Vulnerabilities (CVE)

CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-40754 2 Adobe, Microsoft 2 After Effects, Windows 2022-04-25 9.3 HIGH 7.8 HIGH
Adobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.
CVE-2021-40753 2 Adobe, Microsoft 2 After Effects, Windows 2022-04-25 9.3 HIGH 7.8 HIGH
Adobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious SVG file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.
CVE-2021-40752 2 Adobe, Microsoft 2 After Effects, Windows 2022-04-25 9.3 HIGH 7.8 HIGH
Adobe After Effects version 18.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .m4a file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.
CVE-2021-40751 2 Adobe, Microsoft 2 After Effects, Windows 2022-04-25 9.3 HIGH 7.8 HIGH
Adobe After Effects version 18.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .m4a file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.
CVE-2021-40733 2 Adobe, Microsoft 2 Animate, Windows 2022-04-25 9.3 HIGH 7.8 HIGH
Adobe Animate version 21.0.9 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .psd file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
CVE-2021-43012 2 Adobe, Microsoft 2 Prelude, Windows 2022-04-25 9.3 HIGH 7.8 HIGH
Adobe Prelude version 10.1 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious M4A file.
CVE-2021-43011 2 Adobe, Microsoft 2 Prelude, Windows 2022-04-25 9.3 HIGH 7.8 HIGH
Adobe Prelude version 10.1 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious M4A file.
CVE-2021-42723 2 Adobe, Microsoft 2 Premiere Pro, Windows 2022-04-25 9.3 HIGH 7.8 HIGH
Adobe Bridge version 11.1.1 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted SGI file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2022-26788 1 Microsoft 8 Windows 10, Windows 11, Windows 8.1 and 5 more 2022-04-25 4.6 MEDIUM 7.8 HIGH
PowerShell Elevation of Privilege Vulnerability.
CVE-2022-27530 1 Autodesk 10 Advance Steel, Autocad, Autocad Architecture and 7 more 2022-04-25 6.8 MEDIUM 7.8 HIGH
A maliciously crafted TIF or PICT file in Autodesk AutoCAD 2022, 2021, 2020, 2019 can be used to write beyond the allocated buffer through Buffer overflow vulnerability. This vulnerability may be exploited to execute arbitrary code.
CVE-2022-27529 1 Autodesk 10 Advance Steel, Autocad, Autocad Architecture and 7 more 2022-04-25 6.8 MEDIUM 7.8 HIGH
A maliciously crafted PICT, BMP, PSD or TIF file in Autodesk AutoCAD 2022, 2021, 2020, 2019 may be used to write beyond the allocated buffer while parsing PICT, BMP, PSD or TIF file. This vulnerability may be exploited to execute arbitrary code.
CVE-2022-27526 1 Autodesk 1 Design Review 2022-04-25 6.8 MEDIUM 7.8 HIGH
A malicious crafted TGA file when consumed through DesignReview.exe application could lead to memory corruption vulnerability. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
CVE-2022-27525 1 Autodesk 1 Design Review 2022-04-25 6.8 MEDIUM 7.8 HIGH
A malicious crafted .dwf file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current proces.
CVE-2022-28109 1 Selenium 1 Selenium Grid 2022-04-25 6.8 MEDIUM 8.8 HIGH
Selenium Selenium Grid (formerly Selenium Standalone Server) Fixed in 4.0.0-alpha-7 is affected by: DNS rebinding. The impact is: execute arbitrary code (remote). The component is: WebDriver endpoint of Selenium Grid / Selenium Standalone Server. The attack vector is: Triggered by browsing to to a malicious remote web server. The WebDriver endpoint of Selenium Server (Grid) is vulnerable to DNS rebinding. This can be used to execute arbitrary code on the machine.
