CVE-2023-35949
https://notcve.org/view.php?id=CVE-2023-35949
An attacker can arbitrary code execution to trigger these vulnerabilities.This vulnerability exists within the code responsible for parsing geometric faces of an OFF file. • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784 https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1784 • CWE-121: Stack-based Buffer Overflow •
CVE-2024-28886
https://notcve.org/view.php?id=CVE-2024-28886
OS command injection vulnerability exists in UTAU versions prior to v0.4.19. If a user of the product opens a crafted UTAU project file (.ust file), an arbitrary OS command may be executed. La vulnerabilidad de inyección de comandos del sistema operativo existe en versiones de UTAU anteriores a la v0.4.19. Si un usuario del producto abre un archivo de proyecto UTAU manipulado (archivo .ust), se puede ejecutar un comando arbitrario del sistema operativo. • https://jvn.jp/en/jp/JVN71404925 https://utau2008.xrea.jp • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2024-5407 – Code Injection vulnerability in RhinOS from SaltOS
https://notcve.org/view.php?id=CVE-2024-5407
A vulnerability in RhinOS 3.0-1190 could allow PHP code injection through the "search" parameter in /portal/search.htm. • https://github.com/josepsanzcamp/RhinOS https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-rhinos-saltos • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2024-35339
https://notcve.org/view.php?id=CVE-2024-35339
Tenda FH1206 V1.2.0.8(8155) was discovered to contain a command injection vulnerability via the mac parameter at ip/goform/WriteFacMac. Se descubrió que Tenda FH1206 V1.2.0.8(8155) contiene una vulnerabilidad de inyección de comandos a través del parámetro mac en ip/goform/WriteFacMac. • https://palm-vertebra-fe9.notion.site/formWriteFacMac_RCE-d70cf636739e4a769b1f919ffed4a2a0 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2024-36361
https://notcve.org/view.php?id=CVE-2024-36361
Pug through 3.0.2 allows JavaScript code execution if an application accepts untrusted input for the name option of the compileClient, compileFileClient, or compileClientWithDependenciesTracked function. NOTE: these functions are for compiling Pug templates into JavaScript, and there would typically be no reason to allow untrusted callers. Pug hasta 3.0.2 permite la ejecución de código JavaScript si una aplicación acepta entradas que no son de confianza para la opción de nombre de la función compileClient, compileFileClient o compileClientWithDependenciesTracked. NOTA: estas funciones son para compilar plantillas de Pug en JavaScript y normalmente no habría motivo para permitir llamadas que no sean de confianza. • https://github.com/pugjs/pug/pull/3428 https://pugjs.org/api/reference.html • CWE-94: Improper Control of Generation of Code ('Code Injection') •