Skip to content
Threat Feed

Tag

Code Execution

122 briefs RSS
critical advisory

Rancher Vulnerability Allows Remote Code Execution and File Manipulation

An authenticated, remote attacker can exploit a vulnerability in Rancher to execute arbitrary program code and manipulate files, potentially leading to privilege escalation and system compromise.

Rancher code-execution file-manipulation
2r 2t
critical advisory

Langflow Multiple Vulnerabilities Allow Code Execution

An authenticated remote attacker can exploit multiple unspecified vulnerabilities in Langflow to achieve arbitrary code execution.

Langflow code-execution web-application
2r 1t
medium advisory

libexif Vulnerability Allows Code Execution

A local attacker can exploit a vulnerability in libexif to potentially execute arbitrary code, cause a denial of service, or disclose sensitive information.

libexif vulnerability code-execution denial-of-service
2r 2t
critical advisory

GNU InetUtils Multiple Vulnerabilities Allow Code Execution and Information Disclosure

Multiple vulnerabilities in GNU InetUtils allow a remote attacker to execute arbitrary code and disclose sensitive information.

InetUtils code-execution information-disclosure
2r 2t
critical advisory

XZ Utility Vulnerability Allows Remote Code Execution

A remote, anonymous attacker can exploit a vulnerability in the xz utility to achieve arbitrary code execution on affected systems.

xz code-execution linux
2r 1t
high advisory

MariaDB Vulnerability Allows Denial of Service and Potential Code Execution

A remote, authenticated attacker can exploit a vulnerability in MariaDB to perform a denial of service attack and potentially execute arbitrary program code.

MariaDB denial-of-service code-execution
2r 2t
high advisory

Sunnet CTMS/CPAS Arbitrary File Upload Vulnerability (CVE-2026-7490)

A privileged remote attacker can exploit CVE-2026-7490 in Sunnet CTMS and CPAS to upload and execute web shell backdoors, leading to arbitrary code execution on the server.

CTMS +1 arbitrary-file-upload web-shell code-execution
2r 3t 1c
critical advisory

CVE-2026-7339: Heap Buffer Overflow in WebRTC

A heap buffer overflow vulnerability exists in the WebRTC component of Google Chrome and Microsoft Edge (Chromium-based), potentially leading to code execution.

Chrome +1 webrtc heap-overflow code-execution cve-2026-7339
2r 1c
critical advisory

Multiple Vulnerabilities in FreeBSD OS Allow Privilege Escalation and Arbitrary Code Execution

Multiple vulnerabilities in FreeBSD OS could allow an attacker to gain elevated privileges, execute arbitrary code, manipulate data, disclose sensitive information, or cause a denial of service.

FreeBSD OS vulnerability privilege-escalation code-execution
3r 3t
high advisory

Multiple Vulnerabilities in Google Chrome

Multiple vulnerabilities in Google Chrome could allow an attacker to execute arbitrary code, bypass security mechanisms, disclose and manipulate data, and cause a denial-of-service condition.

Chrome vulnerability code-execution defense-evasion information-disclosure denial-of-service
2r 5t 5c
high advisory

n8n Python Task Runner Sandbox Escape Vulnerability

A sandbox escape vulnerability exists in n8n's Python Task Runner that allows an authenticated user with workflow creation/modification permissions to achieve arbitrary code execution on the task runner container, impacting n8n instances with the Python Task Runner enabled; upgrade to versions 1.123.32, 2.17.4, 2.18.1 or later to remediate the vulnerability.

n8n sandbox-escape code-execution vulnerability
2r 2t
high advisory

Alloksoft Video Joiner Buffer Overflow Vulnerability (CVE-2018-25315)

Alloksoft Video Joiner 4.6.1217 is vulnerable to a local buffer overflow (CVE-2018-25315) allowing attackers to execute arbitrary code via a crafted license name.

Video joiner 4.6.1217 buffer-overflow code-execution cve-2018-25315 windows
2r 1t 1c
high advisory

Allok Soft WMV Converter Buffer Overflow Vulnerability (CVE-2018-25314)

Allok Soft WMV to AVI MPEG DVD WMV Converter 4.6.1217 is vulnerable to a buffer overflow, allowing local attackers to execute arbitrary code via a crafted License Name field.

WMV to AVI MPEG DVD WMV Converter 4.6.1217 buffer-overflow code-execution cve-2018-25314
2r 1t 1c
high advisory

Prime95 Local Buffer Overflow Vulnerability (CVE-2018-25299)

Prime95 version 29.4b8 contains a local buffer overflow vulnerability, allowing attackers to execute arbitrary code by exploiting structured exception handling (SEH) mechanisms through a malicious payload in the PrimeNet proxy hostname field.

Prime95 buffer-overflow code-execution cve-2018-25299
2r 1t 1c
critical advisory

Free Download Manager 2.0 Built 417 Local Buffer Overflow Vulnerability

Free Download Manager 2.0 Built 417 contains a local buffer overflow vulnerability in the URL import functionality that allows attackers to trigger a structured exception handler (SEH) chain exploitation, leading to arbitrary code execution.

