Common Vulnerabilities and Exposures (CVE) is a critical tool for maintaining software security, providing a standardized way to track and manage vulnerabilities across systems. Organizations should regularly monitor CVE databases, assess the impact of vulnerabilities, and apply patches promptly to reduce the risk of exploitation.
CVE (Common Vulnerabilities and Exposures) is a public database that provides a standardized method for identifying, tracking, and referencing publicly disclosed security vulnerabilities in software and hardware.
Each vulnerability receives a unique identifier called a CVE ID (e.g., CVE-2023-12345), making it easier to reference specific vulnerabilities across different tools and databases.
Total Search Results: 158437
CVE ID | Description | Severity | Published Date | Affected Vendor | Action |
---|---|---|---|---|---|
CVE-2022-21896 | Windows DWM Core Library Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21897 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21898 | DirectX Graphics Kernel Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21899 | Windows Extensible Firmware Interface Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-2190 | The Gallery Plugin for WordPress plugin before 1.8.4.7 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers | Unknown | N/A | Unknown | |
CVE-2022-21900 | Windows Hyper-V Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21901 | Windows Hyper-V Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21902 | Windows DWM Core Library Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21903 | Windows GDI Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21904 | Windows GDI Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21905 | Windows Hyper-V Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21906 | Windows Defender Application Control Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21907 | HTTP Protocol Stack Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21908 | Windows Installer Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-2191 | In Eclipse Jetty versions 10.0.0 thru 10.0.9, and 11.0.0 thru 11.0.9 versions, SslConnection does not release ByteBuffers from configured ByteBufferPool in case of error code paths. | Unknown | N/A | The Eclipse Foundation | |
CVE-2022-21910 | Microsoft Cluster Port Driver Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21911 | .NET Framework Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21912 | DirectX Graphics Kernel Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21913 | Local Security Authority (Domain Policy) Remote Protocol Security Feature Bypass | Unknown | N/A | Microsoft | |
CVE-2022-21914 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21915 | Windows GDI+ Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21916 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21917 | HEVC Video Extensions Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21918 | DirectX Graphics Kernel File Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21919 | Windows User Profile Service Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-2192 | Forced Browsing vulnerability in HYPR Server version 6.10 to 6.15.1 allows remote attackers with a valid one-time recovery token to elevate privileges via path tampering in the Magic Link page. This issue affects: HYPR Server versions later than 6.10; version 6.15.1 and prior versions. | Unknown | N/A | HYPR | |
CVE-2022-21920 | Windows Kerberos Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21921 | Windows Defender Credential Guard Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21922 | Remote Procedure Call Runtime Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21924 | Workstation Service Remote Protocol Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21925 | Windows BackupKey Remote Protocol Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21926 | HEVC Video Extensions Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21927 | HEVC Video Extensions Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21928 | Windows Resilient File System (ReFS) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21929 | Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-2193 | Insecure Direct Object Reference vulnerability in HYPR Server before version 6.14.1 allows remote authenticated attackers to add a FIDO2 authenticator to arbitrary accounts via parameter tampering in the Device Manager page. This issue affects: HYPR Server versions prior to 6.14.1. | Unknown | N/A | HYPR | |
CVE-2022-21930 | Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21931 | Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21932 | Microsoft Dynamics 365 Customer Engagement Cross-Site Scripting Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21933 | ASUS VivoMini/Mini PC device has an improper input validation vulnerability. A local attacker with system privilege can use system management interrupt (SMI) to modify memory, resulting in arbitrary code execution for controlling the system or disrupting service. | Unknown | N/A | ASUS | |
