CVE-2021-4066
Summary: Integer underflow in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption...
Summary: Integer underflow in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption...
Summary: Use after free in window manager in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to...
Summary: Use after free in window manager in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to...
Summary: Use after free in window manager in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to...
Summary: Use after free in window manager in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to...
Summary: Type confusion in V8 in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption...
Summary: Out of bounds write in WebRTC in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit...
Summary: Out of bounds write in WebRTC in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit...
Summary: In Ultimaker S3 3D printer, Ultimaker S5 3D printer, Ultimaker 3 3D printer S-line through 6.3 and Ultimaker 3...
Summary: The HwNearbyMain module has a Improper Validation of Array Index vulnerability.Successful exploitation of this vulnerability may cause a process...
Summary: A link following denial-of-service vulnerability in Trend Micro Worry-Free Business Security (on prem only) could allow a local attacker...
Summary: Microsoft Excel Remote Code Execution Vulnerability. Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21841 CVSS Score (if available) v2: / HIGH v3: /...
Summary: A origin validation error vulnerability in Trend Micro Apex One (on-prem and SaaS) could allow a local attacker drop...
Summary: There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. Reference Links(if...
Summary: There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may...
Summary: There is a Double free vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect...
Summary: Telephony application has a SQL Injection vulnerability.Successful exploitation of this vulnerability may cause privacy and security issues. Reference Links(if...
Summary: HwPCAssistant has a Improper Input Validation vulnerability.Successful exploitation of this vulnerability may create any file with the system app...
Summary: Possible assertion due to lack of input validation in PUSCH configuration in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon...
Summary: Possible out of bound access due to improper validation of item size and DIAG memory pools data while switching...
Summary: Possible buffer overflow due to lack of buffer length check when segmented WMI command is received in Snapdragon Auto,...
Summary: Yappli is an application development platform which provides the function to access a requested URL using Custom URL Scheme....
Summary: Possible assertion in QOS request due to improper validation when multiple add or update request are received simultaneously in...
Summary: Netgear RAX43 version 1.0.3.96 contains a command injection vulnerability. The readycloud cgi application is vulnerable to command injection in...