Arkha-Corvus

3 exploits Active since Jun 2022
CVE-2023-22515 NOMISEC CRITICAL WRITEUP
Atlassian Confluence Unauthenticated Remote Code Execution
Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
1 stars
CVSS 9.8
CVE-2025-21298 GITHUB CRITICAL WRITEUP
Microsoft Windows 10 1507 < 10.0.10240.20890 - Use After Free
Windows OLE Remote Code Execution Vulnerability
CVSS 9.8
CVE-2022-30190 NOMISEC HIGH WRITEUP
Microsoft Office Word MSDTJS
A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights. Please see the MSRC Blog Entry for important information about steps you can take to protect your system from this vulnerability.
CVSS 7.8