CVE-2022-21934 | Under certain circumstances an authenticated user could lock other users out of the system or take over their accounts in Metasys ADS/ADX/OAS server 10 versions prior to 10.1.5 and Metasys ADS/ADX/OAS server 11 versions prior to 11.0.2. | Unknown | N/A | Johnson Controls | |
CVE-2022-21935 | A vulnerability in Metasys ADS/ADX/OAS 10 versions prior to 10.1.5 and Metasys ADS/ADX/OAS 11 versions prior to 11.0.2 allows unverified password change. | Unknown | N/A | Johnson Controls | |
CVE-2022-21936 | On Metasys ADX Server version 12.0 running MVE, an Active Directory user could execute validated actions without providing a valid password when using MVE SMP UI. | Unknown | N/A | n/a | |
CVE-2022-21937 | Under certain circumstances, a vulnerability in Metasys ADS/ADX/OAS 10 versions prior to 10.1.5 and Metasys ADS/ADX/OAS 11 versions prior to 11.0.2 could allow a user to inject malicious code into the web interface. | Unknown | N/A | Johnson Controls | |
CVE-2022-21938 | Under certain circumstances, a vulnerability in Metasys ADS/ADX/OAS 10 versions prior to 10.1.5 and Metasys ADS/ADX/OAS 11 versions prior to 11.0.2 could allow a user to inject malicious code into the MUI Graphics web interface. | Unknown | N/A | Johnson Controls | |
CVE-2022-21939 | Sensitive Cookie Without 'HttpOnly' Flag vulnerability in Johnson Controls System Configuration Tool (SCT) version 14 prior to 14.2.3 and version 15 prior to 15.0.3 could allow access to the cookie. | Unknown | N/A | Johnson Controls | |
CVE-2022-2194 | The Accept Stripe Payments WordPress plugin before 2.0.64 does not sanitize and escape some of its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. | Unknown | N/A | Unknown | |
CVE-2022-21940 | Sensitive Cookie in HTTPS Session Without 'Secure' Attribute vulnerability in Johnson Controls System Configuration Tool (SCT) version 14 prior to 14.2.3 and version 15 prior to 15.0.3 could allow access to the cookie. | Unknown | N/A | Johnson Controls | |
CVE-2022-21941 | All versions of iSTAR Ultra prior to version 6.8.9.CU01 are vulnerable to a command injection that could allow an unauthenticated user root access to the system. | Unknown | N/A | Johnson Controls | |
CVE-2022-21944 | A UNIX Symbolic Link (Symlink) Following vulnerability in the systemd service file for watchman of openSUSE Backports SLE-15-SP3, Factory allows local attackers to escalate to root. This issue affects: openSUSE Backports SLE-15-SP3 watchman versions prior to 4.9.0. openSUSE Factory watchman versions prior to 4.9.0-9.1. | Unknown | N/A | openSUSE | |
CVE-2022-21945 | A Insecure Temporary File vulnerability in cscreen of openSUSE Factory allows local attackers to cause DoS for cscreen and a system DoS for non-default systems. This issue affects: openSUSE Factory cscreen version 1.2-1.3 and prior versions. | Unknown | N/A | openSUSE | |
CVE-2022-21946 | A Incorrect Permission Assignment for Critical Resource vulnerability in the sudoers configuration in cscreen of openSUSE Factory allows any local users to gain the privileges of the tty and dialout groups and access and manipulate any running cscreen seesion. This issue affects: openSUSE Factory cscreen version 1.2-1.3 and prior versions. | Unknown | N/A | openSUSE | |
CVE-2022-21947 | A Exposure of Resource to Wrong Sphere vulnerability in Rancher Desktop of SUSE allows attackers in the local network to connect to the Dashboard API (steve) to carry out arbitrary actions. This issue affects: SUSE Rancher Desktop versions prior to V. | Unknown | N/A | SUSE | |
CVE-2022-21948 | An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in paste allows remote attackers to place Javascript into SVG files. This issue affects: openSUSE paste paste version b57b9f87e303a3db9465776e657378e96845493b and prior versions. | Unknown | N/A | openSUSE | |
CVE-2022-21949 | A Improper Restriction of XML External Entity Reference vulnerability in SUSE Open Build Service allows remote attackers to reference external entities in certain operations. This can be used to gain information from the server that can be abused to escalate to Admin privileges on OBS. This issue affects: SUSE Open Build Service Open Build Service versions prior to 2.10.13. | Unknown | N/A | SUSE | |
CVE-2022-21950 | A Improper Access Control vulnerability in the systemd service of cana in openSUSE Backports SLE-15-SP3, openSUSE Backports SLE-15-SP4 allows local users to hijack the UNIX domain socket This issue affects: openSUSE Backports SLE-15-SP3 canna versions prior to canna-3.7p3-bp153.2.3.1. openSUSE Backports SLE-15-SP4 canna versions prior to 3.7p3-bp154.3.3.1. openSUSE Factory was also affected. Instead of fixing the package it was deleted there. | Unknown | N/A | openSUSE | |
CVE-2022-21951 | A Cleartext Transmission of Sensitive Information vulnerability in SUSE Rancher, Rancher allows attackers on the network to read and change network data due to missing encryption of data transmitted via the network when a cluster is created from an RKE template with the CNI value overridden This issue affects: SUSE Rancher Rancher versions prior to 2.5.14; Rancher versions prior to 2.6.5. | Unknown | N/A | SUSE | |