Free Download Manager 2.0 buffer-overflow seh-overwrite code-execution cve-2018-25304
2r 1t 1c
high advisory

OpenClaw Environment Variable Injection Vulnerability (CVE-2026-41384)

OpenClaw before 2026.3.24 is vulnerable to environment variable injection, allowing attackers to inject malicious environment variables through crafted workspace configurations in the CLI backend, leading to potential code execution or sensitive data exposure.

OpenClaw environment-variable-injection code-execution cve-2026-41384
2r 1t 1c
medium advisory

Multiple Vulnerabilities in GNU libc

A remote, anonymous attacker can exploit multiple vulnerabilities in GNU libc to execute arbitrary program code, cause a denial-of-service condition, or disclose sensitive information.

libc vulnerability glibc denial-of-service code-execution
2r 3t 5c
high advisory

Red Hat Enterprise Linux LibRaw Multiple Vulnerabilities Allow Code Execution or DoS

Multiple vulnerabilities in Red Hat Enterprise Linux's LibRaw component allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.

Enterprise Linux vulnerability code-execution denial-of-service linux
2r 2t
high advisory

AVACAST DLL Hijacking Vulnerability (CVE-2026-7279)

A DLL hijacking vulnerability in eMPIA Technology's AVACAST (CVE-2026-7279) allows authenticated local attackers to achieve arbitrary code execution with system privileges by placing a malicious DLL in a specific directory.

AVACAST dll-hijacking privilege-escalation code-execution
2r 1t 1c
critical advisory

Multiple Vulnerabilities in Atlassian Products

Multiple vulnerabilities in Atlassian Bamboo, Bitbucket, Confluence, and Jira allow attackers to execute arbitrary code, bypass security measures, manipulate data, disclose information, or perform cross-site scripting attacks.

Bamboo +3 atlassian vulnerability code-execution xss
2r 4t 1c
high advisory

Claude Code Trust Dialog Bypass via Git Worktree Spoofing

A vulnerability in Claude Code allowed for trust dialog bypass via git worktree spoofing, potentially leading to arbitrary code execution by crafting a malicious repository with a `commondir` file pointing to a previously trusted path, bypassing the trust dialog, and executing malicious hooks defined in `.claude/settings.json`.

Claude Code git code-execution trust-bypass
2r 1t
high advisory

OpenClaw Arbitrary Code Execution via Environment Variable Override (CVE-2026-41336)

OpenClaw before 2026.3.31 allows attackers to execute arbitrary code by overriding the OPENCLAW_BUNDLED_HOOKS_DIR environment variable using a workspace .env file, enabling the loading of attacker-controlled hook code.

OpenClaw cve code-execution environment-variable-override
2r 1t 1c
high advisory

Multiple Vulnerabilities in Microsoft Cloud Products Allow Privilege Escalation and Code Execution

Multiple vulnerabilities in Microsoft Azure, Microsoft 365 Copilot, Microsoft Dynamics 365, and Microsoft Power Apps could allow an attacker to escalate privileges, execute arbitrary code, and conduct spoofing attacks.

Azure +3 cloud privilege-escalation code-execution spoofing
3r 3t 5c
critical advisory

Flowise Multiple Vulnerabilities

Multiple vulnerabilities in Flowise allow an attacker to execute arbitrary code, bypass security measures, disclose information, and manipulate files.

Flowise vulnerability code-execution information-disclosure file-manipulation
2r 3t 5c
critical advisory

Borg SPM 2007 Arbitrary File Upload Vulnerability (CVE-2026-6885)

An unauthenticated remote attacker can exploit an arbitrary file upload vulnerability (CVE-2026-6885) in Borg SPM 2007 to upload and execute web shell backdoors, leading to arbitrary code execution on the server.

SPM 2007 file-upload web-shell code-execution
2r 1t 1c
high advisory

LanSpy 2.0.1.159 Local Buffer Overflow Vulnerability

LanSpy 2.0.1.159 is vulnerable to a local buffer overflow, allowing an attacker to overwrite the instruction pointer by providing a crafted payload to the scan field, potentially leading to code execution.

LanSpy buffer-overflow code-execution cve-2018-25268
1r 1t 1c
critical advisory

InstructLab Arbitrary Code Execution via Malicious HuggingFace Model

InstructLab is vulnerable to arbitrary code execution because the `linux_train.py` script hardcodes `trust_remote_code=True` when loading models from HuggingFace, allowing remote attackers to execute code by convincing a user to load a malicious model.

InstructLab cve code-execution huggingface
2r 1t 1c
high advisory

Multiple Vulnerabilities in Fortinet FortiSandbox

Multiple vulnerabilities in Fortinet FortiSandbox allow attackers to perform cross-site scripting attacks, disclose information, bypass security measures, and execute arbitrary code, potentially leading to system compromise.

fortinet fortisandbox vulnerability xss code-execution
3r 3t
critical advisory

Multiple Vulnerabilities in Red Hat Hardened Images RPMs

Remote, anonymous attackers can exploit vulnerabilities in Red Hat Hardened Images RPMs to bypass security measures, cause denial of service, disclose sensitive information, or potentially execute code.

redhat vulnerability denial-of-service information-disclosure code-execution linux
2r 7t
critical advisory

GIMP Multiple Vulnerabilities Allow Code Execution

A remote, anonymous attacker can exploit multiple vulnerabilities in GIMP to execute arbitrary program code, potentially leading to system compromise.