CVE-2022-20679 1 Cisco 1 Ios Xe 2022-04-25 6.8 MEDIUM 7.7 HIGH
A vulnerability in the IPSec decryption routine of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to buffer exhaustion that occurs while traffic on a configured IPsec tunnel is being processed. An attacker could exploit this vulnerability by sending traffic to an affected device that has a maximum transmission unit (MTU) of 1800 bytes or greater. A successful exploit could allow the attacker to cause the device to reload. To exploit this vulnerability, the attacker may need access to the trusted network where the affected device is in order to send specific packets to be processed by the device. All network devices between the attacker and the affected device must support an MTU of 1800 bytes or greater. This access requirement could limit the possibility of a successful exploit.
CVE-2022-24549 1 Microsoft 5 Windows 10, Windows 11, Windows Server 2016 and 2 more 2022-04-25 4.6 MEDIUM 7.8 HIGH
Windows AppX Package Manager Elevation of Privilege Vulnerability.
CVE-2022-24547 1 Microsoft 8 Windows 10, Windows 11, Windows 8.1 and 5 more 2022-04-25 4.6 MEDIUM 7.8 HIGH
Windows Digital Media Receiver Elevation of Privilege Vulnerability.
CVE-2022-24546 1 Microsoft 5 Windows 10, Windows 11, Windows Server 2016 and 2 more 2022-04-25 4.6 MEDIUM 7.8 HIGH
Windows DWM Core Library Elevation of Privilege Vulnerability.
CVE-2022-21159 1 Mz-automation 1 Libiec61850 2022-04-25 5.0 MEDIUM 7.5 HIGH
A denial of service vulnerability exists in the parseNormalModeParameters functionality of MZ Automation GmbH libiec61850 1.5.0. A specially-crafted series of network requests can lead to denial of service. An attacker can send a sequence of malformed iec61850 messages to trigger this vulnerability.
CVE-2022-27043 1 Yearning 1 Yearning 2022-04-25 5.0 MEDIUM 7.5 HIGH
Yearning versions 2.3.1 and 2.3.2 Interstellar GA and 2.3.4 - 2.3.6 Neptune is vulnerable to Directory Traversal.
CVE-2022-24544 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2022-04-25 4.6 MEDIUM 7.8 HIGH
Windows Kerberos Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-24486.
CVE-2022-24543 1 Microsoft 1 Windows Upgrade Assistant 2022-04-25 6.8 MEDIUM 7.8 HIGH
Windows Upgrade Assistant Remote Code Execution Vulnerability.
CVE-2022-24542 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2022-04-25 4.6 MEDIUM 7.8 HIGH
Windows Win32k Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-24474.
CVE-2021-3624 2 Dcraw Project, Debian 2 Dcraw, Debian Linux 2022-04-25 9.3 HIGH 7.8 HIGH
There is an integer overflow vulnerability in dcraw. When the victim runs dcraw with a maliciously crafted X3F input image, arbitrary code may be executed in the victim's system.
CVE-2022-24541 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2022-04-25 9.3 HIGH 8.8 HIGH
Windows Server Service Remote Code Execution Vulnerability.
CVE-2022-24540 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2022-04-25 4.4 MEDIUM 7.0 HIGH
Windows ALPC Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-24482.
CVE-2022-24534 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2022-04-25 5.1 MEDIUM 7.5 HIGH
Win32 Stream Enumeration Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21983.
CVE-2022-20678 1 Cisco 25 Asr 1001-x, Asr 1002-x, Catalyst 8000v Edge and 22 more 2022-04-25 7.8 HIGH 7.5 HIGH
A vulnerability in the AppNav-XE feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to the incorrect handling of certain TCP segments. An attacker could exploit this vulnerability by sending a stream of crafted TCP traffic at a high rate through an interface of an affected device. That interface would need to have AppNav interception enabled. A successful exploit could allow the attacker to cause the device to reload.
CVE-2022-22189 1 Juniper 1 Contrail Service Orchestration 2022-04-25 7.2 HIGH 7.8 HIGH
An Incorrect Ownership Assignment vulnerability in Juniper Networks Contrail Service Orchestration (CSO) allows a locally authenticated user to have their permissions elevated without authentication thereby taking control of the local system they are currently authenticated to. This issue affects: Juniper Networks Contrail Service Orchestration 6.0.0 versions prior to 6.0.0 Patch v3 on On-premises installations. This issue does not affect Juniper Networks Contrail Service Orchestration On-premises versions prior to 6.0.0.
CVE-2021-40426 1 Libsox Project 1 Libsox 2022-04-25 6.8 MEDIUM 8.8 HIGH
A heap-based buffer overflow vulnerability exists in the sphere.c start_read() functionality of Sound Exchange libsox 14.4.2 and master commit 42b3557e. A specially-crafted file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
CVE-2021-35380 1 Solari 1 Termtalk Server 2022-04-25 5.0 MEDIUM 7.5 HIGH
A Directory Traversal vulnerability exists in Solari di Udine TermTalk Server (TTServer) 3.24.0.2, which lets an unauthenticated malicious user gain access to the files on the remote system by gaining access to the relative path of the file they want to download (http://url:port/file?valore).
CVE-2022-27426 1 Chamilo 1 Chamilo Lms 2022-04-25 6.5 MEDIUM 8.8 HIGH
A Server-Side Request Forgery (SSRF) in Chamilo LMS v1.11.13 allows attackers to enumerate the internal network and execute arbitrary system commands via a crafted Phar file.
CVE-2021-40366 1 Siemens 2 Climatix Pol909, Climatix Pol909 Firmware 2022-04-24 5.8 MEDIUM 7.4 HIGH
A vulnerability has been identified in Climatix POL909 (AWB module) (All versions < V11.42), Climatix POL909 (AWM module) (All versions < V11.34). The web server of affected devices transmits data without TLS encryption. This could allow an unauthenticated remote attacker in a man-in-the-middle position to read sensitive data, such as administrator credentials, or modify data in transit.
CVE-2021-33626 2 Insyde, Siemens 33 Insydeh2o, Ruggedcom Apr1808, Ruggedcom Apr1808 Firmware and 30 more 2022-04-24 4.6 MEDIUM 7.8 HIGH
A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution.
CVE-2021-25162 2 Arubanetworks, Siemens 3 Instant, Scalance W1750d, Scalance W1750d Firmware 2022-04-22 9.3 HIGH 8.1 HIGH
A remote execution of arbitrary commands vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x: 6.5.4.18 and below; Aruba Instant 8.3.x: 8.3.0.14 and below; Aruba Instant 8.5.x: 8.5.0.11 and below; Aruba Instant 8.6.x: 8.6.0.7 and below; Aruba Instant 8.7.x: 8.7.1.1 and below. Aruba has released patches for Aruba Instant that address this security vulnerability.
CVE-2022-0557 1 Microweber 1 Microweber 2022-03-01 9.3 HIGH 7.8 HIGH
OS Command Injection in Packagist microweber/microweber prior to 1.2.11.
CVE-2016-20013 2 Sha256crypt Project, Sha512crypt Project 2 Sha256crypt, Sha2512crypt 2022-03-01 5.0 MEDIUM 7.5 HIGH
sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password.
CVE-2022-0409 1 Showdoc 1 Showdoc 2022-03-01 6.8 MEDIUM 7.8 HIGH
Unrestricted Upload of File with Dangerous Type in Packagist showdoc/showdoc prior to 2.10.2.
CVE-2021-4093 4 Canonical, Fedoraproject, Linux and 1 more 4 Ubuntu Linux, Fedora, Linux Kernel and 1 more 2022-03-01 7.2 HIGH 8.8 HIGH
A flaw was found in the KVM's AMD code for supporting the Secure Encrypted Virtualization-Encrypted State (SEV-ES). A KVM guest using SEV-ES can trigger out-of-bounds reads and writes in the host kernel via a malicious VMGEXIT for a string I/O instruction (for example, outs or ins) using the exit reason SVM_EXIT_IOIO. This issue results in a crash of the entire system or a potential guest-to-host escape scenario.
