Search Results (23437 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2022-44693 1 Microsoft 7 Sharepoint Enterprise Server, Sharepoint Foundation, Sharepoint Foundation 2013 and 4 more 2025-07-22 8.8 High
Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2022-44692 1 Microsoft 6 365 Apps, Office, Office 2019 and 3 more 2025-07-22 7.8 High
Microsoft Office Graphics Remote Code Execution Vulnerability
CVE-2022-44690 1 Microsoft 6 Sharepoint Foundation, Sharepoint Foundation 2013, Sharepoint Server and 3 more 2025-07-22 8.8 High
Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2022-44688 1 Microsoft 1 Edge Chromium 2025-07-22 4.3 Medium
Microsoft Edge (Chromium-based) Spoofing Vulnerability
CVE-2022-44683 1 Microsoft 18 Windows 10, Windows 10 1507, Windows 10 1607 and 15 more 2025-07-22 7.8 High
Windows Kernel Elevation of Privilege Vulnerability
CVE-2022-44682 1 Microsoft 17 Windows 10, Windows 10 1507, Windows 10 1607 and 14 more 2025-07-22 6.8 Medium
Windows Hyper-V Denial of Service Vulnerability
CVE-2022-44681 1 Microsoft 22 Windows 10, Windows 10 1507, Windows 10 1607 and 19 more 2025-07-22 7.8 High
Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2022-44680 1 Microsoft 18 Windows 10, Windows 10 1507, Windows 10 1607 and 15 more 2025-07-22 7.8 High
Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2022-44679 1 Microsoft 18 Windows 10, Windows 10 1507, Windows 10 1607 and 15 more 2025-07-22 6.5 Medium
Windows Graphics Component Information Disclosure Vulnerability
CVE-2022-44678 1 Microsoft 22 Windows 10, Windows 10 1507, Windows 10 1607 and 19 more 2025-07-22 7.8 High
Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2022-44677 1 Microsoft 11 Windows 10, Windows 10 1809, Windows 10 20h2 and 8 more 2025-07-22 7.8 High
Windows Projected File System Elevation of Privilege Vulnerability
CVE-2022-44676 1 Microsoft 22 Windows 10, Windows 10 1507, Windows 10 1607 and 19 more 2025-07-22 8.1 High
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
CVE-2022-44675 1 Microsoft 21 Windows 10, Windows 10 1507, Windows 10 1607 and 18 more 2025-07-22 7.8 High
Windows Bluetooth Driver Elevation of Privilege Vulnerability
CVE-2022-44674 1 Microsoft 12 Windows 10, Windows 10 1809, Windows 10 20h2 and 9 more 2025-07-22 5.5 Medium
Windows Bluetooth Driver Information Disclosure Vulnerability
CVE-2022-44673 1 Microsoft 12 Windows 10, Windows 10 1507, Windows 10 1607 and 9 more 2025-07-22 7 High
Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability
CVE-2022-44668 1 Microsoft 21 Windows 10, Windows 10 1507, Windows 10 1607 and 18 more 2025-07-22 7.8 High
Windows Media Remote Code Execution Vulnerability
CVE-2022-44667 1 Microsoft 21 Windows 10, Windows 10 1507, Windows 10 1607 and 18 more 2025-07-22 7.8 High
Windows Media Remote Code Execution Vulnerability
CVE-2022-41127 1 Microsoft 11 Dynamics 365 Business Central, Dynamics 365 Business Central 2019, Dynamics 365 Business Central 2020 and 8 more 2025-07-22 8.5 High
Microsoft Dynamics NAV and Microsoft Dynamics 365 Business Central (On Premises) Remote Code Execution Vulnerability
CVE-2025-7326 1 Microsoft 1 Aspnetcore 2025-07-22 7 High
Weak authentication in EOL ASP.NET Core allows an unauthorized attacker to elevate privileges over a network. NOTE: This CVE affects only End Of Life (EOL) software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry.
CVE-2025-20259 2 Cisco, Microsoft 2 Thousandeyes Endpoint Agent, Windows 2025-07-22 5.3 Medium
Multiple vulnerabilities in the update process of Cisco ThousandEyes Endpoint Agent for Windows could allow an authenticated, local attacker to delete arbitrary files on an affected device. These vulnerabilities are due to improper access controls on files that are in the local file system. An attacker could exploit these vulnerabilities by using a symbolic link to perform an agent upgrade that redirects the delete operation of any protected file. A successful exploit could allow the attacker to delete arbitrary files from the file system of the affected device.