CVE-2022-21928
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
Read morePage 26/27.
CVEs without a recognized CWE (not present in the CWE map or marked as N/A).
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
Read moreWindows BackupKey Remote Protocol Security Feature Bypass Vulnerability
Read moreWorkstation Service Remote Protocol Security Feature Bypass Vulnerability
Read moreRemote Procedure Call Runtime Remote Code Execution Vulnerability
Read moreWindows Defender Credential Guard Security Feature Bypass Vulnerability
Read moreWindows Kerberos Elevation of Privilege Vulnerability
Read moreDirectX Graphics Kernel File Denial of Service Vulnerability
Read moreWindows Common Log File System Driver Elevation of Privilege Vulnerability
Read moreWindows GDI+ Information Disclosure Vulnerability
Read moreWindows Remote Access Connection Manager Elevation of Privilege Vulnerability
Read moreLocal Security Authority (Domain Policy) Remote Protocol Security Feature Bypass
Read moreDirectX Graphics Kernel Remote Code Execution Vulnerability
Read more.NET Framework Denial of Service Vulnerability
Read moreMicrosoft Cluster Port Driver Elevation of Privilege Vulnerability
Read moreWindows Installer Elevation of Privilege Vulnerability
Read moreHTTP Protocol Stack Remote Code Execution Vulnerability
Read moreWindows Defender Application Control Security Feature Bypass Vulnerability
Read moreWindows Hyper-V Security Feature Bypass Vulnerability
Read moreWindows GDI Information Disclosure Vulnerability
Read moreWindows GDI Elevation of Privilege Vulnerability
Read moreWindows Hyper-V Elevation of Privilege Vulnerability
Read moreWindows Hyper-V Security Feature Bypass Vulnerability
Read moreWindows Extensible Firmware Interface Security Feature Bypass Vulnerability
Read moreDirectX Graphics Kernel Remote Code Execution Vulnerability
Read moreWindows Common Log File System Driver Elevation of Privilege Vulnerability
Read moreRemote Desktop Protocol Remote Code Execution Vulnerability
Read moreWindows Resilient File System (ReFS) Remote Code Execution Vulnerability
Read moreMicrosoft Dynamics 365 (on-premises) Spoofing Vulnerability
Read moreWindows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability
Read moreWindows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability
Read moreWindows Modern Execution Server Remote Code Execution Vulnerability
Read moreWin32k Elevation of Privilege Vulnerability
Read moreWindows Remote Access Connection Manager Elevation of Privilege Vulnerability
Read moreLocal Security Authority Subsystem Service Elevation of Privilege Vulnerability
Read moreWindows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability
Read moreWindows GDI+ Information Disclosure Vulnerability
Read moreWindows Kernel Elevation of Privilege Vulnerability
Read moreWindows Geolocation Service Remote Code Execution Vulnerability
Read moreWindows Storage Elevation of Privilege Vulnerability
Read moreWindows Security Center API Remote Code Execution Vulnerability
Read moreTile Data Repository Elevation of Privilege Vulnerability
Read moreWindows Event Tracing Elevation of Privilege Vulnerability
Read moreMicrosoft Diagnostics Hub Standard Collector Runtime Elevation of Privilege Vulnerability
Read moreTablet Windows User Interface Application Core Elevation of Privilege Vulnerability
Read moreClipboard User Service Elevation of Privilege Vulnerability
Read moreWindows Devices Human Interface Elevation of Privilege Vulnerability
Read moreWindows Push Notifications Apps Elevation of Privilege Vulnerability
Read moreWindows System Launcher Elevation of Privilege Vulnerability
Read moreConnected Devices Platform Service Elevation of Privilege Vulnerability
Read moreWindows UI Immersive Server API Elevation of Privilege Vulnerability
Read moreWindows StateRepository API Server file Elevation of Privilege Vulnerability
Read moreWindows Application Model Core API Elevation of Privilege Vulnerability
Read moreTask Flow Data Engine Elevation of Privilege Vulnerability
Read moreWindows AppContracts API Server Elevation of Privilege Vulnerability
