Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2008-4451

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-06 Oct, 2008 | 23:00
Updated At-07 Aug, 2024 | 10:17
Rejected At-
Credits

The SysInspector AntiStealth driver (esiasdrv.sys) 3.0.65535.0 in ESET System Analyzer Tool 1.1.1.0 allows local users to execute arbitrary code via a certain METHOD_NEITHER IOCTL request to \Device\esiasdrv that overwrites a pointer.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:06 Oct, 2008 | 23:00
Updated At:07 Aug, 2024 | 10:17
Rejected At:
▼CVE Numbering Authority (CNA)

The SysInspector AntiStealth driver (esiasdrv.sys) 3.0.65535.0 in ESET System Analyzer Tool 1.1.1.0 allows local users to execute arbitrary code via a certain METHOD_NEITHER IOCTL request to \Device\esiasdrv that overwrites a pointer.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://exchange.xforce.ibmcloud.com/vulnerabilities/45619
vdb-entry
x_refsource_XF
http://www.ntinternals.org/
x_refsource_MISC
http://securityreason.com/securityalert/4353
third-party-advisory
x_refsource_SREASON
http://www.securityfocus.com/bid/31521
vdb-entry
x_refsource_BID
https://www.exploit-db.com/exploits/6647
exploit
x_refsource_EXPLOIT-DB
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/45619
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.ntinternals.org/
Resource:
x_refsource_MISC
Hyperlink: http://securityreason.com/securityalert/4353
Resource:
third-party-advisory
x_refsource_SREASON
Hyperlink: http://www.securityfocus.com/bid/31521
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://www.exploit-db.com/exploits/6647
Resource:
exploit
x_refsource_EXPLOIT-DB
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://exchange.xforce.ibmcloud.com/vulnerabilities/45619
vdb-entry
x_refsource_XF
x_transferred
http://www.ntinternals.org/
x_refsource_MISC
x_transferred
http://securityreason.com/securityalert/4353
third-party-advisory
x_refsource_SREASON
x_transferred
http://www.securityfocus.com/bid/31521
vdb-entry
x_refsource_BID
x_transferred
https://www.exploit-db.com/exploits/6647
exploit
x_refsource_EXPLOIT-DB
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/45619
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.ntinternals.org/
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://securityreason.com/securityalert/4353
Resource:
third-party-advisory
x_refsource_SREASON
x_transferred
Hyperlink: http://www.securityfocus.com/bid/31521
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://www.exploit-db.com/exploits/6647
Resource:
exploit
x_refsource_EXPLOIT-DB
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:06 Oct, 2008 | 23:25
Updated At:23 Apr, 2026 | 00:35

The SysInspector AntiStealth driver (esiasdrv.sys) 3.0.65535.0 in ESET System Analyzer Tool 1.1.1.0 allows local users to execute arbitrary code via a certain METHOD_NEITHER IOCTL request to \Device\esiasdrv that overwrites a pointer.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.2HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 2.0
Base score: 7.2
Base severity: HIGH
Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

eset_software
eset_software
>>system_analyzer_tool>>1.1.1.0
cpe:2.3:a:eset_software:system_analyzer_tool:1.1.1.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-94Primarynvd@nist.gov
CWE-264Primarynvd@nist.gov
CWE ID: CWE-94
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-264
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://securityreason.com/securityalert/4353cve@mitre.org
N/A
http://www.ntinternals.org/cve@mitre.org
Exploit
http://www.securityfocus.com/bid/31521cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/45619cve@mitre.org
N/A
https://www.exploit-db.com/exploits/6647cve@mitre.org
N/A
http://securityreason.com/securityalert/4353af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ntinternals.org/af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.securityfocus.com/bid/31521af854a3a-2127-422b-91ae-364da2661108
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/45619af854a3a-2127-422b-91ae-364da2661108
N/A
https://www.exploit-db.com/exploits/6647af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://securityreason.com/securityalert/4353
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.ntinternals.org/
Source: cve@mitre.org
Resource:
Exploit
Hyperlink: http://www.securityfocus.com/bid/31521
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/45619
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://www.exploit-db.com/exploits/6647
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://securityreason.com/securityalert/4353
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ntinternals.org/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Hyperlink: http://www.securityfocus.com/bid/31521
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/45619
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.exploit-db.com/exploits/6647
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

22Records found

CVE-2006-1649
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.05% / 15.68%
||
7 Day CHG~0.00%
Published-06 Apr, 2006 | 10:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The "restore to" selection in the "quarantine a file" capability of ESET NOD32 before 2.51.26 allows a restore to any directory that permits read access by the invoking user, which allows local users to create new files despite write-access directory permissions.

