CVE-2021-41383
Summary: setup.cgi on NETGEAR R6020 1.0.0.48 devices allows an admin to execute arbitrary shell commands via shell metacharacters in the...
Summary: setup.cgi on NETGEAR R6020 1.0.0.48 devices allows an admin to execute arbitrary shell commands via shell metacharacters in the...
Summary: Libsixel 1.8.2 contains a heap-based buffer overflow in the dither_func_fs function in tosixel.c. Reference Links(if available): https://github.com/saitoha/libsixel/issues/114 CVSS Score...
Summary: Libsixel 1.8.2 contains a heap-based buffer overflow in the dither_func_fs function in tosixel.c. Reference Links(if available): https://github.com/saitoha/libsixel/issues/114 CVSS Score...
Summary: Libsixel 1.8.3 contains a heap-based buffer overflow in the sixel_encode_highcolor function in tosixel.c. Reference Links(if available): https://github.com/saitoha/libsixel/issues/116 CVSS Score...
Summary: Libsixel 1.8.3 contains a heap-based buffer overflow in the sixel_encode_highcolor function in tosixel.c. Reference Links(if available): https://github.com/saitoha/libsixel/issues/116 CVSS Score...
Summary: FFmpeg
Summary: Improper privilege management vulnerability in maconfig for McAfee Agent for Windows prior to 5.7.4 allows a local user to...
Summary: Use-after-free vulnerability in kernel graphics driver because of storing an invalid pointer in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial...
Summary: SAP Business One, version - 10.0, allows a local attacker with access to the victim's browser under certain circumstances,...
Summary: SAP Business One, version - 10.0, allows an attacker with business authorization to upload any files (including script files)...
Summary: SAP Cloud Connector, version - 2.0, allows the upload of zip files as backup. This backup file can be...
Summary: The Service Layer of SAP Business One, version - 10.0, allows an authenticated attacker to invoke certain functions that...
Summary: Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to a stack-based buffer overflow condition in...
Summary: Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to a stack-based buffer overflow condition in...
Summary: Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to a stack-based buffer overflow condition in...
Summary: Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to a stack-based buffer overflow condition in...
Summary: Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to a stack-based buffer overflow condition in...
Summary: Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to a stack-based buffer overflow condition in...
Summary: Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to a stack-based buffer overflow condition in...
Summary: Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to a stack-based buffer overflow condition in...
Summary: Multiple camera devices by UDP Technology, Geutebrück and other vendors allow unauthenticated remote access to sensitive files due to...
Summary: Multiple camera devices by UDP Technology, Geutebrück and other vendors allow unauthenticated remote access to sensitive files due to...
Summary: Multiple camera devices by UDP Technology, Geutebrück and other vendors allow unauthenticated remote access to sensitive files due to...
Summary: u'Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2...