gimp code-execution vulnerability
2r 1t
critical advisory

Libarchive Code Execution Vulnerability

A remote attacker can exploit a vulnerability in libarchive to achieve arbitrary code execution on a vulnerable system.

libarchive code-execution vulnerability
2r 1t
high advisory

Multiple Vulnerabilities in Microsoft Developer Tools

Multiple vulnerabilities in Microsoft Visual Studio, .NET Framework, .NET, PowerShell, and Visual Studio Code can be exploited by an attacker to disclose sensitive information, conduct spoofing attacks, cause a denial of service, or bypass security measures, potentially leading to arbitrary code execution.

vulnerability code-execution spoofing denial-of-service information-disclosure windows
2r 4t
high advisory

OpenClaw Improper Trust Boundary Vulnerability (CVE-2026-41295)

OpenClaw before 2026.4.2 contains an improper trust boundary vulnerability (CVE-2026-41295) allowing attackers to execute unintended code by cloning a workspace with a malicious plugin claiming a bundled channel id.

openclaw code-execution trust-boundary plugin
2r 1t 1c
critical advisory

Spinnaker Echo Service Vulnerable to Spring Expression Language Injection

Unrestricted access to the JVM via Spring Expression Language (SPeL) in Spinnaker's Echo service allows for arbitrary code execution, enabling attackers to invoke commands and access files.

spel code-execution cloud
2r 1t 1c
high advisory

SecureDrop Client Code Execution via Gzip Extraction Vulnerability

A compromised SecureDrop server can achieve code execution on the SecureDrop client's virtual machine by exploiting improper filename validation during gzip archive extraction, allowing for the overwriting of critical files.

securedrop gzip code execution vulnerability linux
2r 1t 2c
critical advisory

Firebird Path Traversal Vulnerability Leads to Code Execution (CVE-2026-40342)

An authenticated user with CREATE FUNCTION privileges can exploit a path traversal vulnerability in Firebird versions prior to 5.0.4, 4.0.7, and 3.0.14, to load an arbitrary shared library leading to code execution as the server's OS account.

firebird path-traversal code-execution cve-2026-40342 database
2r 2t 1c
high advisory

Google Chrome Turbofan Type Confusion Vulnerability (CVE-2026-6301)

A type confusion vulnerability in Google Chrome's Turbofan component (CVE-2026-6301) allows a remote attacker to execute arbitrary code within a sandbox by exploiting a crafted HTML page, impacting system integrity and availability.

type-confusion code-execution chrome
2r 1t 1c
critical advisory

Creolabs Gravity Heap Buffer Overflow Vulnerability (CVE-2026-40504)

Creolabs Gravity before 0.9.6 is vulnerable to a heap buffer overflow in the gravity_vm_exec function, allowing attackers to achieve arbitrary code execution by crafting scripts with many string literals at global scope that exploit insufficient bounds checking in gravity_fiber_reassign().

cve heap-overflow code-execution
2r 3t 1c
high advisory

Windows TCP/IP Race Condition Vulnerability (CVE-2026-33827)

CVE-2026-33827 is a race condition vulnerability in Windows TCP/IP that allows an attacker to execute arbitrary code over the network by exploiting improper synchronization during concurrent execution using shared resources.

cve-2026-33827 race-condition windows tcp/ip code-execution
2r 2t 1c
high advisory

Windows Hyper-V Improper Input Validation Vulnerability (CVE-2026-32149)

CVE-2026-32149 is a vulnerability in Windows Hyper-V due to improper input validation, which allows an authorized, local attacker to execute arbitrary code.

hyper-v code-execution vulnerability windows
2r 2t 1c 1i
high advisory

Microsoft Word Use-After-Free Vulnerability CVE-2026-23657

CVE-2026-23657 is a use-after-free vulnerability in Microsoft Office Word allowing a local attacker to execute arbitrary code with user privileges.

use-after-free code-execution office cve-2026-23657
2r 1t 1c
high threat

Microsoft Office Word Use-After-Free Vulnerability (CVE-2026-33095)

A use-after-free vulnerability in Microsoft Office Word (CVE-2026-33095) could allow a local attacker to execute arbitrary code by opening a specially crafted document.

exploited cve-2026-33095 use-after-free microsoft-office word code-execution
2r 1t 1c 1i
high advisory

Microsoft Office Excel Use-After-Free Vulnerability (CVE-2026-32198)

CVE-2026-32198 is a use-after-free vulnerability in Microsoft Office Excel that allows an attacker to execute code locally on a vulnerable system.

use-after-free excel code-execution
3r 1t 1c
high advisory

Microsoft Excel Use-After-Free Vulnerability (CVE-2026-32189)

CVE-2026-32189 is a use-after-free vulnerability in Microsoft Excel that allows a local attacker to execute arbitrary code by exploiting memory corruption.

use-after-free code-execution excel cve-2026-32189
2r 1t 1c 1i
high advisory

CVE-2026-33826: Windows Active Directory Improper Input Validation Vulnerability

An improper input validation vulnerability (CVE-2026-33826) in Windows Active Directory could allow an authenticated attacker on an adjacent network to execute code.

cve-2026-33826 active-directory code-execution vulnerability
2r 1t 1c 1i
high advisory

Adobe Photoshop Out-of-Bounds Read Vulnerability (CVE-2026-27289)

