CVE-2021-4067
Summary: Use after free in window manager in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to...
Summary: Use after free in window manager in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to...
Summary: Type confusion in V8 in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption...
Summary: Out of bounds write in WebRTC in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit...
Summary: Out of bounds write in WebRTC in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit...
Summary: In Ultimaker S3 3D printer, Ultimaker S5 3D printer, Ultimaker 3 3D printer S-line through 6.3 and Ultimaker 3...
Summary: The HwNearbyMain module has a Improper Validation of Array Index vulnerability.Successful exploitation of this vulnerability may cause a process...
Summary: A link following denial-of-service vulnerability in Trend Micro Worry-Free Business Security (on prem only) could allow a local attacker...
Summary: Microsoft Excel Remote Code Execution Vulnerability. Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21841 CVSS Score (if available) v2: / HIGH v3: /...
Summary: A origin validation error vulnerability in Trend Micro Apex One (on-prem and SaaS) could allow a local attacker drop...
Summary: There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. Reference Links(if...
Summary: There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may...
Summary: There is a Double free vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect...
Summary: Telephony application has a SQL Injection vulnerability.Successful exploitation of this vulnerability may cause privacy and security issues. Reference Links(if...
Summary: HwPCAssistant has a Improper Input Validation vulnerability.Successful exploitation of this vulnerability may create any file with the system app...
Summary: Possible assertion due to lack of input validation in PUSCH configuration in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon...
Summary: Possible out of bound access due to improper validation of item size and DIAG memory pools data while switching...
Summary: Possible buffer overflow due to lack of buffer length check when segmented WMI command is received in Snapdragon Auto,...
Summary: Yappli is an application development platform which provides the function to access a requested URL using Custom URL Scheme....
Summary: Possible assertion in QOS request due to improper validation when multiple add or update request are received simultaneously in...
Summary: Netgear RAX43 version 1.0.3.96 contains a command injection vulnerability. The readycloud cgi application is vulnerable to command injection in...
Summary: The Download Monitor WordPress plugin before 4.4.5 does not properly validate and escape the "orderby" GET parameter before using...
Summary: An integer overflow due to improper check performed after the address and size passed are aligned in Snapdragon Compute,...
Summary: An issue was discovered in Stormshield Network Security (SNS) 4.2.2 through 4.2.7 (fixed in 4.2.8). Under a specific update-migration...
Summary: In the IPv6 implementation in the Linux kernel before 5.13.3, net/ipv6/output_core.c has an information leak because of certain use...