CVE-2022-21664
Summary: WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. Due...
Summary: WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. Due...
Summary: Use after free in autofill in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap...
Summary: Use after free in autofill in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap...
Summary: Use after free in autofill in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap...
Summary: Use after free in autofill in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap...
Summary: Integer underflow in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption...
Summary: Integer underflow in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption...
Summary: Integer underflow in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption...
Summary: Use after free in window manager in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to...
Summary: Use after free in window manager in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to...
Summary: Use after free in window manager in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to...
Summary: Use after free in window manager in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to...
Summary: Type confusion in V8 in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption...
Summary: Out of bounds write in WebRTC in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit...
Summary: Out of bounds write in WebRTC in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit...
Summary: In Ultimaker S3 3D printer, Ultimaker S5 3D printer, Ultimaker 3 3D printer S-line through 6.3 and Ultimaker 3...
Summary: The HwNearbyMain module has a Improper Validation of Array Index vulnerability.Successful exploitation of this vulnerability may cause a process...
Summary: A link following denial-of-service vulnerability in Trend Micro Worry-Free Business Security (on prem only) could allow a local attacker...
Summary: Microsoft Excel Remote Code Execution Vulnerability. Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21841 CVSS Score (if available) v2: / HIGH v3: /...
Summary: A origin validation error vulnerability in Trend Micro Apex One (on-prem and SaaS) could allow a local attacker drop...
Summary: There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. Reference Links(if...
Summary: There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may...
Summary: There is a Double free vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect...
Summary: Telephony application has a SQL Injection vulnerability.Successful exploitation of this vulnerability may cause privacy and security issues. Reference Links(if...