Action-Not Available
Vendor-eset_softwaren/a
Product-nod32_antivirusn/a
CVE-2003-0062
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.25% / 48.12%
||
7 Day CHG+0.05%
Published-01 Sep, 2004 | 04:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in Eset Software NOD32 for UNIX before 1.013 allows local users to execute arbitrary code via a long path name.

Action-Not Available
Vendor-eset_softwaren/a
Product-nod32_antivirusn/a
CVE-2006-0951
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.05% / 15.94%
||
7 Day CHG~0.00%
Published-08 Apr, 2006 | 01:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The GUI (nod32.exe) in NOD32 2.5 runs with SYSTEM privileges when the scheduler runs a scheduled on-demand scan, which allows local users to execute arbitrary code during a scheduled scan via unspecified attack vectors.

Action-Not Available
Vendor-eset_softwaren/a
Product-nod32_antivirusn/a
CVE-2011-1760
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.2||HIGH
EPSS-0.08% / 23.98%
||
7 Day CHG~0.00%
Published-09 Jun, 2011 | 19:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

utils/opcontrol in OProfile 0.9.6 and earlier might allow local users to conduct eval injection attacks and gain privileges via shell metacharacters in the -e argument.

Action-Not Available
Vendor-maynard_johnsonn/a
Product-oprofilen/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2022-2054
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-8.4||HIGH
EPSS-0.13% / 31.94%
||
7 Day CHG~0.00%
Published-12 Jun, 2022 | 13:55
Updated-25 Feb, 2026 | 15:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Code Injection in nuitka/nuitka

Code Injection in GitHub repository nuitka/nuitka prior to 0.9.

Action-Not Available
Vendor-nuitkanuitka
Product-nuitkanuitka/nuitka
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2017-6186
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.14% / 33.83%
||
7 Day CHG~0.00%
Published-21 Mar, 2017 | 16:00
Updated-13 May, 2026 | 00:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Code injection vulnerability in Bitdefender Total Security 12.0 (and earlier), Internet Security 12.0 (and earlier), and Antivirus Plus 12.0 (and earlier) allows a local attacker to bypass a self-protection mechanism, inject arbitrary code, and take full control of any Bitdefender process via a "DoubleAgent" attack. One perspective on this issue is that (1) these products do not use the Protected Processes feature, and therefore an attacker can enter an arbitrary Application Verifier Provider DLL under Image File Execution Options in the registry; (2) the self-protection mechanism is intended to block all local processes (regardless of privileges) from modifying Image File Execution Options for these products; and (3) this mechanism can be bypassed by an attacker who temporarily renames Image File Execution Options during the attack.

Action-Not Available
Vendor-n/aBitdefender
Product-antivirus_plustotal_securityinternet_securityn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2017-3753
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-6.8||MEDIUM
EPSS-0.04% / 13.60%
||
7 Day CHG~0.00%
Published-10 Aug, 2017 | 00:00
Updated-13 May, 2026 | 00:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in some Lenovo products that use UEFI (BIOS) code developed by American Megatrends, Inc. (AMI). With this vulnerability, conditions exist where an attacker with administrative privileges or physical access to a system may be able to run specially crafted code that can allow them to bypass system protections such as Device Guard and Hyper-V.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkcentre_e74zthinkstation_c30_\(1137\)ideacentre_300-20ishthinkserver_rq750thinkcentre_m900zthinkcentre_m8200z_firmwarethinkcentre_e93_firmwarethinkstation_c30_\(1136\)yangtian_s3040_firmwarem4500_firmwarethinkcentre_m92pthinkcentre_m8600t\/sthinkcentre_e74syangtian_afh110thinkcentre_m6600t\/sthinkcentre_m715q_firmwareyangtian_mc_h110yangtian_afh81_firmwarethinkcentre_m83z_\(aio\)_firmwarethinkcentre_m4500t\/sthinkcentre_e73z_\(aio\)thinkcentre_m7200zyangtian_afh81thinkcentre_e93z_\(aio\)_firmwarethinkcentre_m8600t\/s_firmwarethinkserver_td340_firmwarethinkcentre_e74z_firmwarem4550_id_firmwarethinkstation_p900_firmwarethinkstation_e32thinkcentre_m83_firmwareyangtian_me\/we_h110_firmwarethinkcentre_m83z_\(aio\)thinkserver_ts550_firmwareh50-30gthinkcentre_m4600t\/sthinkcentre_m910x_firmwarethinkcentre_edge_62z_firmwarem4550_idthinkcentre_e93thinkcentre_m610_firmwarethinkserver_ts140_firmwarethinkcentre_x1_aio_firmwareideacentre_510s-08ishthinkcentre_e79_firmwarethinkcentre_m7250z_firmwarethinkcentre_m710t\/s_firmwarev320-15iapthinkcentre_m4500q_firmwarethinkcentre_e93z_\(aio\)thinkserver_rs140_firmwarethinkcentre_m8300zideacentre_510s-23isu_firmwarethinkcentre_m73p_firmwarethinkcentre_m8300z_firmwarethinkcentre_m715qthinkcentre_m6600t\/s_firmwarethinkcentre_m4500k_firmwarethinkcentre_e75_t\/s_firmwareideacentre_700_firmwarethinkcentre_m600thinkstation_p700thinkcentre_m4600t\/s_firmwarethinkstation_s30_\(4352\)_firmwarethinkcentre_m910xthinkstation_p310thinkcentre_m4500kthinkcentre_e73_firmwareyangtian_afq150_firmwarethinkcentre_e73thinkcentre_m900z_firmwarethinkcentre_m800z_firmwareideacentre_300s-11ish_firmwarethinkcentre_m910t\/sthinkcentre_m700z_firmwarethinkserver_rq750_firmwarethinkcentre_m73z_\(aio\)thinkstation_p310_firmware63thinkstation_p510thinkcentre_m93thinkcentre_m93p_firmwarev320-15iap_firmwarem4500_id_firmwarethinkcentre_m72e_firmwarethinkserver_rd340_firmwarethinkcentre_m9500z_firmwareyangtian_mc_h110_firmwarethinkstation_e31thinkstation_p300_firmwareyangtian_mc_godavari_firmwarethinkcentre_m4500qthinkcentre_m79_firmwarethinkserver_ts140thinkcentre_m7300z_firmwarethinkcentre_m93_firmwarethinkcentre_m700zthinkcentre_m900_firmwarethinkcentre_m710t\/sthinkstation_d30_\(4354\)_firmwarethinkcentre_e74_firmwareideacentre_510s-23isuyangtian_mc_godavarithinkcentre_m7250zthinkcentre_m8350z_firmwarethinkcentre_e73sthinkserver_td340thinkcentre_m910q_firmwarethinkstation_d30_\(4353\)thinkcentre_m8350zthinkcentre_m700thinkcentre_m6500t\/syangtian_afh110_firmwarethinkcentre_m72ethinkcentre_m73pideacentre_700thinkcentre_m810z_firmwarethinkserver_ts250thinkstation_s30_\(4351\)_firmwarethinkserver_rd440ideacentre_510s-08ish_firmwarethinkserver_rd440_firmwarethinkserver_ts240thinkcentre_m7200z_firmwarethinkstation_p500_firmwarethinkstation_p710thinkcentre_m79thinkcentre_m73_firmwarethinkserver_rs140thinkserver_ts550thinkcentre_edge_62zthinkserver_ts240_firmwarethinkstation_c30_\(1137\)_firmwarethinkcentre_e73s_firmwareyangtian_mc_h81_firmwarethinkserver_rd640_firmwarethinkstation_c30_\(1136\)_firmwarethinkstation_p410_firmwarethinkstation_s30_\(4352\)thinkserver_rd540thinkcentre_m700_firmwarem4500_idthinkcentre_m610yangtian_mc_carrizo-ls500_firmwarethinkcentre_m900thinkcentre_e73z_\(aio\)_firmwarethinkcentre_m8200zthinkstation_p900thinkcentre_m9550zthinkcentre_m6600_firmwarethinkcentre_m800s500thinkcentre_m9550z_firmwarethinkserver_ts250_firmwarethinkstation_p510_firmwarethinkstation_s30_\(4351\)thinkcentre_m73z_\(aio\)_firmwarethinkstation_p320yangtian_afq150thinkcentre_e74thinkcentre_m83s200z_firmwarethinkcentre_m92p_firmwarethinkcentre_m6500t\/s_firmwarethinkcentre_x1_aiothinkstation_e32_firmwarethinkcentre_e75_t\/sthinkstation_p410thinkcentre_m93pthinkstation_p500thinkcentre_m7300zyangtian_mc_carrizo-l_firmwarethinkstation_p320_firmwarethinkstation_p910thinkcentre_m800_firmwareyangtian_mf\/wf_h81thinkcentre_m8250zthinkserver_rd540_firmwarethinkcentre_m910qyangtian_s3040thinkcentre_m92thinkserver_ts450thinkcentre_m9500zyangtian_mc_h81thinkcentre_m8500t\/s_firmwarethinkstation_p300thinkstation_d30_\(4354\)thinkcentre_m6600qthinkstation_d30_\(4353\)_firmwarethinkstation_e31_firmwarethinkcentre_m810zthinkcentre_e74s_firmwarethinkserver_ts150_firmwarem4500thinkstation_p700_firmwarethinkserver_ts450_firmwares200zideacentre_300-20ish_firmwareyangtian_s800_firmwarethinkcentre_m600_firmwareideacentre_300s-11ishh50-30g_firmwarethinkcentre_m6600q_firmwarethinkstation_p910_firmwarethinkcentre_m8500t\/sthinkserver_rd340thinkcentre_m92_firmwarethinkcentre_m800zthinkserver_ts150thinkcentre_m8250z_firmware63_firmwareyangtian_mf\/wf_h81_firmwarethinkcentre_e79thinkcentre_m6600thinkcentre_m4500t\/s_firmwarethinkcentre_m910t\/s_firmwarethinkstation_p710_firmwarethinkcentre_m73Desktop and Notebook BIOS
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2010-2240
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.2||HIGH
EPSS-0.14% / 32.88%
||
7 Day CHG~0.00%
Published-03 Sep, 2010 | 19:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2009-0390
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.37% / 58.81%
||
7 Day CHG~0.00%
Published-02 Feb, 2009 | 22:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Argument injection vulnerability in Enomaly Elastic Computing Platform (ECP), formerly Enomalism, before 2.1.1 allows local users to send signals to arbitrary processes by populating the /tmp/enomalism2.pid file with command-line arguments for the kill program.