An out-of-bounds read vulnerability (CVE-2026-27289) in Adobe Photoshop Desktop versions 27.4 and earlier allows for potential code execution via a crafted file, requiring user interaction to trigger the exploit.

cve-2026-27289 out-of-bounds read adobe photoshop code execution
2r 3t 1c 2i
medium advisory

Adobe ColdFusion Improper Input Validation Vulnerability (CVE-2026-27306)

An improper input validation vulnerability in Adobe ColdFusion versions 2023.18, 2025.6, and earlier (CVE-2026-27306) could lead to arbitrary code execution if a privileged user opens a specially crafted malicious file.

cve-2026-27306 coldfusion code execution input validation
2r 1t 1c
high advisory

Adobe Bridge Heap-based Buffer Overflow Vulnerability (CVE-2026-27312)

A heap-based buffer overflow vulnerability in Adobe Bridge versions 16.0.2, 15.1.4 and earlier can lead to arbitrary code execution if a user opens a malicious file.

cve-2026-27312 heap-based buffer overflow adobe bridge code execution
2r 2t 1c
high advisory

Adobe Acrobat Reader Prototype Pollution Vulnerability (CVE-2026-34622)

A prototype pollution vulnerability in Adobe Acrobat Reader versions 26.001.21411, 24.001.30360, 24.001.30362 and earlier (CVE-2026-34622) allows for arbitrary code execution when a user opens a specially crafted malicious file.

cve-2026-34622 adobe-acrobat prototype-pollution code-execution
2r 1t 1c
critical advisory

Multiple Vulnerabilities in Red Hat Ansible Automation Platform

A remote, anonymous attacker can exploit multiple vulnerabilities in Red Hat Ansible Automation Platform to perform denial of service, execute arbitrary code, bypass security measures, manipulate data, disclose information, or conduct XSS attacks.

ansible redhat vulnerability dos xss code-execution
2r 6t
high advisory

CVE-2026-32156 Use-After-Free Vulnerability in Windows UPnP Device Host

CVE-2026-32156 is a use-after-free vulnerability in the Windows Universal Plug and Play (UPnP) Device Host service that allows an unauthorized attacker to execute code locally.

use-after-free windows upnp code-execution
2r 2t 1c 1i
high advisory

Microsoft PowerPoint Use-After-Free Vulnerability (CVE-2026-32200)

CVE-2026-32200 is a use-after-free vulnerability in Microsoft Office PowerPoint that allows an unauthorized attacker to achieve local code execution by enticing a user to open a specially crafted PowerPoint document.

cve-2026-32200 use-after-free powerpoint code-execution
2r 1t 1c 2i
high advisory

libTIFF Vulnerability Allows Code Execution and DoS

A remote, anonymous attacker can exploit a vulnerability in libTIFF to potentially execute arbitrary code or cause a denial-of-service condition.

libTIFF code execution denial of service
2r 2t
critical advisory

PraisonAI Arbitrary Code Execution Vulnerability

PraisonAI versions 4.5.138 and below are vulnerable to arbitrary code execution due to the unsanitized import of a malicious tools.py file, leading to potential system compromise.

praisonai code-execution cve-2026-40287
2r 1t 1c
high advisory

HTML5 Video Player 1.2.5 Local Buffer Overflow Vulnerability

HTML5 Video Player version 1.2.5 is vulnerable to a local buffer overflow, allowing attackers to execute arbitrary code by providing an oversized key code string through the Help Register dialog.

buffer-overflow code-execution html5-video-player
2r 4t 1c
high advisory

OpenClaw Arbitrary Code Execution via Malicious .npmrc File

OpenClaw before 2026.3.24 is vulnerable to arbitrary code execution via local plugin and hook installation, where an attacker can craft a .npmrc file with a git executable override to execute malicious code during npm install.

cve-2026-35641 code-execution npm
2r 1t 1c 1i
critical advisory

IBM Semeru Runtime Code Execution Vulnerability

A remote, anonymous attacker can exploit a vulnerability in IBM Semeru Runtime and IBM DB2 to execute arbitrary program code.

code-execution vulnerability ibm
2r 1t
high advisory

Vim Vulnerability Allows Local Code Execution

A local attacker can exploit a vulnerability in Vim to execute arbitrary code on a vulnerable system.

vim code-execution local-privilege-escalation
2r 1t
critical advisory

Multiple Vulnerabilities in Zammad

Multiple vulnerabilities in Zammad allow a remote attacker to execute arbitrary code, bypass security measures, disclose sensitive information, and perform cross-site scripting attacks.

zammad vulnerability code execution xss
2r 3t
high advisory

MemProcFS DLL and Shared Library Hijacking Vulnerability

MemProcFS before 5.17 is susceptible to DLL and shared-library hijacking due to unsafe library-loading patterns, allowing attackers to achieve arbitrary code execution by placing malicious libraries or manipulating the library search path.

dll-hijacking library-hijacking code-execution memprocfs cve-2026-40031
2r 3t 1c
high advisory

Sleuth Kit Path Traversal Vulnerability (CVE-2026-40024)

A path traversal vulnerability exists in The Sleuth Kit through 4.14.0 (tsk_recover), enabling attackers to write files to arbitrary locations via crafted filenames with path traversal sequences in a filesystem image, potentially leading to code execution.

path traversal code execution privilege escalation sleuth kit CVE-2026-40024
2r 3t 1c
high advisory

Mise Trust Bypass Vulnerability via Malicious .mise.toml

A vulnerability in mise allows an attacker who can place a malicious .mise.toml file in a repository to bypass trust checks and execute arbitrary code via `[env] _.source` due to improper loading of trust settings.

mise trust-bypass code-execution vulnerability
2r 2t
critical advisory

text-generation-webui Path Traversal Vulnerability (CVE-2026-35050)

text-generation-webui versions prior to 4.1.1 are vulnerable to path traversal, allowing a high-privileged user to overwrite Python files and achieve arbitrary code execution by triggering the 'download-model.py' file through the application's 'Model' menu.

path traversal code execution text-generation-webui
2r 3t 1c 1i
critical advisory

Vim Modeline Sandbox Bypass Vulnerability (CVE-2026-34982)

A critical vulnerability in Vim versions prior to 9.2.0276 allows arbitrary OS command execution via a crafted file that bypasses the modeline sandbox due to missing security checks, potentially leading to code execution.

vim modeline sandbox-bypass code-execution cve-2026-34982
3r 1t 1c 5i
high advisory

R i386 3.5.0 Local Buffer Overflow Vulnerability (CVE-2019-25656)

R i386 version 3.5.0 is susceptible to a local buffer overflow in the GUI Preferences dialog, allowing a local attacker to overwrite the structured exception handler (SEH) by supplying a malicious string to the 'Language for menus and messages' field, leading to arbitrary code execution.

buffer-overflow seh-overwrite code-execution cve-2019-25656 windows
2r 2t 1c 5i
high advisory

Snes9K 0.0.9z Buffer Overflow Vulnerability (CVE-2018-25251)

Snes9K 0.0.9z is vulnerable to a buffer overflow in the Netplay Socket Port Number field, enabling local attackers to execute arbitrary code via a crafted payload.

buffer-overflow code-execution cve-2018-25251 snes9k
2r 1t 1c
high advisory

prompts.chat Path Traversal Vulnerability (CVE-2026-22661)

A path traversal vulnerability exists in prompts.chat prior to commit 0f8d4c3, allowing attackers to write arbitrary files to the client system by crafting malicious ZIP archives with unsanitized filenames.

path-traversal file-write code-execution cve-2026-22661 prompts.chat linux
2r 1t 1c
critical advisory

BentoML SSTI via Unsandboxed Jinja2 in Dockerfile Generation

BentoML versions 1.4.37 and earlier are vulnerable to server-side template injection (SSTI), where the Dockerfile generation function uses an unsandboxed jinja2.Environment allowing arbitrary Python code execution on the host machine when a malicious bento archive is imported and containerized, bypassing container isolation and potentially granting full access to the host filesystem and environment variables.

ssti bentoml code-execution docker
2r 1t
high advisory

Kiro IDE Code Execution Vulnerability via Crafted Color Theme (CVE-2026-5429)

CVE-2026-5429 is a code execution vulnerability in Kiro IDE before version 0.8.140 that allows a remote, unauthenticated attacker to execute arbitrary code by exploiting a crafted color theme name when a local user opens a workspace.

cve cve-2026-5429 code-execution kiro-ide
2r 2t 1c
high advisory

goshs Authentication Bypass Vulnerability (CVE-2026-34581)

goshs versions 1.1.0 to before 2.0.0-beta.2 are vulnerable to authentication bypass via Share Token, potentially allowing code execution (CVE-2026-34581).

cve-2026-34581 authentication-bypass code-execution
1r 1t
high advisory

V-SFT Stack-Based Buffer Overflow Vulnerability (CVE-2026-32928)

V-SFT versions 6.2.10.0 and prior are susceptible to a stack-based buffer overflow vulnerability that could allow arbitrary code execution when a malicious V7 file is opened.

cve-2026-32928 buffer-overflow code-execution v-sft
2r 1t 1c
high advisory

Goshs Authentication Bypass via Share Token

Goshs is vulnerable to an authentication bypass via share tokens, allowing attackers to bypass authentication checks by using a valid share token in conjunction with other functionalities like WebSocket connections to gain unauthorized access and execute arbitrary commands on the server.

authentication-bypass code-execution goshs
2r 3t 2i
high advisory

gdk-pixbuf Vulnerability Allows Denial of Service and Potential Code Execution

A remote, anonymous attacker can exploit a vulnerability in gdk-pixbuf to cause a denial of service and potentially execute arbitrary code.

gdk-pixbuf denial-of-service code-execution
2r 1t
high advisory

7-Zip Multiple Vulnerabilities Allow Remote Code Execution

Multiple vulnerabilities in 7-Zip allow an attacker to execute arbitrary program code with the privileges of the service, potentially leading to system compromise.

7-zip code-execution vulnerability windows
2r 1t
high advisory

Multiple Vulnerabilities in PowerDNS

Multiple vulnerabilities in PowerDNS could be exploited by an attacker to disclose information, bypass security measures, cause a denial of service, and potentially execute code.

powerdns vulnerability dos information-disclosure code-execution
1r
critical advisory

Red Hat Enterprise Linux libxslt Vulnerability Allows DoS and Code Execution

A local attacker can exploit a vulnerability in libxslt on Red Hat Enterprise Linux to cause a denial of service or execute arbitrary program code.

libxslt rhel vulnerability code-execution denial-of-service linux
2r 2t
high advisory

Foxit Application Use-After-Free Vulnerability (CVE-2026-3779)

CVE-2026-3779 is a use-after-free vulnerability in a Foxit application where stale references to page/form objects can lead to arbitrary code execution via crafted documents.

cve-2026-3779 use-after-free code-execution foxit
2r 1t 1c
high advisory

AWS-C-EventStream Out-of-Bounds Write Vulnerability (CVE-2026-5190)

CVE-2026-5190 is an out-of-bounds write vulnerability in the aws-c-event-stream library before version 0.6.0 that allows a malicious third-party server to cause memory corruption and potential arbitrary code execution on client applications.

cve-2026-5190 aws-c-event-stream out-of-bounds write code execution
2r 3t 1c
critical advisory

UXGROUP Cast to TV Screen Mirroring Arbitrary File Overwrite Vulnerability (CVE-2026-30282)

UXGROUP LLC Cast to TV Screen Mirroring v2.2.77 is vulnerable to arbitrary file overwrite (CVE-2026-30282) via the file import process, allowing attackers to overwrite critical internal files and potentially achieve arbitrary code execution or information exposure.

arbitrary-file-overwrite code-execution information-disclosure cve-2026-30282
2r 4t 1c 1i
high advisory

OpenClaw Approval Integrity Vulnerability Leads to Code Execution (CVE-2026-32971)

OpenClaw before 2026.3.11 exhibits an approval-integrity vulnerability where attackers can place wrapper binaries to execute local code after operators approve misleading command text, due to the system displaying extracted shell payloads instead of the actual executed arguments.

cve-2026-32971 code-execution approval-bypass
2r 1t 1c
critical advisory

Vim Code Execution Vulnerability via Crafted Files (CVE-2026-34714)

Vim versions before 9.2.0272 allow code execution upon opening a specially crafted file due to %{expr} injection in tabpanel lacking P_MLE in the default configuration, potentially leading to arbitrary code execution.

cve-2026-34714 code-execution vim injection
2r 2t
critical advisory

Multiple Vulnerabilities in Wazuh Leading to Code Execution and Data Manipulation

Multiple vulnerabilities in Wazuh allow an attacker to perform denial-of-service attacks, execute arbitrary code, manipulate data, and disclose sensitive information, potentially leading to significant data breaches and system compromise.

wazuh vulnerability code-execution data-manipulation
2r 6t
critical advisory

Multiple Vulnerabilities in Grafana

Multiple vulnerabilities in Grafana allow a remote attacker to conduct a denial-of-service attack, execute code, or disclose information.

grafana vulnerability dos code-execution information-disclosure
2r 4t
critical advisory

Multiple Vulnerabilities in NGINX and NGINX Plus

Multiple vulnerabilities in NGINX Plus and NGINX can be exploited by an attacker to perform a denial of service attack, manipulate data, bypass security measures, and potentially execute arbitrary program code, leading to significant impact.

nginx vulnerability denial-of-service code-execution webserver linux
2r 1t
critical advisory

Gigabyte Control Center Arbitrary File Write Vulnerability

Gigabyte Control Center has an Arbitrary File Write vulnerability (CVE-2026-4415) that allows unauthenticated remote attackers to write arbitrary files to any location on the underlying operating system, leading to arbitrary code execution or privilege escalation.

cve-2026-4415 arbitrary-file-write privilege-escalation code-execution gigabyte
2r 2t
high advisory

OpenClaw Code Execution via Script Modification (CVE-2026-32979)

OpenClaw before 2026.3.11 is vulnerable to an approval integrity issue (CVE-2026-32979) allowing attackers to execute arbitrary code by modifying approved local scripts before they are executed.

cve-2026-32979 code-execution openclaw
2r 1t
high advisory

SC v7.16 Stack-Based Buffer Overflow Vulnerability (CVE-2018-25222)

SC v7.16 is vulnerable to a stack-based buffer overflow, allowing local attackers to execute arbitrary code by providing oversized input exceeding 1052 bytes, leading to potential arbitrary code execution.

buffer-overflow code-execution CVE-2018-25222
2r 1t
critical advisory

EChat Server 3.1 Buffer Overflow Vulnerability in chat.ghp Endpoint

EChat Server 3.1 is vulnerable to a buffer overflow in the chat.ghp endpoint, allowing remote attackers to execute arbitrary code by sending a crafted GET request with an oversized username parameter.

buffer-overflow code-execution echat
2r 1t
high advisory

Multi Emulator Super System (MESS) Buffer Overflow Vulnerability (CVE-2016-20039)

Multi Emulator Super System 0.154-3.1 is vulnerable to a buffer overflow (CVE-2016-20039) allowing local attackers to achieve arbitrary code execution by supplying a malicious gamma parameter, leading to potential system compromise.

cve buffer overflow code execution
2r 1t
high advisory

xwpe Stack-Based Buffer Overflow Vulnerability (CVE-2016-20037)

A stack-based buffer overflow vulnerability exists in xwpe version 1.5.30a-2.1 and prior, allowing a local attacker to execute arbitrary code or cause denial of service by supplying a crafted command-line argument with an overly long input string.

cve buffer-overflow code-execution
2r 3t
critical advisory

Multiple Vulnerabilities in Canva Affinity, TP-Link, and HikVision Devices

Cisco Talos disclosed multiple vulnerabilities in Canva Affinity, TP-Link Archer AX53, and HikVision Ultra Face Recognition Terminal products which could lead to sensitive information disclosure, arbitrary code execution, or credentials leak if exploited.

vulnerability code-execution information-disclosure
3r 6t
critical advisory

Spring AI SimpleVectorStore SpEL Injection Vulnerability (CVE-2026-22738)

A SpEL injection vulnerability exists in Spring AI's SimpleVectorStore when a user-supplied value is used as a filter expression key, potentially allowing malicious actors to execute arbitrary code in vulnerable applications.

spel-injection spring-ai cve-2026-22738 code-execution
2r 1t 1i
high advisory

EVerest IsoMux Certificate Filename Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability exists in EVerest's IsoMux certificate filename handling before version 2026.02.0, potentially allowing code execution via a crafted filename.

buffer overflow EV charging code execution
2r 3t
critical advisory

Multiple Vulnerabilities in GnuPG and Gpg4win Allow for Arbitrary Code Execution and Denial of Service

Multiple vulnerabilities exist in GnuPG and Gpg4win that could allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.

gnupg gpg4win vulnerability code-execution denial-of-service
2r 2t
critical advisory

Google Chrome WebAudio Heap Buffer Overflow Vulnerability (CVE-2026-4673)

A remote attacker can exploit a heap buffer overflow vulnerability (CVE-2026-4673) in Google Chrome's WebAudio component before version 146.0.7680.165 by crafting a malicious HTML page, potentially leading to an out-of-bounds memory write and arbitrary code execution.

cve-2026-4673 chrome webaudio heap overflow code execution
2r 1t
critical advisory

Langflow Vulnerability Allows Arbitrary Code Execution

A vulnerability in Langflow allows an attacker to execute arbitrary code, potentially leading to system compromise.

langflow code-execution vulnerability
2r 1t
critical advisory

Multiple Vulnerabilities in Redis

Multiple vulnerabilities in Redis allow an attacker to execute arbitrary program code and perform a denial-of-service attack.

redis vulnerability code execution denial of service
2r 2t
critical advisory

Multiple Vulnerabilities in Red Hat Developer Hub

Multiple vulnerabilities in Red Hat Developer Hub allow a remote attacker to perform denial of service, execute arbitrary code, bypass security measures, and manipulate data.

redhat developer hub vulnerability denial of service code execution
2r 8t
critical advisory

IBM Tivoli Netcool/OMNIbus Multiple Vulnerabilities

An anonymous remote attacker can exploit multiple vulnerabilities in IBM Tivoli Netcool/OMNIbus to achieve arbitrary code execution, information disclosure, file manipulation, or denial of service.

ibm tivoli netcool omnibus vulnerability code-execution dos
2r 3t
critical advisory

Asterisk and Digium Certified Asterisk Vulnerabilities

An authenticated remote attacker can exploit vulnerabilities in Asterisk and Digium Certified Asterisk to achieve arbitrary code execution, denial of service, or information disclosure.

asterisk voip code-execution dos information-disclosure
2r 8t
critical advisory

Red Hat Enterprise Linux Vulnerability Leads to Code Execution and Potential DoS

A remote, authenticated attacker can exploit a vulnerability in Red Hat Enterprise Linux (specifically 389-ds-base) to achieve arbitrary code execution and potentially cause a denial of service.

rhel code-execution denial-of-service linux
2r 3t
high advisory

Multiple Vulnerabilities in Vim Allow Local Code Execution and DoS

Multiple vulnerabilities in vim allow a local attacker to execute arbitrary code, cause a denial-of-service condition, or manipulate data.

vim vulnerability code execution denial of service
2r 2t
critical advisory

Multiple Vulnerabilities in Langflow Allow for Arbitrary Code Execution and Information Disclosure

Multiple vulnerabilities in Langflow could be exploited by an attacker to execute arbitrary program code, disclose information, and potentially manipulate data, leading to potential system compromise.

langflow vulnerability code-execution information-disclosure
2r 4t
critical advisory

Multiple Vulnerabilities in GStreamer

Multiple vulnerabilities in GStreamer allow a remote, anonymous attacker to cause a denial-of-service condition, memory corruption, and potentially execute arbitrary code.

gstreamer vulnerability denial-of-service memory-corruption code-execution
3r 2t
critical advisory

Multiple Vulnerabilities in Cpython Allow Remote Code Execution

A remote, authenticated attacker can exploit multiple vulnerabilities in Cpython to manipulate files or execute arbitrary code.

cpython vulnerability code execution
2r 1t
critical advisory

GNU libc Vulnerability Allows Local Code Execution

A local attacker can exploit a vulnerability in GNU libc to execute arbitrary program code on Linux systems.

glibc code-execution linux
2r 1t
high advisory

libpng Vulnerability Allows Code Execution

A vulnerability in libpng allows a remote, anonymous attacker to potentially execute arbitrary code, disclose sensitive information, or cause a denial-of-service condition.

