Page 379 of 11011 results (0.024 seconds)

CVSS: 10.0EPSS: 0%CPEs: 7EXPL: 2

15 Mar 2022 — Processing maliciously crafted web content may lead to arbitrary code execution. ... This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution. • https://github.com/parsdefense/CVE-2022-22629 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

15 Mar 2022 — Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution. • https://support.apple.com/en-us/HT213189 • CWE-125: Out-of-bounds Read •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

15 Mar 2022 — Processing maliciously crafted web content may lead to arbitrary code execution. ... This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution. • https://support.apple.com/en-us/HT213182 • CWE-416: Use After Free •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 2

14 Mar 2022 — GPAC versión 1.0.1, está afectado por un Uso de Memoria Previamente Liberada mediante MP4Box Multiple vulnerabilities have been discovered in GPAC, the worst of which could lead to arbitrary code execution. • https://github.com/gpac/gpac/issues/2061 • CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 2

14 Mar 2022 — GPAC versión 1.0.1,está afectado por un desbordamiento del búfer en la región stack de la memoria mediante MP4Box Multiple vulnerabilities have been discovered in GPAC, the worst of which could lead to arbitrary code execution. • https://github.com/gpac/gpac/issues/2058 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 3

14 Mar 2022 — (gf_utf8_wcslen es una función Unicode utf8_wcslen renombrada) Multiple vulnerabilities have been discovered in GPAC, the worst of which could lead to arbitrary code execution. • https://github.com/gpac/gpac/blob/105d67985ff3c3f4b98a98f312e3d84ae77a4463/share/doc/man/gpac.1#L2226-L2229 • CWE-476: NULL Pointer Dereference •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

14 Mar 2022 — GPAC versión 1.0.1, está afectado por una desreferencia de puntero NULL en la función gf_dump_vrml_field.isra() Multiple vulnerabilities have been discovered in GPAC, the worst of which could lead to arbitrary code execution. • https://huntr.dev/bounties/a08437cc-25aa-4116-8069-816f78a2247c • CWE-476: NULL Pointer Dereference •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

14 Mar 2022 — fish is a command line shell. fish version 3.1.0 through version 3.3.1 is vulnerable to arbitrary code execution. git repositories can contain per-repository configuration that change the behavior of git, including running arbitrary commands. ... Como medida de mitigación, elimina la función "fish_git_prompt" del prompt An arbitrary code execution vulnerability was disovered in fish, a command line shell. • https://github.com/fish-shell/fish-shell/pull/8589 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-427: Uncontrolled Search Path Element •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

14 Mar 2022 — GPAC versión 1.0.1, está afectado por un desbordamiento de búfer en la región heap de la memoria en la función SFS_AddString() en el archivo bifs/script_dec.c Multiple vulnerabilities have been discovered in GPAC, the worst of which could lead to arbitrary code execution. • https://huntr.dev/bounties/1691cca3-ab54-4259-856b-751be2395b11 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

12 Mar 2022 — Puede desencadenarse por medio de MP4Box Multiple vulnerabilities have been discovered in GPAC, the worst of which could lead to arbitrary code execution. • https://github.com/gpac/gpac/issues/2138 • CWE-787: Out-of-bounds Write •