Vulnerabilidades CVE
Base de datos de vulnerabilidades CVE enriquecida con datos de CISA KEV y NVD
| CVE ID | CVSS | Severidad | KEV | Avistamientos |
|---|---|---|---|---|
| CVE-2022-41039 Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | 8.1 | HIGH | β | 0 |
| CVE-2022-41044 Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | 8.1 | HIGH | β | 0 |
| CVE-2022-41045 Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability | 7.8 | HIGH | β | 0 |
| CVE-2022-41047 Microsoft ODBC Driver Remote Code Execution Vulnerability | 8.8 | HIGH | β | 0 |
| CVE-2022-24937 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Silicon Labs Ember ZNet allows Overflow Buffers. | 6.5 | MEDIUM | β | 0 |
| CVE-2022-41048 Microsoft ODBC Driver Remote Code Execution Vulnerability | 8.8 | HIGH | β | 0 |
| CVE-2022-41050 Windows Extensible File Allocation Table Elevation of Privilege Vulnerability | 7.8 | HIGH | β | 0 |
| CVE-2022-41051 Azure RTOS GUIX Studio Remote Code Execution Vulnerability | 7.8 | HIGH | β | 0 |
| CVE-2022-41052 Windows Graphics Component Remote Code Execution Vulnerability | 7.8 | HIGH | β | 0 |
| CVE-2022-41053 Windows Kerberos Denial of Service Vulnerability | 7.5 | HIGH | β | 0 |
| CVE-2023-21431 Improper input validation in Bixby Vision prior to version 3.7.70.17 allows attacker to access data of Bixby Vision. | 3.3 | LOW | β | 0 |
| CVE-2022-41054 Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability | 7.8 | HIGH | β | 0 |
| CVE-2022-41055 Windows Human Interface Device Information Disclosure Vulnerability | 5.5 | MEDIUM | β | 0 |
| CVE-2022-41056 Network Policy Server (NPS) RADIUS Protocol Denial of Service Vulnerability | 7.5 | HIGH | β | 0 |
| CVE-2022-41057 Windows HTTP.sys Elevation of Privilege Vulnerability | 7.8 | HIGH | β | 0 |
| CVE-2022-41078 Microsoft Exchange Server Spoofing Vulnerability | 8.0 | HIGH | β | 0 |
| CVE-2022-41058 Windows Network Address Translation (NAT) Denial of Service Vulnerability | 7.5 | HIGH | β | 0 |
| CVE-2022-41060 Microsoft Word Information Disclosure Vulnerability | 5.5 | MEDIUM | β | 0 |
| CVE-2022-41062 Microsoft SharePoint Server Remote Code Execution Vulnerability | 8.8 | HIGH | β | 0 |
| CVE-2022-41063 Microsoft Excel Remote Code Execution Vulnerability | 7.8 | HIGH | β | 0 |
| CVE-2022-3942 A vulnerability was found in SourceCodester Sanitization Management System and classified as problematic. This issue affects some unknown processing of the file php-sms/?p=request_quote. The manipulat... | 4.3 | MEDIUM | β | 0 |
| CVE-2022-41079 Microsoft Exchange Server Spoofing Vulnerability | 8.0 | HIGH | β | 0 |
| CVE-2022-41085 Azure CycleCloud Elevation of Privilege Vulnerability | 7.5 | HIGH | β | 0 |
| CVE-2022-41086 Windows Group Policy Elevation of Privilege Vulnerability | 6.4 | MEDIUM | β | 0 |
| CVE-2022-41088 Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | 8.1 | HIGH | β | 0 |
| CVE-2022-41090 Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability | 5.9 | MEDIUM | β | 0 |
| CVE-2022-41092 Windows Win32k Elevation of Privilege Vulnerability | 7.8 | HIGH | β | 0 |
| CVE-2022-41093 Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability | 7.8 | HIGH | β | 0 |
| CVE-2022-41095 Windows Digital Media Receiver Elevation of Privilege Vulnerability | 7.8 | HIGH | β | 0 |
| CVE-2022-41096 Microsoft DWM Core Library Elevation of Privilege Vulnerability | 7.8 | HIGH | β | 0 |
| CVE-2022-3084 GE CIMPICITY versions 2022 and prior is vulnerable when data from a faulting address controls code flow starting at gmmiObj!CGmmiRootOptionTable, which could allow an attacker to execute arbitrary cod... | 7.8 | HIGH | β | 0 |
| CVE-2022-41097 Network Policy Server (NPS) RADIUS Protocol Information Disclosure Vulnerability | 6.5 | MEDIUM | β | 0 |
| CVE-2022-41098 Windows GDI+ Information Disclosure Vulnerability | 5.5 | MEDIUM | β | 0 |
| CVE-2022-41099 BitLocker Security Feature Bypass Vulnerability | 4.6 | MEDIUM | β | 0 |
| CVE-2022-41100 Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability | 7.8 | HIGH | β | 0 |
| CVE-2022-3943 A vulnerability was found in ForU CMS. It has been classified as problematic. Affected is an unknown function of the file cms_chip.php. The manipulation of the argument name leads to cross site script... | 3.5 | LOW | β | 0 |
| CVE-2022-41101 Windows Overlay Filter Elevation of Privilege Vulnerability | 7.8 | HIGH | β | 0 |
| CVE-2022-41102 Windows Overlay Filter Elevation of Privilege Vulnerability | 7.8 | HIGH | β | 0 |
| CVE-2022-41103 Microsoft Word Information Disclosure Vulnerability | 5.5 | MEDIUM | β | 0 |
| CVE-2022-41104 Microsoft Excel Security Feature Bypass Vulnerability | 5.5 | MEDIUM | β | 0 |
| CVE-2022-41105 Microsoft Excel Information Disclosure Vulnerability | 5.5 | MEDIUM | β | 0 |
| CVE-2022-24938 A malformed packet causes a stack overflow in the Ember ZNet stack. This causes an assert which leads to a reset, immediately clearing the error. | 6.5 | MEDIUM | β | 0 |
| CVE-2022-41106 Microsoft Excel Remote Code Execution Vulnerability | 8.8 | HIGH | β | 0 |
| CVE-2022-41107 Microsoft Office Graphics Remote Code Execution Vulnerability | 7.8 | HIGH | β | 0 |
| CVE-2022-41109 Windows Win32k Elevation of Privilege Vulnerability | 7.8 | HIGH | β | 0 |
| CVE-2022-41113 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability | 7.8 | HIGH | β | 0 |
| CVE-2022-42000 Cross-site Scripting (XSS) vulnerability in BlueSpiceSocialProfile extension of BlueSpice allows user with comment permissions to inject arbitrary HTML into the comment section of a wikipage. | 3.3 | LOW | β | 0 |
| CVE-2022-41114 Windows Bind Filter Driver Elevation of Privilege Vulnerability | 7.0 | HIGH | β | 0 |
| CVE-2022-41116 Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability | 5.9 | MEDIUM | β | 0 |
| CVE-2022-41118 Windows Scripting Languages Remote Code Execution Vulnerability | 7.5 | HIGH | β | 0 |
This product uses data from the NVD API but is not endorsed or certified by the NVD.