Page 117 of 8642 results (0.020 seconds)

CVSS: 7.7EPSS: 0%CPEs: -EXPL: 0

Certain HP software packages (SoftPaqs) are potentially vulnerable to arbitrary code execution when the SoftPaq configuration file has been modified after extraction. • https://support.hp.com/us-en/document/ish_10502451-10502508-16/hpsbhf03931 •

CVSS: 5.9EPSS: 0%CPEs: -EXPL: 0

Opening a specially crafted project file may lead to arbitrary code execution. • https://jvn.jp/en/vu/JVNVU98274902 https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2024-002_en.pdf •

CVSS: 8.8EPSS: 0%CPEs: -EXPL: 0

If the unchecked input above is attacker-controlled and crosses a security boundary, the impact of the buffer overflow vulnerability could range from denial of service to arbitrary code execution. • http://seclists.org/fulldisclosure/2024/May/7 http://www.openwall.com/lists/oss-security/2024/05/07/3 https://github.com/RIOT-OS/RIOT/blob/master/pkg/nimble/scanlist/nimble_scanlist.c#L74-L87 https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-899m-q6pp-hmp3 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 9.8EPSS: 0%CPEs: -EXPL: 0

If the input above is attacker-controlled and crosses a security boundary, the impact of the buffer overflow vulnerabilities could range from denial of service to arbitrary code execution. • http://seclists.org/fulldisclosure/2024/May/7 http://www.openwall.com/lists/oss-security/2024/05/07/3 https://github.com/RIOT-OS/RIOT/blob/master/sys/net/application_layer/gcoap/dns.c#L319-L325 https://github.com/RIOT-OS/RIOT/blob/master/sys/net/application_layer/gcoap/forward_proxy.c#L352 https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-v97j-w9m6-c4h3 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 8.3EPSS: 0%CPEs: -EXPL: 0

If the unchecked input above is attacker-controlled and crosses a security boundary, the impact of the buffer overflow vulnerability could range from denial of service to arbitrary code execution. • http://seclists.org/fulldisclosure/2024/May/7 http://www.openwall.com/lists/oss-security/2024/05/07/3 https://github.com/RIOT-OS/RIOT/blob/master/sys/net/application_layer/cord/lc/cord_lc.c#L218 https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-2572-7q7c-3965 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •