tokens allowing them to access resources in other security domains, which may lead to code execution, escalation of privileges, and impact to confidentiality and integrity. | Unknown | N/A | n/a | |
CVE-2022-21818 | NVIDIA License System contains a vulnerability in the installation scripts for the DLS virtual appliance, where a user on a network after signing in to the portal can access other users’ credentials, allowing them to gain escalated privileges, resulting in limited impact to both confidentiality and integrity. | Unknown | N/A | NVIDIA | |
CVE-2022-21819 | NVIDIA distributions of Jetson Linux contain a vulnerability where an error in the IOMMU configuration may allow an unprivileged attacker with physical access to the board direct read/write access to the entire system address space through the PCI bus. Such an attack could result in denial of service, code execution, escalation of privileges, and impact to data integrity and confidentiality. The scope impact may extend to other components. | Unknown | N/A | NVIDIA | |
CVE-2022-2182 | Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. | Unknown | N/A | vim | |
CVE-2022-21820 | NVIDIA DCGM contains a vulnerability in nvhostengine, where a network user can cause detection of error conditions without action, which may lead to limited code execution, some denial of service, escalation of privileges, and limited impacts to both data confidentiality and integrity. | Unknown | N/A | NVIDIA | |
CVE-2022-21821 | NVIDIA CUDA Toolkit SDK contains an integer overflow vulnerability in cuobjdump.To exploit this vulnerability, a remote attacker would require a local user to download a specially crafted, corrupted file and locally execute cuobjdump against the file. Such an attack may lead to remote code execution that causes complete denial of service and an impact on data confidentiality and integrity. | Unknown | N/A | NVIDIA | |
CVE-2022-21822 | NVIDIA FLARE contains a vulnerability in the admin interface, where an un-authorized attacker can cause Allocation of Resources Without Limits or Throttling, which may lead to cause system unavailable. | Unknown | N/A | NVIDIA | |
CVE-2022-21823 | A insecure storage of sensitive information vulnerability exists in Ivanti Workspace Control <2021.2 (10.7.30.0) that could allow an attacker with locally authenticated low privileges to obtain key information due to an unspecified attack vector. | Unknown | N/A | n/a | |
CVE-2022-21824 | Due to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be "__proto__". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to. | Unknown | N/A | n/a | |
CVE-2022-21825 | An Improper Access Control vulnerability exists in Citrix Workspace App for Linux 2012 - 2111 with App Protection installed that can allow an attacker to perform local privilege escalation. | Unknown | N/A | n/a | |
CVE-2022-21826 | Pulse Secure version 9.115 and below may be susceptible to client-side http request smuggling, When the application receives a POST request, it ignores the request's Content-Length header and leaves the POST body on the TCP/TLS socket. This body ends up prefixing the next HTTP request sent down that connection, this means when someone loads website attacker may be able to make browser issue a POST to the application, enabling XSS. | Unknown | N/A | n/a | |
CVE-2022-21827 | An improper privilege vulnerability has been discovered in Citrix Gateway Plug-in for Windows (Citrix Secure Access for Windows) <21.9.1.2 what could allow an attacker who has gained local access to a computer with Citrix Gateway Plug-in installed, to corrupt or delete files as SYSTEM. | Unknown | N/A | n/a | |
CVE-2022-21828 | A user with high privilege access to the Incapptic Connect web console can remotely execute code on the Incapptic Connect server using a unspecified attack vector in Incapptic Connect version 1.40.0, 1.39.1, 1.39.0, 1.38.1, 1.38.0, 1.37.1, 1.37.0, 1.36.0, 1.35.5, 1.35.4 and 1.35.3. | Unknown | N/A | n/a | |
CVE-2022-21829 | Concrete CMS Versions 9.0.0 through 9.0.2 and 8.5.7 and below can download zip files over HTTP and execute code from those zip files which could lead to an RCE. Fixed by enforcing ‘concrete_secure’ instead of ‘concrete’. Concrete now only makes requests over https even a request comes in via http. Concrete CMS security team ranked this 8 with CVSS v3.1 vector: AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H Credit goes to Anna for reporting HackerOne 1482520. | Unknown | N/A | n/a | |
CVE-2022-2183 | Out-of-bounds Read in GitHub repository vim/vim prior to 8.2. | Unknown | N/A | vim | |
CVE-2022-21830 | A blind self XSS vulnerability exists in RocketChat LiveChat Unknown |
N/A |
n/a |
|
|
CVE-2022-21831 | A code injection vulnerability exists in the Active Storage >= v5.2.0 that could allow an attacker to execute code via image_processing arguments. | Unknown | N/A | n/a | |
CVE-2022-21833 | Virtual Machine IDE Drive Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21834 | Windows User-mode Driver Framework Reflector Driver Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21835 | Microsoft Cryptographic Services Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21836 | Windows Certificate Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21837 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21838 | Windows Cleanup Manager Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21839 | Windows Event Tracing Discretionary Access Control List Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-2184 | The CAPTCHA 4WP WordPress plugin before 7.1.0 lets user input reach a sensitive require_once call in one of its admin-side templates. This can be abused by attackers, via a Cross-Site Request Forgery attack to run arbitrary code on the server. | Unknown | N/A | Unknown | |