Action-Not Available
Vendor-enomalyn/a
Product-elastic_computing_platformn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2008-3949
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.07% / 22.08%
||
7 Day CHG~0.00%
Published-22 Sep, 2008 | 17:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

emacs/lisp/progmodes/python.el in Emacs 22.1 and 22.2 imports Python script from the current working directory during editing of a Python file, which allows local users to execute arbitrary code via a Trojan horse Python file.

Action-Not Available
Vendor-n/aSUSE
Product-suse_linuxn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2008-0600
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.2||HIGH
EPSS-0.30% / 53.20%
||
7 Day CHG~0.00%
Published-12 Feb, 2008 | 20:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2008-1084
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.2||HIGH
EPSS-10.43% / 93.29%
||
7 Day CHG~0.00%
Published-08 Apr, 2008 | 23:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the kernel in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, through Vista SP1, and Server 2008 allows local users to execute arbitrary code via unknown vectors related to improper input validation. NOTE: it was later reported that one affected function is NtUserFnOUTSTRING in win32k.sys.

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-windows_server_2008windows_vistawindows_xpwindows_2000windows_2003_servern/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2008-0302
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.08% / 22.74%
||
7 Day CHG~0.00%
Published-17 Jan, 2008 | 01:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Untrusted search path vulnerability in apt-listchanges.py in apt-listchanges before 2.82 allows local users to execute arbitrary code via a malicious apt-listchanges program in the current working directory.

Action-Not Available
Vendor-n/aDebian GNU/Linux
Product-apt-listchangesn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2003-0498
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.14% / 33.29%
||
7 Day CHG~0.00%
Published-04 Jul, 2003 | 04:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Caché Database 5.x installs the /cachesys/csp directory with insecure permissions, which allows local users to execute arbitrary code by adding server-side scripts that are executed with root privileges.

Action-Not Available
Vendor-intersystemsn/a
Product-cache_databasen/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2000-0155
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-1.72% / 82.56%
||
7 Day CHG~0.00%
Published-23 Feb, 2000 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Windows NT Autorun executes the autorun.inf file on non-removable media, which allows local attackers to specify an alternate program to execute when other users access a drive.

