A vulnerability, which was classified as critical, has been found in PicoC 3.2.2. Affected by this issue is the function ExpressionCoerceInteger of the file expression.c. The manipulation leads to heap-based buffer overflow.
This vulnerability is handled as CVE-2022-44312. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in PicoC 3.2.2. This affects the function ExpressionCoerceUnsignedInteger of the file expression.c. The manipulation leads to heap-based buffer overflow.
This vulnerability is uniquely identified as CVE-2022-44313. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability has been found in PicoC 3.2.2 and classified as critical. This vulnerability affects the function ExpressionCoerceFP of the file expression.c. The manipulation leads to heap-based buffer overflow.
This vulnerability was named CVE-2022-44320. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in PicoC 3.2.2. It has been classified as critical. Affected is the function StringStrncpy in the library cstdlib/string.c. The manipulation leads to heap-based buffer overflow.
This vulnerability is traded as CVE-2022-44314. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability was found in PicoC 3.2.2. It has been declared as critical. Affected by this vulnerability is the function ExpressionAssign of the file expression.c. The manipulation leads to heap-based buffer overflow.
This vulnerability is known as CVE-2022-44315. The attack can only be done within the local network. There is no exploit available.
A vulnerability was found in PicoC 3.2.2. It has been rated as critical. Affected by this issue is the function LexGetStringConstant of the file lex.c. The manipulation leads to heap-based buffer overflow.
This vulnerability is handled as CVE-2022-44316. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability, which was classified as critical, has been found in PicoC 3.2.2. This issue affects the function StdioBasePrintf in the library cstdlib/string.c. The manipulation leads to heap-based buffer overflow.
The identification of this vulnerability is CVE-2022-44319. Access to the local network is required for this attack. There is no exploit available.
A vulnerability, which was classified as critical, was found in PicoC 3.2.2. Affected is the function LexSkipComment of the file lex.c. The manipulation leads to heap-based buffer overflow.
This vulnerability is traded as CVE-2022-44321. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability was found in Huawei EMUI and Magic UI. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component DRM. The manipulation leads to denial of service.
This vulnerability is known as CVE-2022-44556. The attack needs to be done within the local network. There is no exploit available.
A vulnerability classified as problematic was found in Google Android. This vulnerability affects unknown code of the component VPU. The manipulation leads to information disclosure.
This vulnerability was named CVE-2022-21778. The attack needs to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as problematic, was found in Microsoft Windows. Affected is an unknown function of the component NTLM Hash Handler. The manipulation leads to file inclusion.
This vulnerability is traded as CVE-2025-24054. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
Ellis of YL Ventures on How Modern CISOs Must Lead, Not Master Every Discipline There were never many 'do everything' CISOs. Today there are even fewer. But with a specialist area, strong overview and ability to channel expertise, CISOs can align with business goals, embrace the business enabler role, demonstrate quick wins, and ensure their organization makes better risk decisions.
4 Breaches Appear to Potentially Affect Hundreds of Thousands Across Several States Catholic hospital chain Ascension Health is notifying hundreds of thousands of individuals across several states of at least four hacking incidents in recent months involving third-parties. Ascension reported one of the breaches this week, another in mid-April and the others in March and February.
CISA Staff Told to Prepare for Cuts and Crowded Work Locations Amid Growing Turmoil Top officials at the nation's cyber defense agency want to give President Donald Trump's pick to lead the agency time to assess major restructuring plans - a move that is reportedly delaying the timeline for reductions in force while causing growing concerns for job stability among staffers.
Retailer Continues to Recover From Ransomware Incident British retailer Marks & Spencer was reportedly targeted by financial crime group Scattered Spider, who deployed ransomware on the company's VMware ESXi server. The retailer continues to recover from a cyber incident that disrupted operations in its online and offline stores.