CVE-2022-21840 | Microsoft Office Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21841 | Microsoft Excel Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21842 | Microsoft Word Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21843 | Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21844 | HEVC Video Extensions Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21845 | Windows Kernel Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21846 | Microsoft Exchange Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21847 | Windows Hyper-V Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21848 | Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21849 | Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-2185 | A critical issue has been discovered in GitLab affecting all versions starting from 14.0 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 where an authenticated user authorized to import projects could import a maliciously crafted project leading to remote code execution. | Unknown | N/A | GitLab | |
CVE-2022-21850 | Remote Desktop Client Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21851 | Remote Desktop Client Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21852 | Windows DWM Core Library Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21855 | Microsoft Exchange Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21857 | Active Directory Domain Services Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21858 | Windows Bind Filter Driver Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21859 | Windows Accounts Control Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-2186 | The Simple Post Notes WordPress plugin before 1.7.6 does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. | Unknown | N/A | Unknown | |
CVE-2022-21860 | Windows AppContracts API Server Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21861 | Task Flow Data Engine Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21862 | Windows Application Model Core API Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21863 | Windows StateRepository API Server file Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21864 | Windows UI Immersive Server API Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21865 | Connected Devices Platform Service Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21866 | Windows System Launcher Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21867 | Windows Push Notifications Apps Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21868 | Windows Devices Human Interface Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21869 | Clipboard User Service Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-2187 | The Contact Form 7 Captcha WordPress plugin before 0.1.2 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers | Unknown | N/A | Unknown | |
CVE-2022-21870 | Tablet Windows User Interface Application Core Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21871 | Microsoft Diagnostics Hub Standard Collector Runtime Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21872 | Windows Event Tracing Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21873 | Tile Data Repository Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21874 | Windows Security Center API Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21875 | Windows Storage Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21876 | Win32k Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21877 | Storage Spaces Controller Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21878 | Windows Geolocation Service Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21879 | Windows Kernel Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-2188 | Privilege escalation vulnerability in DXL Broker for Windows prior to 6.0.0.280 allows local users to gain elevated privileges by exploiting weak directory controls in the logs directory. This can lead to a denial-of-service attack on the DXL Broker. | Unknown | N/A | Trellix | |
CVE-2022-21880 | Windows GDI+ Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21881 | Windows Kernel Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21882 | Win32k Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21883 | Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21884 | Local Security Authority Subsystem Service Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21885 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21887 | Win32k Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21888 | Windows Modern Execution Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21889 | Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-2189 | The WP Video Lightbox WordPress plugin before 1.9.5 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers | Unknown | N/A | Unknown | |
CVE-2022-21890 | Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21891 | Microsoft Dynamics 365 (on-premises) Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21892 | Windows Resilient File System (ReFS) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21893 | Remote Desktop Protocol Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21894 | Secure Boot Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21895 | Windows User Profile Service Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft |
vunerability-insight.com © 2023 - 2025. All Rights Reserved.
Vulnerability Data Repositories v