Select products in your organisation uses. When a vulnerability is identified in one, we'll automatically alert you.
Receive CVE alerts and vulnerability alert matched to your software stack. Register
|Published Date||Severity||CVE Title||Description|
|March 27, 2022, 1:15 a.m.||CVE-2022-26205||Marky commit 3686565726c65756e was discovered to contain a remote code execution (RCE) vulnerability via the Display text fields. This vulnerability allows attackers to execute arbitrary code via injection of a crafted payload.|
|March 27, 2022, 12:15 a.m.||CVE-2022-26198||Notable v1.8.4 does not filter text editing, allowing attackers to execute arbitrary code via a crafted payload injected into the Title text field.|
|March 27, 2022, 12:15 a.m.||CVE-2022-26620||Akeo Consulting Rufus Executable 3.17.1846 and Rufus Portable Executable 3.17p were discovered to allow attackers to execute arbitrary code or escalate privileges via placing a crafted x86 DLL in the same directory as other executables.|
|March 27, 2022, 12:15 a.m.||CVE-2022-26200||Technitium Installer v4.4 was discovered to allow attackers to execute arbitrary code or escalate privileges via placing a crafted DLL in the same directory as the current installer.|
|March 26, 2022, 5:15 p.m.||CVE-2022-27946||NETGEAR R8500 22.214.171.124 devices allow remote authenticated users to execute arbitrary commands (such as telnetd) via shell metacharacters in the sysNewPasswd and sysConfirmPasswd parameters to admin_account.cgi.|
Update product stack:
Add new products in your stack.
Showing the first 50 of the search results. Please improve your search query.
Your current product stack:
To remove a product, click it.