‼ CVE-2022-23186 ‼
📖 Read
via "National Vulnerability Database".
Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-23803 ‼
📖 Read
via "National Vulnerability Database".
A stack-based buffer overflow vulnerability exists in the Gerber Viewer gerber and excellon ReadXYCoord coordinate parsing functionality of KiCad EDA 6.0.1 and master commit de006fc010. A specially-crafted gerber or excellon file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-39300 ‼
📖 Read
via "National Vulnerability Database".
Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0617 ‼
📖 Read
via "National Vulnerability Database".
A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-21958 ‼
📖 Read
via "National Vulnerability Database".
A heap-based buffer overflow vulnerability exists in the Hword HwordApp.dll functionality of Hancom Office 2020 11.0.0.2353. A specially-crafted malformed file can lead to memory corruption and potential arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-24663 ‼
📖 Read
via "National Vulnerability Database".
PHP Everywhere <= 2.0.3 included functionality that allowed execution of PHP Code Snippets via WordPress shortcodes, which can be used by any authenticated user.📖 Read
via "National Vulnerability Database".
‼ CVE-2019-4351 ‼
📖 Read
via "National Vulnerability Database".
IBM Maximo Anywhere 7.6.4.0 applications could disclose sensitive information to a user with physical access to the device. IBM X-Force ID: 161493.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-22041 ‼
📖 Read
via "National Vulnerability Database".
VMware ESXi, Workstation, and Fusion contain a double-fetch vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-22050 ‼
📖 Read
via "National Vulnerability Database".
ESXi contains a slow HTTP POST denial-of-service vulnerability in rhttpproxy. A malicious actor with network access to ESXi may exploit this issue to create a denial-of-service condition by overwhelming rhttpproxy service with multiple requests.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-6922 ‼
📖 Read
via "National Vulnerability Database".
Potential security vulnerabilities including compromise of integrity, and allowed communication with untrusted clients has been identified in HP Support Assistant software.📖 Read
via "National Vulnerability Database".
‼ CVE-2019-4291 ‼
📖 Read
via "National Vulnerability Database".
IBM Maximo Anywhere 7.6.4.0 could allow an attacker to reverse engineer the application due to the lack of binary protection precautions. IBM X-Force ID: 160697.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-3557 ‼
📖 Read
via "National Vulnerability Database".
A flaw was found in argocd. Any unprivileged user is able to deploy argocd in their namespace and with the created ServiceAccount argocd-argocd-server, the unprivileged user is able to read all resources of the cluster including all secrets which might enable privilege escalations. The highest threat from this vulnerability is to data confidentiality.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-23194 ‼
📖 Read
via "National Vulnerability Database".
Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-23804 ‼
📖 Read
via "National Vulnerability Database".
A stack-based buffer overflow vulnerability exists in the Gerber Viewer gerber and excellon ReadIJCoord coordinate parsing functionality of KiCad EDA 6.0.1 and master commit de006fc010. A specially-crafted gerber or excellon file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-23199 ‼
📖 Read
via "National Vulnerability Database".
Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-6921 ‼
📖 Read
via "National Vulnerability Database".
Potential security vulnerabilities including compromise of integrity, and allowed communication with untrusted clients has been identified in HP Support Assistant software.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-39301 ‼
📖 Read
via "National Vulnerability Database".
Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-4106 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in Snow Inventory Java Scanner allows an attacker to run malicious code at a higher level of privileges. This issue affects: SNOW Snow Inventory Java Scanner 1.0📖 Read
via "National Vulnerability Database".
‼ CVE-2021-22042 ‼
📖 Read
via "National Vulnerability Database".
VMware ESXi contains an unauthorized access vulnerability due to VMX having access to settingsd authorization tickets. A malicious actor with privileges within the VMX process only, may be able to access settingsd service running as a high privileged user.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-23202 ‼
📖 Read
via "National Vulnerability Database".
Adobe Creative Cloud Desktop version 2.7.0.13 (and earlier) is affected by an Uncontrolled Search Path Element vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must download a malicious DLL file. The attacker has to deliver the DLL on the same folder as the installer which makes it as a high complexity attack vector.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-23203 ‼
📖 Read
via "National Vulnerability Database".
Adobe Photoshop versions 22.5.4 (and earlier) and 23.1 (and earlier) are affected by a buffer overflow vulnerability due to insecure handling of a crafted file, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file in Photoshop.📖 Read
via "National Vulnerability Database".