Read moreWindows Accounts Control Elevation of Privilege Vulnerability
Read moreWindows Bind Filter Driver Elevation of Privilege Vulnerability
Read moreActive Directory Domain Services Elevation of Privilege Vulnerability
Read moreMicrosoft Exchange Server Remote Code Execution Vulnerability
Read moreRemote Desktop Client Remote Code Execution Vulnerability
Read moreRemote Desktop Client Remote Code Execution Vulnerability
Read moreWindows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability
Read moreWindows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability
Read moreWindows Hyper-V Denial of Service Vulnerability
Read moreMicrosoft Exchange Server Remote Code Execution Vulnerability
Read moreWindows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability
Read moreMicrosoft Word Remote Code Execution Vulnerability
Read moreMicrosoft Excel Remote Code Execution Vulnerability
Read moreMicrosoft Office Remote Code Execution Vulnerability
Read moreWindows Event Tracing Discretionary Access Control List Denial of Service Vulnerability
Read moreMicrosoft SharePoint Server Remote Code Execution Vulnerability
Read moreMicrosoft Cryptographic Services Elevation of Privilege Vulnerability
Read moreWindows User-mode Driver Framework Reflector Driver Elevation of Privilege Vulnerability
Read moreVirtual Machine IDE Drive Elevation of Privilege Vulnerability
Read moreAn unrestricted file copy vulnerability in /UserSelfServiceSettings.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to copy arbitrary files on the server filesystem to the web r…
Read moreThe eFTL Server component of TIBCO Software Inc.'s TIBCO eFTL - Community Edition, TIBCO eFTL - Developer Edition, and TIBCO eFTL - Enterprise Edition contains an easily exploitable vulnerability tha…
Read moreThe eFTL Server component of TIBCO Software Inc.'s TIBCO eFTL - Community Edition, TIBCO eFTL - Developer Edition, and TIBCO eFTL - Enterprise Edition contains an easily exploitable vulnerability tha…
Read moreThe Realm Server component of TIBCO Software Inc.'s TIBCO FTL - Community Edition, TIBCO FTL - Developer Edition, and TIBCO FTL - Enterprise Edition contains a difficult to exploit vulnerability that…
Read moreIBM AIX 7.0, 7.1, 7.2, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the lscore command which could lead to code execution. IBM X-Force ID: 212953.
Read moreIBM Engineering Workflow Management 7.0, 7.0.1, and 7.0.2 as well as IBM Rational Team Concert 6.0.6 and 6.0.6.1 could allow an authneticated attacker to obtain sensitive information from build defin…
Read moreFormpipe Lasernet before 9.13.3 allows file inclusion in Client Web Services (either by an authenticated attacker, or in a configuration that does not require authentication).
Read moreThe dnslib package through 0.9.16 for Python does not verify that the ID value in a DNS reply matches an ID value in a query.
Read morePIL.ImageMath.eval in Pillow before 9.0.0 allows evaluation of arbitrary expressions, such as ones that use the Python exec method. A lambda expression could also be used.
Read moreZoho ManageEngine Desktop Central before 10.0.662, during startup, launches an executable file from the batch files, but this file's path might not be properly defined.
Read moreZoho ManageEngine Desktop Central before 10.0.662 allows remote code execution by an authenticated user who has complete access to the Reports module.
Read moreGPAC 1.0.1 is affected by: Abort failed. The impact is: cause a denial of service (context-dependent).
Read moreThe bone voice ID TA has a vulnerability in information management,Successful exploitation of this vulnerability may affect data confidentiality.
Read moreThe weaver module has a vulnerability in parameter type verification,Successful exploitation of this vulnerability may affect data confidentiality.
Read moreVulnerability of design defects in the security algorithm component. Successful exploitation of this vulnerability may affect confidentiality.
Read moreThe distributed data service component has a vulnerability in data access control. Successful exploitation of this vulnerability may affect data confidentiality.