libpng code-execution vulnerability
2r 4t
critical advisory

Tabs Mail Carrier 2.5.1 MAIL FROM Buffer Overflow Vulnerability

Tabs Mail Carrier 2.5.1 is vulnerable to a buffer overflow in the MAIL FROM SMTP command, allowing remote attackers to execute arbitrary code by sending a crafted MAIL FROM parameter with an oversized buffer to overwrite the EIP register and execute a bind shell payload via port 25.

cve-2019-25646 buffer-overflow smtp code-execution
2r 1t
high advisory

X-NetStat Pro 5.63 Local Buffer Overflow Vulnerability

X-NetStat Pro 5.63 contains a local buffer overflow vulnerability (CVE-2019-25637) allowing local attackers to execute arbitrary code by overwriting the EIP register.

buffer-overflow code-execution windows cve-2019-25637
2r 1t
high advisory

Base64 Decoder 1.1.2 Stack-Based Buffer Overflow (CVE-2019-25634)

Base64 Decoder 1.1.2 is vulnerable to a stack-based buffer overflow (CVE-2019-25634) allowing local attackers to achieve arbitrary code execution via a crafted input file that triggers an SEH overwrite.

cve-2019-25634 buffer-overflow seh-overwrite code-execution
2r 2t
high advisory

OpenSSH Vulnerabilities Allow Local Code Execution

A local attacker can exploit multiple vulnerabilities in OpenSSH to execute arbitrary code, potentially leading to privilege escalation and system compromise.

openssh code-execution privilege-escalation
2r 1t
critical advisory

Multiple Vulnerabilities in libpng Allow Remote Code Execution and Denial of Service

Multiple vulnerabilities in libpng allow a remote, anonymous attacker to perform denial of service attacks and execute arbitrary code.

libpng vulnerability denial-of-service code execution
2r 2t
critical advisory

GIMP Vulnerability Allows Remote Code Execution

A remote, anonymous attacker can exploit a vulnerability in GIMP to execute arbitrary code on a targeted system.

gimp code-execution vulnerability
2r 1t
high advisory

Multiple Vulnerabilities in FreeRDP Allow for DoS and Potential Code Execution

A remote, anonymous attacker can exploit multiple vulnerabilities in FreeRDP to cause a denial of service or potentially execute arbitrary program code.

freerdp rdp vulnerability denial-of-service code-execution
2r 2t
high advisory

Red Hat Enterprise Linux libxslt Vulnerability Allows Code Execution or File Manipulation

A local attacker can exploit a vulnerability in libxslt in Red Hat Enterprise Linux to execute arbitrary program code or manipulate files.

libxslt rhel code-execution file-manipulation linux
2r 3t
high advisory

FTP Shell Server 6.83 Buffer Overflow Vulnerability (CVE-2019-25619)

FTP Shell Server 6.83 contains a buffer overflow vulnerability (CVE-2019-25619) in the 'Account name to ban' field, enabling a local attacker to execute arbitrary code by injecting shellcode through a crafted string in the Manage FTP Accounts dialog.

buffer-overflow code-execution ftp
2r 1t
critical advisory

TuneClone 2.20 SEH Buffer Overflow Vulnerability (CVE-2019-25603)

TuneClone 2.20 is vulnerable to a structured exception handler (SEH) buffer overflow, allowing local attackers to execute arbitrary code by supplying a malicious license code string via the application's license registration feature.

cve-2019-25603 seh-overflow buffer-overflow code-execution
2r 1t 4i
high advisory

LiteLLM Server-Side Template Injection Vulnerability

A server-side template injection vulnerability in LiteLLM versions 1.80.5 to before 1.83.7 allows authenticated users to execute arbitrary code within the LiteLLM Proxy process via a crafted prompt template, potentially exposing sensitive information and enabling command execution on the host.

LiteLLM ssti template-injection code-execution
2r 1t
critical advisory

Grafana Vulnerability Allows Remote Code Execution

An authenticated remote attacker can exploit a vulnerability in Grafana to execute arbitrary code, potentially leading to system compromise and data exfiltration.

Grafana code-execution vulnerability
2r 1t
high advisory

CI4MS Authenticated Remote Code Execution via Theme Upload

CI4MS versions 0.26.0.0 through 0.31.6.0 are vulnerable to remote code execution; an authenticated backend user with theme upload permissions can upload a crafted ZIP file containing a PHP file, which is then installed into the web-accessible public directory without filtering, allowing direct execution via HTTP.

ci4-cms-erp/ci4ms code-execution web-application php
2r 2t
high advisory

i18next-fs-backend Path Traversal Vulnerability

i18next-fs-backend versions before 2.6.4 are vulnerable to path traversal due to insufficient sanitization of the lng and ns values, potentially allowing attackers to read arbitrary files, overwrite files, or execute code if .js or .ts locale files are in use.

i18next-fs-backend path-traversal i18next arbitrary-file-read arbitrary-file-write code-execution
2r 1t
high advisory

GitPython Vulnerability Allows Arbitrary Code Execution via Git Hooks

A vulnerability in GitPython versions prior to 3.1.47 allows for command execution during repository cloning by manipulating the `multi_options` parameter to inject malicious Git configurations, such as `core.hooksPath`, leading to the execution of attacker-controlled hooks.

GitPython code-execution git-hooks command-injection
2r 1t 1c