CVE-2021-4091 2 Port389, Redhat 8 389-ds-base, Enterprise Linux Desktop, Enterprise Linux For Ibm Z Systems and 5 more 2022-03-01 5.0 MEDIUM 7.5 HIGH
A double-free was found in the way 389-ds-base handles virtual attributes context in persistent searches. An attacker could send a series of search requests, forcing the server to behave unexpectedly, and crash.
CVE-2021-44968 1 Iobit 1 Advanced Systemcare 2022-03-01 7.2 HIGH 7.8 HIGH
A Use after Free vulnerability exists in IOBit Advanced SystemCare 15 pro via requests sent in sequential order using the IOCTL driver codes, which could let a malicious user execute arbitrary code or a Denial of Service (system crash). IOCTL list: iobit_ioctl = [0x8001e01c, 0x8001e020, 0x8001e024, 0x8001e040,0x8001e044, 0x8001e048, 0x8001e04c, 0x8001e000, 0x8001e004, 0x8001e008, 0x8001e00c, 0x8001e010, 0x8001e014, 0x8001e018]
CVE-2022-0630 1 Mruby 1 Mruby 2022-02-28 5.8 MEDIUM 7.1 HIGH
Out-of-bounds Read in Homebrew mruby prior to 3.2.
CVE-2021-30547 4 Debian, Fedoraproject, Google and 1 more 4 Debian Linux, Fedora, Chrome and 1 more 2022-02-28 6.8 MEDIUM 8.8 HIGH
Out of bounds write in ANGLE in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
CVE-2021-40159 1 Autodesk 1 Inventor 2022-02-28 6.8 MEDIUM 7.8 HIGH
An Information Disclosure vulnerability for JT files in Autodesk Inventor 2022, 2021, 2020, 2019 may lead to code execution through maliciously crafted JT files.
CVE-2022-0255 1 Deliciousbrains 1 Database Backup 2022-02-28 6.5 MEDIUM 7.2 HIGH
The Database Backup for WordPress plugin before 2.5.1 does not properly sanitise and escape the fragment parameter before using it in a SQL statement in the admin dashboard, leading to a SQL injection issue
CVE-2022-0228 1 Sygnoos 1 Popup Builder 2022-02-28 6.5 MEDIUM 7.2 HIGH
The Popup Builder WordPress plugin before 4.0.7 does not validate and properly escape the orderby and order parameters before using them in a SQL statement in the admin dashboard, which could allow high privilege users to perform SQL injection
CVE-2021-39312 1 Trueranker 1 True Ranker 2022-02-28 5.0 MEDIUM 7.5 HIGH
The True Ranker plugin <= 2.2.2 for WordPress allows arbitrary files, including sensitive configuration files such as wp-config.php, to be accessed via the src parameter found in the ~/admin/vendor/datatables/examples/resources/examples.php file.
CVE-2022-0134 1 Bologer 1 Anycomment 2022-02-28 6.8 MEDIUM 8.8 HIGH
The AnyComment WordPress plugin before 0.2.18 does not have CSRF checks in the Import and Revert HyperComments features, allowing attackers to make logged in admin perform such actions via a CSRF attack
CVE-2021-4208 1 Exportfeed 1 Exportfeed 2022-02-28 6.5 MEDIUM 7.2 HIGH
The ExportFeed WordPress plugin through 2.0.1.0 does not sanitise and escape the product_id POST parameter before using it in a SQL statement, leading to a SQL injection vulnerability exploitable by high privilege users
CVE-2022-24362 2 Foxit, Microsoft 3 Pdf Editor, Pdf Reader, Windows 2022-02-28 6.8 MEDIUM 8.8 HIGH
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.1.0.52543. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15987.