Page 118 of 8650 results (0.019 seconds)

CVSS: 5.9EPSS: 0%CPEs: -EXPL: 0

An issue in kubevirt kubevirt v1.2.0 and before allows a local attacker to execute arbitrary code via a crafted command to get the token component. Un problema en kubevirt kubevirt v1.2.0 y anteriores permite a un atacante local ejecutar código arbitrario mediante un comando manipulado para obtener el componente token. • https://gist.github.com/HouqiyuA/1b75e23ece7ad98490aec1c887bdf49b • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

A fallback mechanism in code sign checking on macOS may allow arbitrary code execution. • https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=macos&applicable_version=4.2 • CWE-347: Improper Verification of Cryptographic Signature •

CVSS: 7.7EPSS: 0%CPEs: -EXPL: 0

Certain HP software packages (SoftPaqs) are potentially vulnerable to arbitrary code execution when the SoftPaq configuration file has been modified after extraction. • https://support.hp.com/us-en/document/ish_10502451-10502508-16/hpsbhf03931 •

CVSS: 5.9EPSS: 0%CPEs: -EXPL: 0

Opening a specially crafted project file may lead to arbitrary code execution. • https://jvn.jp/en/vu/JVNVU98274902 https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2024-002_en.pdf •

CVSS: 8.8EPSS: 0%CPEs: -EXPL: 0

If the unchecked input above is attacker-controlled and crosses a security boundary, the impact of the buffer overflow vulnerability could range from denial of service to arbitrary code execution. • http://seclists.org/fulldisclosure/2024/May/7 http://www.openwall.com/lists/oss-security/2024/05/07/3 https://github.com/RIOT-OS/RIOT/blob/master/pkg/nimble/scanlist/nimble_scanlist.c#L74-L87 https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-899m-q6pp-hmp3 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •