59 results (0.009 seconds)

CVSS: 6.4EPSS: %CPEs: 1EXPL: 0

The Fusion plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.6.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

HP Support Assistant uses HP Performance Tune-up as a diagnostic tool. HP Support Assistant uses Fusion to launch HP Performance Tune-up. It is possible for an attacker to exploit the DLL hijacking vulnerability and elevate privileges when Fusion launches the HP Performance Tune-up. HP Support Assistant utiliza HP Performance Tune-up como herramienta de diagnóstico. HP Support Assistant utiliza Fusion para iniciar HP Performance Tune-up. • https://support.hp.com/us-en/document/ish_6788123-6788147-16/hpsbhf03809 • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.8EPSS: 0%CPEs: 88EXPL: 0

A heap-based buffer overflow could occur while parsing TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code. Podría producirse un desbordamiento del búfer en la región heap de la memoria pila mientras son analizados archivos TIFF, PICT, TGA o RLC. Esta vulnerabilidad puede ser explotada para ejecutar código arbitrario • https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 88EXPL: 0

A maliciously crafted PNG file in Autodesk Image Processing component may be used to attempt to free an object that has already been freed while parsing them. This vulnerability may be exploited by attackers to execute arbitrary code. Un archivo PNG diseñado de forma maliciosa en el componente de procesamiento de imágenes de Autodesk puede usarse para intentar liberar un objeto que ya ha sido liberado mientras es analizado. Esta vulnerabilidad puede ser explotada por atacantes para ejecutar código arbitrario • https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011 • CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 88EXPL: 0

A Memory Corruption vulnerability may lead to code execution through maliciously crafted DLL files through Autodesk Image Processing component. Una vulnerabilidad de corrupción de memoria puede conllevar a una ejecución de código mediante archivos DLL diseñados de forma maliciosa por medio del componente de procesamiento de imágenes de Autodesk • https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011 • CWE-787: Out-of-bounds Write •