Read moreThere is Vulnerability of APIs being concurrently called for multiple times in HwConnectivityExService a in smartphones. Successful exploitation of this vulnerability may cause the system to crash an…
Read moreIBM AIX 7.1, 7.2, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the mount command which could lead to code execution. IBM X-Force ID: 212952.
Read moreIn Spring Framework versions 5.3.0 - 5.3.13, 5.2.0 - 5.2.18, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries. Thi…
Read moreA Segmentation Fault Vulnerability exists in GPAC 1.0.1 via the co64_box_new function, which causes a Denial of Service.
Read moreIn Vehicle Service Management System 1.0 an attacker can steal the cookies leading to Full Account Takeover.
Read moreApache Kylin allows users to read data from other database systems using JDBC. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrar…
Read moreA security vulnerability originally reported in the SYNC2101 product, and applicable to specific sub-families of SYNC devices, allows an attacker to download the configuration file used in the device…
Read moreAffected versions of Atlassian Jira Server and Data Center allow remote attackers with administrator privileges to execute arbitrary code via a Remote Code Execution (RCE) vulnerability in the Email…
Read moreAn issue was discovered in AtaLegacySmm in the kernel 5.0 before 05.08.46, 5.1 before 05.16.46, 5.2 before 05.26.46, 5.3 before 05.35.46, 5.4 before 05.43.46, and 5.5 before 05.51.45 in Insyde Insyde…
Read moreIBM PowerVM Hypervisor FW860, FW940, FW950, and FW1010, through a specific sequence of VM management operations could lead to a violation of the isolation between peer VMs. IBM X-Force ID: 210019.
Read moreRogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen o…
Read moreRogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen o…
Read moreRogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen o…
Read moreAffected versions of Atlassian Jira Server and Data Center allow authenticated remote attackers to add administrator groups to filter subscriptions via a Broken Access Control vulnerability in the /s…
Read moreAn issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. UserAttributeSimilarityValidator incurred significant overhead in evaluating a submitted password that wa…
Read moreIn Bluetooth, there is a possible link disconnection due to bluetooth does not properly handle a connection attempt from a host with the same BD address as the currently connected BT host. This could…
Read moreIn Bluetooth, there is a possible application crash due to bluetooth does not properly handle the reception of multiple LMP_host_connection_req. This could lead to remote denial of service of bluetoo…
Read moreFoxit PDF Reader and PDF Editor before 11.1 on macOS allow remote attackers to execute arbitrary code via getURL in the JavaScript API.
Read moreIn Apache James, using Jazzer fuzzer, we identified that an IMAP user can craft IMAP LIST commands to orchestrate a Denial Of Service using a vulnerable Regular expression. This affected Apache James…
Read moreProtection mechanism failure vulnerability in KONICA MINOLTA bizhub series (bizhub C750i G00-35 and earlier, bizhub C650i/C550i/C450i G00-B6 and earlier, bizhub C360i/C300i/C250i G00-B6 and earlier,…
Read moreThe HwNearbyMain module has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause a process to restart.
Read moreChang Lian application has a vulnerability which can be maliciously exploited to hide the calling number.Successful exploitation of this vulnerability allows you to make an anonymous call.
Read moreHilinksvc has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause denial of service attacks.
Read moreThere is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality.
Read moreChanglian Blocklist has a Business Logic Errors vulnerability .Successful exploitation of this vulnerability may expand the attack surface of the message class.
Read moreA BIOS bug in firmware for a particular PC model leaves the Platform authorization value empty. This can be used to permanently brick the TPM in multiple ways, as well as to non-permanently DoS the s…
Read moreThere is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality.
Read moreThere is a Configuration defects in Smartphone.Successful exploitation of this vulnerability may elevate the MEID (IMEI) permission.
Read moreThere is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS.
Read moreThere is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS.
Read moreThere is a Privilege escalation vulnerability with the file system component in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality.
Read more