
CVE-2023-35952
https://notcve.org/view.php?id=CVE-2023-35952
28 May 2024 — An attacker can arbitrary code execution to trigger these vulnerabilities.This vulnerability exists within the code responsible for parsing comments within the geometric faces section within an OFF file. • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784 • CWE-121: Stack-based Buffer Overflow •

CVE-2023-35951
https://notcve.org/view.php?id=CVE-2023-35951
28 May 2024 — An attacker can arbitrary code execution to trigger these vulnerabilities.This vulnerability exists within the code responsible for parsing geometric vertices of an OFF file. • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784 • CWE-121: Stack-based Buffer Overflow •

CVE-2023-35950
https://notcve.org/view.php?id=CVE-2023-35950
28 May 2024 — An attacker can arbitrary code execution to trigger these vulnerabilities.This vulnerability exists within the code responsible for parsing the header of an OFF file. • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784 • CWE-121: Stack-based Buffer Overflow •

CVE-2023-35949
https://notcve.org/view.php?id=CVE-2023-35949
28 May 2024 — An attacker can arbitrary code execution to trigger these vulnerabilities.This vulnerability exists within the code responsible for parsing geometric faces of an OFF file. • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784 • CWE-121: Stack-based Buffer Overflow •

CVE-2024-28886
https://notcve.org/view.php?id=CVE-2024-28886
28 May 2024 — OS command injection vulnerability exists in UTAU versions prior to v0.4.19. If a user of the product opens a crafted UTAU project file (.ust file), an arbitrary OS command may be executed. La vulnerabilidad de inyección de comandos del sistema operativo existe en versiones de UTAU anteriores a la v0.4.19. Si un usuario del producto abre un archivo de proyecto UTAU manipulado (archivo .ust), se puede ejecutar un comando arbitrario del sistema operativo. • https://jvn.jp/en/jp/JVN71404925 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2024-5407 – Code Injection vulnerability in RhinOS from SaltOS
https://notcve.org/view.php?id=CVE-2024-5407
27 May 2024 — A vulnerability in RhinOS 3.0-1190 could allow PHP code injection through the "search" parameter in /portal/search.htm. • https://github.com/josepsanzcamp/RhinOS • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2024-35339
https://notcve.org/view.php?id=CVE-2024-35339
24 May 2024 — Tenda FH1206 V1.2.0.8(8155) was discovered to contain a command injection vulnerability via the mac parameter at ip/goform/WriteFacMac. Se descubrió que Tenda FH1206 V1.2.0.8(8155) contiene una vulnerabilidad de inyección de comandos a través del parámetro mac en ip/goform/WriteFacMac. • https://palm-vertebra-fe9.notion.site/formWriteFacMac_RCE-d70cf636739e4a769b1f919ffed4a2a0 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2024-36361
https://notcve.org/view.php?id=CVE-2024-36361
24 May 2024 — Pug through 3.0.2 allows JavaScript code execution if an application accepts untrusted input for the name option of the compileClient, compileFileClient, or compileClientWithDependenciesTracked function. NOTE: these functions are for compiling Pug templates into JavaScript, and there would typically be no reason to allow untrusted callers. Pug hasta 3.0.2 permite la ejecución de código JavaScript si una aplicación acepta entradas que no son de confianza para la opción de nombre de la función compileClient, ... • https://github.com/pugjs/pug/pull/3428 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2024-4037 – WP Photo Album Plus <= 8.7.02.003 - Unauthenticated Arbitrary Shortcode Execution
https://notcve.org/view.php?id=CVE-2024-4037
23 May 2024 — The WP Photo Album Plus plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 8.7.02.003. This is due to the plugin allowing unauthenticated users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. El complemento WP Photo Album Plus para WordPress es vulnerable a la ejecución arbitraria de códigos cortos en todas las versiones hasta ... • https://plugins.trac.wordpress.org/browser/wp-photo-album-plus/trunk/wppa-ajax.php#L1138 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2024-0867 – Email Log <= 2.4.8 - Unauthenticated Hook Injection
https://notcve.org/view.php?id=CVE-2024-0867
23 May 2024 — The Email Log plugin for WordPress is vulnerable to Unauthenticated Hook Injection in all versions up to, and including, 2.4.8 via the check_nonce function. This makes it possible for unauthenticated attackers to execute actions with hooks in WordPress under certain circumstances. The action the attacker wishes to execute needs to have a nonce check, and the nonce needs to be known to the attacker. Furthermore, the absence of a capability check is a requirement. El complemento Email Log para WordPress es vu... • https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3027872%40email-log&new=3027872%40email-log&sfp_email=&sfph_mail= • CWE-94: Improper Control of Generation of Code ('Code Injection') •