An issue in Cppcheck 2.12 dev allows a local attacker to execute arbitrary code via the removeContradiction parameter in token.cpp:1934.
{ "binaries": [ { "binary_version": "2.7-1", "binary_name": "cppcheck" }, { "binary_version": "2.7-1", "binary_name": "cppcheck-gui" } ] }
{ "binaries": [ { "binary_version": "2.13.0-2ubuntu3", "binary_name": "cppcheck" }, { "binary_version": "2.13.0-2ubuntu3", "binary_name": "cppcheck-gui" } ] }
{ "binaries": [ { "binary_version": "2.17.1-1", "binary_name": "cppcheck" }, { "binary_version": "2.17.1-1", "binary_name": "cppcheck-gui" } ] }
{ "binaries": [ { "binary_version": "1.61-1", "binary_name": "cppcheck" } ] }
{ "binaries": [ { "binary_version": "1.72-1", "binary_name": "cppcheck" }, { "binary_version": "1.72-1", "binary_name": "cppcheck-gui" } ] }
{ "binaries": [ { "binary_version": "1.82-1", "binary_name": "cppcheck" }, { "binary_version": "1.82-1", "binary_name": "cppcheck-gui" } ] }
{ "binaries": [ { "binary_version": "1.90-4build1", "binary_name": "cppcheck" }, { "binary_version": "1.90-4build1", "binary_name": "cppcheck-gui" } ] }