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-windows_98windows_95windows_ntn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2019-3695
Matching Score-4
Assigner-SUSE
ShareView Details
Matching Score-4
Assigner-SUSE
CVSS Score-8.4||HIGH
EPSS-0.12% / 30.11%
||
7 Day CHG~0.00%
Published-03 Mar, 2020 | 11:05
Updated-16 Sep, 2024 | 18:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
pcp: Local privilege escalation from user pcp to root

A Improper Control of Generation of Code vulnerability in the packaging of pcp of SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Module for Development Tools 15-SP1, SUSE Linux Enterprise Module for Open Buildservice Development Tools 15, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP5; openSUSE Leap 15.1 allows the user pcp to run code as root by placing it into /var/log/pcp/configs.sh This issue affects: SUSE Linux Enterprise High Performance Computing 15-ESPOS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise High Performance Computing 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15-SP1 pcp versions prior to 4.3.1-3.5.3. SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server for SAP 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Software Development Kit 12-SP4 pcp versions prior to 3.11.9-6.14.1. SUSE Linux Enterprise Software Development Kit 12-SP5 pcp versions prior to 3.11.9-6.14.1. openSUSE Leap 15.1 pcp versions prior to 4.3.1-lp151.2.3.1.

Action-Not Available
Vendor-openSUSESUSE
Product-linux_enterprise_software_development_kitlinux_enterprise_serverlinux_enterprise_high_performance_computingpcpleapSUSE Linux Enterprise High Performance Computing 15-LTSSSUSE Linux Enterprise High Performance Computing 15-ESPOSSUSE Linux Enterprise Software Development Kit 12-SP4SUSE Linux Enterprise Software Development Kit 12-SP5openSUSE Leap 15.1SUSE Linux Enterprise Module for Development Tools 15-SP1SUSE Linux Enterprise Module for Open Buildservice Development Tools 15SUSE Linux Enterprise Server 15-LTSSSUSE Linux Enterprise Module for Development Tools 15SUSE Linux Enterprise Server for SAP 15
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2019-0091
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.12% / 30.16%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Code injection vulnerability in installer for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15 may allow an unprivileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-converged_security_and_management_enginetrusted_execution_technologyIntel(R) Converged Security & Management Engine (CSME), Intel (R) Trusted Execution Engine Interface (TXE)
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2016-1602
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
CVSS Score-7.8||HIGH
EPSS-0.11% / 29.39%
||
7 Day CHG~0.00%
Published-23 Mar, 2017 | 06:36
Updated-13 May, 2026 | 00:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A code injection in the supportconfig data collection tool in supportutils in SUSE Linux Enterprise Server 12 and 12-SP1 and SUSE Linux Enterprise Desktop 12 and 12-SP1 could be used by local attackers to execute code as the user running supportconfig (usually root).

Action-Not Available
Vendor-n/aSUSE
Product-linux_enterprise_serverlinux_enterprise_desktopsuse_linux_enterprise_serversupportconfig
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2014-8660
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.18% / 39.70%
||
7 Day CHG~0.00%
Published-06 Nov, 2014 | 15:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SAP Document Management Services allows local users to execute arbitrary commands via unspecified vectors.

Action-Not Available
Vendor-n/aSAP SE
Product-document_management_servicesn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2018-1792
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-8.8||HIGH
EPSS-0.29% / 52.05%
||
7 Day CHG~0.00%
Published-13 Nov, 2018 | 15:00
Updated-16 Sep, 2024 | 16:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM WebSphere MQ 8.0.0.0 through 8.0.0.10, 9.0.0.0 through 9.0.0.5, 9.0.1 through 9.0.5, and 9.1.0.0 could allow a local user to inject code that could be executed with root privileges. IBM X-Force ID: 148947.

Action-Not Available
Vendor-IBM Corporation
Product-websphere_mqMQ
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2019-4000
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-7.8||HIGH
EPSS-0.12% / 30.53%
||
7 Day CHG~0.00%
Published-25 Feb, 2020 | 20:28
Updated-04 Aug, 2024 | 19:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper neutralization of directives in dynamically evaluated code in Druva inSync Mac OS Client 6.5.0 allows a local, authenticated attacker to execute arbitrary Python expressions with root privileges.

Action-Not Available
Vendor-druvan/aApple Inc.
Product-macosinsyncDruva inSync Mac OS Client
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2013-3200
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.2||HIGH
EPSS-0.51% / 66.46%
||
7 Day CHG~0.00%
Published-09 Oct, 2013 | 14:44
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The USB drivers in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allow physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-windows_rtwindows_7windows_server_2008windows_vistawindows_xpwindows_8windows_server_2012windows_server_2003n/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
Details not found