Show filters
396 Total Results
Displaying 41-50 of 396
Sort by:
Attacker Value
Unknown
CVE-2022-22285
Disclosure Date: January 10, 2022 (last updated February 23, 2025)
A vulnerability using PendingIntent in Reminder prior to version 12.2.05.0 in Android R(11.0) and 12.3.02.1000 in Android S(12.0) allows attackers to execute privileged action by hijacking and modifying the intent.
0
Attacker Value
Unknown
CVE-2022-22270
Disclosure Date: January 10, 2022 (last updated February 23, 2025)
An implicit Intent hijacking vulnerability in Dialer prior to SMR Jan-2022 Release 1 allows unprivileged applications to access contact information.
0
Attacker Value
Unknown
CVE-2021-39979
Disclosure Date: January 03, 2022 (last updated February 23, 2025)
HHEE system has a Code Injection vulnerability.Successful exploitation of this vulnerability may affect HHEE system integrity.
0
Attacker Value
Unknown
CVE-2020-20601
Disclosure Date: December 22, 2021 (last updated February 23, 2025)
An issue in ThinkCMF X2.2.2 and below allows attackers to execute arbitrary code via a crafted packet.
0
Attacker Value
Unknown
CVE-2021-43837
Disclosure Date: December 16, 2021 (last updated February 23, 2025)
vault-cli is a configurable command-line interface tool (and python library) to interact with Hashicorp Vault. In versions before 3.0.0 vault-cli features the ability for rendering templated values. When a secret starts with the prefix `!template!`, vault-cli interprets the rest of the contents of the secret as a Jinja2 template. Jinja2 is a powerful templating engine and is not designed to safely render arbitrary templates. An attacker controlling a jinja2 template rendered on a machine can trigger arbitrary code, making this a Remote Code Execution (RCE) risk. If the content of the vault can be completely trusted, then this is not a problem. Otherwise, if your threat model includes cases where an attacker can manipulate a secret value read from the vault using vault-cli, then this vulnerability may impact you. In 3.0.0, the code related to interpreting vault templated secrets has been removed entirely. Users are advised to upgrade as soon as possible. For users unable to upgrade a w…
0
Attacker Value
Unknown
CVE-2021-42309
Disclosure Date: December 15, 2021 (last updated February 23, 2025)
Microsoft SharePoint Server Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2021-44231
Disclosure Date: December 14, 2021 (last updated February 23, 2025)
Internally used text extraction reports allow an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.
0
Attacker Value
Unknown
CVE-2021-43811
Disclosure Date: December 08, 2021 (last updated February 23, 2025)
Sockeye is an open-source sequence-to-sequence framework for Neural Machine Translation built on PyTorch. Sockeye uses YAML to store model and data configurations on disk. Versions below 2.3.24 use unsafe YAML loading, which can be made to execute arbitrary code embedded in config files. An attacker can add malicious code to the config file of a trained model and attempt to convince users to download and run it. If users run the model, the embedded code will run locally. The issue is fixed in version 2.3.24.
0
Attacker Value
Unknown
CVE-2021-37097
Disclosure Date: December 08, 2021 (last updated February 23, 2025)
There is a Code Injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system restart.
0
Attacker Value
Unknown
CVE-2021-37079
Disclosure Date: December 07, 2021 (last updated February 23, 2025)
There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to delete arbitrary file by system_app permission.
0