| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Microsoft ActiveX Remote Code Execution Vulnerability |
| Microsoft Excel Information Disclosure Vulnerability |
| Microsoft Outlook Remote Code Execution Vulnerability |
| GDI+ Remote Code Execution Vulnerability |
| Microsoft Outlook Remote Code Execution Vulnerability |
| Microsoft Office OneNote Remote Code Execution Vulnerability |
| Microsoft Excel Security Feature Bypass Vulnerability |
| Microsoft Jet Red Database Engine and Access Connectivity Engine Elevation of Privilege Vulnerability |
| Microsoft Office Trust Center Spoofing Vulnerability |
| Microsoft Office Graphics Remote Code Execution Vulnerability |
| External control of file name or path in Microsoft Office Word allows an unauthorized attacker to disclose information over a network. |
| Microsoft Word Security Feature Bypass Vulnerability |
| Microsoft Excel Spoofing Vulnerability |
| Microsoft Excel Remote Code Execution Vulnerability |
| In ScadaBR version 1.2.0, a Missing Authentication for Critical Function vulnerability could allow an unauthenticated attacker to send a HTTP GET requests to the SCADA system and inject arbitrary sensor readings. |
| Sandbox escape in the Profile Backup component. This vulnerability was fixed in Firefox 150.0.3, Firefox ESR 115.36, Firefox ESR 140.11, and Thunderbird 140.11. |
| In ScadaBR version 1.2.0, an OS Command Injection vulnerability could allow an attacker to execute commands as root on the SCADA system. |
| In ScadaBR version 1.2.0, a CSRF vulnerability could allow an attacker to trigger any authenticated action through a victim's session by luring any logged-in user to a malicious webpage. |
| In ScadaBR version 1.2.0, a Use of Hard-Coded Credentials vulnerability could allow an attacker to access the SCADA system as admin. |
| Kitty is a cross-platform GPU based terminal. Versions 0.46.2 and below contain a heap buffer overflow in load_image_data() that allows any process which can write to the terminal's stdin to crash kitty immediately. The vulnerability is triggered by a single APC graphics protocol command with a PNG format declaration (f=100) whose payload exceeds twice the initial buffer capacity. The overflow is attacker-controlled in both length and content, causing DoS and potentially escalation to RCE itself. This issue has been fixed in version 0.47.0. |