CVE-2022-21952 | A Missing Authentication for Critical Function vulnerability in spacewalk-java of SUSE Manager Server 4.1, SUSE Manager Server 4.2 allows remote attackers to easily exhaust available disk resources leading to DoS. This issue affects: SUSE Manager Server 4.1 spacewalk-java versions prior to 4.1.46. SUSE Manager Server 4.2 spacewalk-java versions prior to 4.2.37. | Unknown | N/A | SUSE | |
CVE-2022-21953 | A Missing Authorization vulnerability in of SUSE Rancher allows authenticated user to create an unauthorized shell pod and kubectl access in the local cluster This issue affects: SUSE Rancher Rancher versions prior to 2.5.17; Rancher versions prior to 2.6.10; Rancher versions prior to 2.7.1. | Unknown | N/A | SUSE | |
CVE-2022-21954 | Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21957 | Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21958 | Windows Resilient File System (ReFS) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21959 | Windows Resilient File System (ReFS) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-2196 | A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with code execution can execute code on an indirect branch on the host machine. We recommend upgrading to Kernel 6.2 or past commit 2e7eab81425a | Unknown | N/A | Linux | |
CVE-2022-21960 | Windows Resilient File System (ReFS) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21961 | Windows Resilient File System (ReFS) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21962 | Windows Resilient File System (ReFS) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21963 | Windows Resilient File System (ReFS) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21964 | Remote Desktop Licensing Diagnoser Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21965 | Microsoft Teams Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21967 | Xbox Live Auth Manager for Windows Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21968 | Microsoft SharePoint Server Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21969 | Microsoft Exchange Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-2197 | By using a specific credential string, an attacker with network access to the device’s web interface could circumvent the authentication scheme and perform administrative operations. | Unknown | N/A | Exemys | |
CVE-2022-21970 | Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21971 | Windows Runtime Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21972 | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21973 | Windows Media Center Update Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21974 | Roaming Security Rights Management Services Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21975 | Windows Hyper-V Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21977 | Media Foundation Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21978 | Microsoft Exchange Server Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21979 | Microsoft Exchange Server Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-2198 | The WPQA Builder WordPress plugin before 5.7 which is a companion plugin to the Hilmer and Discy , does not check authorization before displaying private messages, allowing any logged in user to read other users private message using the message id, which can easily be brute forced. | Unknown | N/A | Unknown | |
CVE-2022-21980 | Microsoft Exchange Server Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21981 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21983 | Win32 Stream Enumeration Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21984 | Windows DNS Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21985 | Windows Remote Access Connection Manager Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21986 | .NET Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21987 | Microsoft SharePoint Server Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21988 | Microsoft Office Visio Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21989 | Windows Kernel Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-2199 | The main MiCODUS MV720 GPS tracker web server has a reflected cross-site scripting vulnerability that could allow an attacker to gain control by tricking a user into making a request. | Unknown | N/A | MiCODUS | |
CVE-2022-21990 | Remote Desktop Client Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21991 | Visual Studio Code Remote Development Extension Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21992 | Windows Mobile Device Management Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21993 | Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21994 | Windows DWM Core Library Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2022-21995 | Windows Hyper-V Remote Code Execution Vulnerability | Unknown | N/A | Microsoft |
vunerability-insight.com © 2023 - 2025. All Rights Reserved.
Vulnerability Data Repositories v