Page 267 of 8676 results (0.059 seconds)

CVSS: 9.8EPSS: 3%CPEs: 1EXPL: 2

The Imou Life com.mm.android.smartlifeiot application through 6.8.0 for Android allows Remote Code Execution via a crafted intent to an exported component. This relates to the com.mm.android.easy4ip.MainActivity activity. JavaScript execution is enabled in the WebView, and direct web content loading occurs. La aplicación Imou Life com.mm.android.smartlifeiot hasta 6.8.0 para Android permite la ejecución remota de código a través de una intención manipulada para un componente exportado. Esto se relaciona con la actividad com.mm.android.easy4ip.MainActivity. • https://github.com/actuator/cve/blob/main/CVE-2023-42470 https://github.com/actuator/imou/blob/main/imou-life-6.8.0.md https://github.com/actuator/imou/blob/main/poc.apk • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 2

The wave.ai.browser application through 1.0.35 for Android allows a remote attacker to execute arbitrary JavaScript code via a crafted intent. It contains a manifest entry that exports the wave.ai.browser.ui.splash.SplashScreen activity. This activity uses a WebView component to display web content and doesn't adequately validate or sanitize the URI or any extra data passed in the intent by a third party application (with no permissions). La aplicación wave.ai.browser hasta la versión 1.0.35 para Android permite a un atacante remoto ejecutar código JavaScript arbitrario mediante un intento manipulado. Contiene una entrada de manifiesto que exporta la actividad wave.ai.browser.ui.splash.SplashScreen. • https://github.com/actuator/cve/blob/main/CVE-2023-42471 https://github.com/actuator/wave.ai.browser/blob/main/CWE-94.md https://github.com/actuator/wave.ai.browser/blob/main/poc.apk • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the "go" command was executed within the module. This applies to modules downloaded using the "go" command from the module proxy, as well as modules downloaded directly using VCS software. La directiva de cadena de herramientas go.mod, introducida en Go 1.21, se puede aprovechar para ejecutar scripts y binarios relativos a la raíz del módulo cuando el comando "go" se ejecutó dentro del módulo. Esto se aplica a los módulos descargados utilizando el comando "go" desde el proxy del módulo, así como a los módulos descargados directamente mediante el software VCS. • https://go.dev/cl/526158 https://go.dev/issue/62198 https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ https://pkg.go.dev/vuln/GO-2023-2042 https://security.gentoo.org/glsa/202311-09 https://security.netapp.com/advisory/ntap-20231020-0004 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 4

Processing a maliciously crafted image may lead to arbitrary code execution. • https://github.com/alsaeroth/CVE-2023-41064-POC https://github.com/MrR0b0t19/CVE-2023-41064 https://github.com/MrR0b0t19/vulnerabilidad-LibWebP-CVE-2023-41064 https://github.com/sarsaeroth/CVE-2023-41064-POC http://www.openwall.com/lists/oss-security/2023/09/21/4 https://support.apple.com/en-us/HT213905 https://support.apple.com/en-us/HT213906 https://support.apple.com/en-us/HT213913 https://support.apple.com/en-us/HT213914 https://support.apple.com/en-us/HT213915 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

A maliciously crafted attachment may result in arbitrary code execution. • http://seclists.org/fulldisclosure/2023/Sep/4 http://seclists.org/fulldisclosure/2023/Sep/5 https://support.apple.com/en-us/HT213905 https://support.apple.com/en-us/HT213907 https://support.apple.com/kb/HT213905 https://support.apple.com/kb/HT213907 • CWE-20: Improper Input Validation •